Windows remote access clients

Get started with the Windows Desktop client

Applies to: Windows 10, Windows 10 IoT Enterprise, and Windows 7

You can use the Remote Desktop client for Windows Desktop to access Windows apps and desktops remotely from a different Windows device.

  • This documentation is not for the Remote Desktop Connection (MSTSC) client that ships with Windows. It’s for the new Remote Desktop (MSRDC) client.
  • This client currently only supports accessing remote apps and desktops from Windows Virtual Desktop.
  • Curious about the new releases for the Windows Desktop client? Check out What’s new in the Windows Desktop client

Install the client

Choose the client that matches the version of Windows. The new Remote Desktop client (MSRDC) supports Windows 10, Windows 10 IoT Enterprise, and Windows 7 client devices.

You can install the client for the current user, which doesn’t require admin rights, or your admin can install and configure the client so that all users on the device can access it.

Once you’ve installed the client, you can launch it from the Start menu by searching for Remote Desktop.

Update the client

You’ll be notified whenever a new version of the client is available as long as your admin hasn’t disabled notifications. The notification will appear in either the Connection Center or the Windows Action Center. To update your client, just select the notification.

You can also manually search for new updates for the client:

  1. From the Connection Center, tap the overflow menu (. ) on the command bar at the top of the client.
  2. Select About from the drop-down menu.
  3. The client automatically searches for updates.
  4. If there’s an update available, tap Install update to update the client.

Workspaces

Get the list of managed resources you can access, such as apps and desktops, by subscribing to the Workspace your admin provided you. When you subscribe, the resources become available on your local PC. The Windows Desktop client currently supports resources published from Windows Virtual Desktop.

Subscribe to a Workspace

There are two ways you can subscribe to a Workspace. The client can try to discover the resources available to you from your work or school account or you can directly specify the URL where your resources are for cases where the client is unable to find them. Once you’ve subscribed to a Workspace, you can launch resources with one of the following methods:

  • Go to the Connection Center and double-click a resource to launch it.
  • You can also go to the Start menu and look for a folder with the Workspace name or enter the resource name in the search bar.

Subscribe with a user account

  1. From the main page of the client, tap Subscribe.
  2. Sign in with your user account when prompted.
  3. The resources will appear in the Connection Center grouped by Workspace.

Subscribe with URL

  1. From the main page of the client, tap Subscribe with URL.
  2. Enter the Workspace URL or your email address:
    • If you use the Workspace URL, use the one your admin gave you. If accessing resources from Windows Virtual Desktop, you can use one of the following URLs:
      • Windows Virtual Desktop (classic): https://rdweb.wvd.microsoft.com/api/feeddiscovery/webfeeddiscovery.aspx
      • Windows Virtual Desktop: https://rdweb.wvd.microsoft.com/api/arm/feeddiscovery
    • To use email, enter your email address. This tells the client to search for a URL associated with your email address if your admin has setup email discovery.
  3. Tap Next.
  4. Sign in with your user account when prompted.
  5. The resources will appear in the Connection Center grouped by Workspace.

Workspace details

After subscribing, you can view additional information about a Workspace on the Details panel:

  • The name of the Workspace
  • The URL and username used to subscribe
  • The number of apps and desktops
  • The date/time of the last refresh
  • The status of the last refresh

Accessing the Details panel:

  1. From the Connection Center, tap the overflow menu (. ) next to the Workspace.
  2. Select Details from the drop-down menu.
  3. The Details panel appears on the right side of the client.

After you’ve subscribed, the Workspace will refresh automatically on a regular basis. Resources may be added, changed, or removed based on changes made by your admin.

You can also manually look for updates to the resources when needed by selecting Refresh from the Details panel.

Refreshing a Workspace

You can manually refresh a Workspace by selecting Refresh from the overflow menu (. ) next to the Workspace.

Читайте также:  Sfc scannow windows не может восстановить некоторые файлы

Unsubscribe from a Workspace

This section will teach you how to unsubscribe from a Workspace. You can unsubscribe to either subscribe again with a different account or remove your resources from the system.

  1. From the Connection Center, tap the overflow menu (. ) next to the Workspace.
  2. Select Unsubscribe from the drop-down menu.
  3. Review the dialog box and select Continue.

Managed desktops

Workspaces can contain multiple managed resources, including desktops. When accessing a managed desktop, you have access to all the apps installed by your admin.

