Nick implied enabling NLA based on the wording. You’re saying to disable it?
Thanks, Harry From: Sean Hulbert <[email protected]> Sent: Tuesday, February 3, 2026 11:53 AM To: [email protected] Subject: Re: Issue with RDP You don't often get email from [email protected]<mailto:[email protected]>. Learn why this is important<https://aka.ms/LearnAboutSenderIdentification> CAUTION: This email originated from outside of the Federal Aviation Administration (FAA). Do not click on links or open attachments unless you recognize the sender and know the content is safe. Nick is correct, you will need to disable NLA on Windows server 2022, also if youa re not logging in as Administrator you will need to add the user account to the Remote desktop group permissions. Thank You Sean Hulbert Security Centric Inc. A Cybersecurity Virtualization Enablement Company StormCloud Gov, Protected CUI Environment! [cid:[email protected]] Industry's most secure CMMC/iTAR virtual desktops! CMMC L2 FedRAMP MIL4 Ready FR2409250874 System Award Management CAGE: 8AUV4 SAM ID: UMJLJ8A7BMT3 AFCEA San Francisco Chapter President If you have heard of a hacker by name, he/she has failed, fear the hacker you haven’t heard of! CONFIDENTIALITY NOTICE: This communication with its contents may contain confidential and/or legally privileged information. It is solely for the use of the intended recipient(s). Unauthorized interception, review, use or disclosure is prohibited and may violate applicable laws including the Electronic Communications Privacy Act. If you are not the intended recipient, please contact the sender and destroy all copies of the communication. Content within this email communication is not legally binding as a contract and no promises are guaranteed unless in a formal contract outside this email communication. igitur qui desiderat pacem, praeparet bellum!!! Epitoma Rei Militaris On 2/3/2026 7:52 AM, Nick Couchman wrote: On Tue, Feb 3, 2026 at 10:32 AM Devine, Harry (FAA) via user <[email protected]<mailto:[email protected]>> wrote: We have some users that are using a Windows 2022 server in their environment, and with version 1.5.5, they always get the following error message: RDP Server closed/refused connection: Server refused connection (wrong security type?) In looking their connections, it looks like they are using RDP on port 3389 and the security mode is “RDP encryption”. One server is Windows 2016 and they can get in, and the other is Windows 2022 and they get the error noted above. I'm shocked RDP Encryption works for 2016, and certainly would not expect it to work for 2022. I'd suggest trying NLA. -Nick