Desktop settings

You can configure some of the settings for desktop resources to ensure the experience meets your needs. To access the list of available settings right-click on the desktop resource and select Settings.

The client will use the settings configured by your admin unless you turn off the Use default settings option. Doing so allows you to configure the following options:

  • Display configuration selects which displays to use for the desktop session and impacts which additional settings are available.
    • All displays ensures the session always uses all your local displays even when some of them are added or removed later.
    • Single display ensures the session always uses a single display and allows you to configure its properties.
    • Select displays allows you to choose which displays to use for the session and provides an option to dynamically change the list of displays during the session.
  • Select the displays to use for the session specifies which local displays to use for the session. All selected displays must be adjacent to each other. This setting is only available in Select display mode.
  • Maximize to current displays determines which displays the sessions will use when going full screen. When enabled, the session goes full screen on the displays touched by the session window. This allows you to change displays during the session. When disabled, the session goes full screen on the same displays it was on the last time it was full screen. This setting is only available in Select display mode and is disabled otherwise.
  • Single display when windowed determines which displays are available in the session when exiting full screen. When enabled, the session switches to a single display in windowed mode. When disabled, the session retains the same displays in windowed mode as in full screen. This setting is only available in All displays and Select display modes and is disabled otherwise.
  • Start in full screen determines whether the session will launch in full-screen or windowed mode. This setting is only available in Single display mode and is enabled otherwise.
  • Fit session to window determines how the session is displayed when the resolution of the remote desktop differs from the size of the local window. When enabled, the session content will be resized to fit inside the window while preserving the aspect ratio of the session. When disabled, scrollbars or black areas will be shown when the resolution and window size don’t match. This setting is available in all modes.
  • Update the resolution on resize makes the remote desktop resolution automatically update when you resize the session in windowed mode. When disabled, the session always remains at whichever resolution you specify in Resolution. This setting is only available in Single display mode and is enabled otherwise.
  • Resolution lets you specify the resolution of the remote desktop. The session will retain this resolution for its entire duration. This setting is only available in Single display mode and when Update the resolution on resize is disabled.
  • Change the size of the text and apps specifies the size of the content of the session. This setting only applies when connecting to Windows 8.1 and later or Windows Server 2012 R2 and later. This setting is only available in Single display mode and when Update the resolution on resize is disabled.

Give us feedback

Have a feature suggestion or want to report a problem? Tell us with the Feedback Hub.

You can also give us feedback by selecting the button that looks like a smiley face emoticon in the client app, as shown in the following image:

To best help you, we need you to give us as detailed information about the issue as possible. For example, you can include screenshots or a recording of the actions you took leading up to the issue. For more tips about how to provide helpful feedback, see Feedback.

Access client logs

You might need the client logs when investigating a problem.

To retrieve the client logs:

  1. Ensure no sessions are active and the client process isn’t running in the background by right-clicking on the Remote Desktop icon in the system tray and selecting Disconnect all sessions.
  2. Open File Explorer.
  3. Navigate to the %temp%\DiagOutputDir\RdClientAutoTrace folder.
Читайте также:  Аналог lightroom для windows

—>

Удаленный доступ Remote Access

Область применения: Windows Server (половина ежегодного канала), Windows Server 2016, Windows Server 2012 R2, Windows 10 Applies To: Windows Server (Semi-Annual Channel), Windows Server 2016, Windows Server 2012 R2, Windows 10

Руководство по удаленному доступу содержит общие сведения о роли сервера удаленного доступа в Windows Server 2016 и рассматриваются следующие темы: The Remote Access guide provides you with an overview of the Remote Access server role in Windows Server 2016, and covers the following subjects:

Дополнительные сведения о других сетевых технологиях см. в статье сетевые подключения в Windows Server 2016. For more information about other networking technologies, see Networking in Windows Server 2016.

Роль сервера удаленного доступа — это логическая группа этих связанных технологий доступа к сети: Служба удаленного доступа (RAS), Маршрутизацияи прокси веб-приложения. The Remote Access server role is a logical grouping of these related network access technologies: Remote Access Service (RAS), Routing, and Web Application Proxy. Эти технологии являются службами ролей роли сервера удаленного доступа. These technologies are the role services of the Remote Access server role. При установке роли сервера удаленного доступа с помощью мастера добавления ролей и компонентов или Windows PowerShell можно установить одну или несколько из этих трех служб ролей. When you install the Remote Access server role with the Add Roles and Features Wizard or Windows PowerShell, you can install one or more of these three role services.

Не пытайтесь развернуть удаленный доступ на виртуальной машине виртуальной машины ( ) в Microsoft Azure. Do not attempt to deploy Remote Access on a virtual machine (VM) in Microsoft Azure. Использование удаленного доступа в Microsoft Azure не поддерживается. Using Remote Access in Microsoft Azure is not supported. Удаленный доступ на виртуальной машине Azure нельзя использовать для развертывания VPN, DirectAccess или любой другой функции удаленного доступа в Windows Server 2016 или более ранних версиях Windows Server. You cannot use Remote Access in an Azure VM to deploy VPN, DirectAccess, or any other Remote Access feature in Windows Server 2016 or earlier versions of Windows Server. Дополнительные сведения см. в статье поддержка серверного программного обеспечения Майкрософт для Microsoft Azure виртуальных машин. For more information, see Microsoft server software support for Microsoft Azure virtual machines.

(RAS ) -шлюз службы удаленного доступа Remote Access Service (RAS) — RAS Gateway

При установке службы роли DirectAccess и VPN вы развертываете ( шлюз RAS шлюза службы удаленного доступа ) . When you install the DirectAccess and VPN (RAS) role service, you are deploying the Remote Access Service Gateway (RAS Gateway). Вы можете развернуть шлюз RAS для одного клиента VPN-сервера виртуальной частной сети ( ) , многоклиентского шлюза RAS, а также как сервер DirectAccess. You can deploy the RAS Gateway a single tenant RAS Gateway virtual private network (VPN) server, a multitenant RAS Gateway VPN server, and as a DirectAccess server.

Шлюз RAS — один клиент. RAS Gateway — Single Tenant. С помощью шлюза RAS можно развернуть VPN-подключения, чтобы предоставить конечным пользователям удаленный доступ к сети и ресурсам Организации. By using RAS Gateway, you can deploy VPN connections to provide end users with remote access to your organization’s network and resources. Если клиенты работают под управлением Windows 10, можно развернуть VPN Always On, которая обеспечивает постоянное подключение между клиентами и сетью Организации, когда удаленные компьютеры подключены к Интернету. If your clients are running Windows 10, you can deploy Always On VPN, which maintains a persistent connection between clients and your organization network whenever remote computers are connected to the Internet. С помощью шлюза RAS можно также создать VPN-подключение типа «сеть — сеть» между двумя серверами в разных местах, например между основным офисом и филиалом, и использовать преобразование сетевых адресов ( NAT, ) чтобы пользователи в сети могли получать доступ к внешним ресурсам, таким как Интернет. With RAS Gateway, you can also create a site-to-site VPN connection between two servers at different locations, such as between your primary office and a branch office, and use Network Address Translation (NAT) so that users inside the network can access external resources, such as the Internet. Кроме того, шлюз RAS поддерживает протокол BGP (BGP), который предоставляет службы динамической маршрутизации, если расположения удаленных офисов также имеют граничные шлюзы, поддерживающие BGP. In addition, RAS Gateway supports Border Gateway Protocol (BGP), which provides dynamic routing services when your remote office locations also have edge gateways that support BGP.

Шлюз RAS — клиент. RAS Gateway — Multitenant. Шлюз RAS можно развернуть как многоклиентский, шлюз и маршрутизатор на основе программного обеспечения, если вы используете — виртуализацию сети Hyper-V или используете сети ВИРТУАЛЬНЫХ машин, развернутые с виртуальными локальными сетями ( VLAN ) . You can deploy RAS Gateway as a multitenant, software-based edge gateway and router when you are using Hyper-V Network Virtualization or you have VM networks deployed with virtual Local Area Networks (VLANs). Шлюз RAS позволяет поставщикам облачных служб ( ) и предприятиям выполнять маршрутизацию трафика между виртуальными и физическими сетями, включая Интернет. With the RAS Gateway, Cloud Service Providers (CSPs) and Enterprises can enable datacenter and cloud network traffic routing between virtual and physical networks, including the Internet. С помощью шлюза RAS клиенты могут использовать VPN-подключения типа «точка — сеть» для доступа к сетевым ресурсам виртуальной машины в центре обработки данных откуда угодно. With the RAS Gateway, your tenants can use point-so-site VPN connections to access their VM network resources in the datacenter from anywhere. Вы также можете предоставить клиентам VPN-подключения типа «сеть — сеть» между удаленными сайтами и центром обработки данных CSP. You can also provide tenants with site-to-site VPN connections between their remote sites and your CSP datacenter. Кроме того, можно настроить шлюз RAS с помощью BGP для динамической маршрутизации, а также включить преобразование сетевых адресов ( NAT ) для предоставления доступа к Интернету для виртуальных машин в сетях виртуальных машин. In addition, you can configure the RAS Gateway with BGP for dynamic routing, and you can enable Network Address Translation (NAT) to provide Internet access for VMs on VM networks.

Читайте также:  Linux как создание образа диска

Шлюз RAS с многоклиентским возможностями также доступен в Windows Server 2012 R2. The RAS Gateway with multitenant capabilities is also available in Windows Server 2012 R2.

  • Always on VPN. Always On VPN. Always On VPN позволяет удаленным пользователям безопасно получать доступ к общим ресурсам, веб-узлам интрасети и приложениям во внутренней сети без подключения к VPN. Always On VPN enables remote users to securely access shared resources, intranet Web sites, and applications on an internal network without connecting to a VPN.

Дополнительные сведения см. в статье шлюз RAS и протокол BGP (BGP). For more information, see RAS Gateway and Border Gateway Protocol (BGP).

Маршрутизация Routing

Удаленный доступ можно использовать для маршрутизации сетевого трафика между подсетями в локальной сети. You can use Remote Access to route network traffic between subnets on your Local Area Network. Маршрутизация обеспечивает поддержку маршрутизаторов преобразования сетевых адресов (NAT), маршрутизаторов локальной сети, использующих BGP, протокол RIP и маршрутизаторы с многоадресной рассылкой, с помощью протокола IGMP. Routing provides support for Network Address Translation (NAT) routers, LAN routers running BGP, Routing Information Protocol (RIP), and multicast-capable routers using Internet Group Management Protocol (IGMP). В качестве полнофункционального маршрутизатора можно развернуть службу RAS на компьютере сервера или в виртуальной машине на компьютере с Hyper-V. As a full-featured router, you can deploy RAS on either a server computer or as a virtual machine (VM) on a computer that is running Hyper-V.

Чтобы установить удаленный доступ в качестве маршрутизатора локальной сети, используйте мастер добавления ролей и компонентов в диспетчер сервера и выберите роль сервера удаленного доступа и службы роли маршрутизации . или введите следующую команду в командной строке Windows PowerShell и нажмите клавишу ВВОД. To install Remote Access as a LAN router, either use the Add Roles and Features Wizard in Server Manager and select the Remote Access server role and the Routing role service; or type the following command at a Windows PowerShell prompt, and then press ENTER.

Прокси-сервер веб-приложения Web Application Proxy

Прокси веб-приложения — это служба роли удаленного доступа в Windows Server 2016. Web Application Proxy is a Remote Access role service in Windows Server 2016. Прокси-сервер веб-приложения предоставляет функции обратного прокси-сервера для веб-приложений в корпоративной сети, что делает их доступными для пользователей с любых устройств из-за пределов корпоративной сети. Web Application Proxy provides reverse proxy functionality for web applications inside your corporate network to allow users on any device to access them from outside the corporate network. Прокси веб-приложения предварительно проверяет подлинность доступа к веб-приложениям с помощью службы федерации Active Directory (AD FS) (AD FS), а также выступает в качестве AD FS прокси-сервера. Web Application Proxy pre-authenticates access to web applications using Active Directory Federation Services (AD FS), and also functions as an AD FS proxy.

Чтобы установить удаленный доступ в качестве прокси веб-приложения, воспользуйтесь мастером добавления ролей и компонентов в диспетчер сервера и выберите роль сервера удаленного доступа и службы роли прокси-сервера . или введите следующую команду в командной строке Windows PowerShell и нажмите клавишу ВВОД. To install Remote Access as a Web Application Proxy, either use the Add Roles and Features Wizard in Server Manager and select the Remote Access server role and the Web Application Proxy role service; or type the following command at a Windows PowerShell prompt, and then press ENTER.

Дополнительные сведения см. в разделе прокси веб-приложения. For more information, see Web Application Proxy.

Оцените статью