Azure Remote Desktop Client
Download AnyDesk for Windows for free and access, control and administrate all your devices when working remotely.
- Azure Remote Desktop Client Login
- Azure Windows Virtual Desktop
- Azure Remote Desktop Client Software
- Azure Remote Desktop Client Linux
- Remote Desktop Web Client Azure Application Proxy
- This only supports Azure Resource Manager objects, to support objects without Azure Resource Manager, see Connect with Windows Desktop (classic) client. This does not support the RemoteApp and Desktop Connections (RADC) client or the Remote Desktop Connection (MSTSC) client.
- Remote Desktop client for Windows 7 or Windows 10 stops responding or cannot be opened Starting with version 1.2.790, you can reset the user data from the About page or using a command. Use the following command to remove your user data, restore default settings and unsubscribe from all Workspaces.
How can you keep your entire Azure Virtual Network easily accessible and secure at the same time? Many an IT professional has had sleepless nights trying to figure it out. Now, let us help you avoid them!
Luckily there are some great solutions like Just-In-Time VM Access without risking port scanning and brute force attacks. We will cover the Azure VM connectivity options – including the new Azure Bastion – here.
The Azure cloud services have helped companies around the world move from on premises servers to Virtual Machines available at a moments notice. This has undoubtedly made it possible for a lot of small & medium businesses to scale fast
and saved established companies fortunes. But with new solutions come new challenges. Hackers are always searching for vulnerabilities via ports connected to public IP addresses. So when you need to connect to your Azure Virtual Machines to manage them, there are a range of security and connectivity issues.
Remote Desktop Protocol (RDP) is well-known and commonly used to access remote computers and servers. This lets IT administrators support a huge organization from the comforts of their own desk. Microsoft developed RDP and includes two administrator accounts for simultaneous RDP onto a server in Windows Server. For more users you can add CALs (RDS Client Access Licenses).
There are several challenges facing the IT professionals who need to expose their virtual machines to the public internet by opening ports (RDP/SSH):
1) Brute force attacks target management ports as a means to gain access to a VM
2) DDoS attacks by flooding the bandwidth or resources of a targeted system
3) Port scanning – finding an active port and discovering exploitable communication channels
So let’s look at the different options for connecting to your VMs with RDP and how you can mitigate these risks
RDP using a Private IP address across a Site to Site VPN
The ideal form of RDP connection is RDP across a Site to Site VPN connection. This keeps your communication with the Virtual Machine off the public internet granting protection against port scanning, brute force and DdoS attacks. With a VPN gateway from the Azure network to the on premises network Azure VMs can be RDP’ed using a private IP address – protected from the prying eyes of the public internet.
The public IP address can be removed all together if you don’t need it. If you do need to use it for something, the RDP port (usually 3389) will be closed. This is an effective and seamless approach to connect to Azure VM without public IP addresses, reducing the threat of attacks.

However, if you don’t have a Site to Site VPN to your Azure network, there are other options.
Lock down RDP to a source IP or IP Range
The default RDP port – 3389 – allows RDP connection from any IP in the world. When enabled it is therefore a security risk. You can mitigate this by restricting RDP access to a specified source IP address or range with Azure NSG’s (Network Security Groups).
Every Virtual Machine will have its own NSG when deployed through Azure. You should apply these two Inbound Port rules:
- Allowing RDP from a specific IP address or range
- Denying all other RDP traffic
Pros: This effectively reduces outside threats by only allowing the specified on premises machines to RDP into the Azure Virtual Machines.
Cons: The port is still visible on the internet. This method is best suited for smaller organizations and also involves management of Network Security Group Port rules
Just-in-time VM access:
Brute force attacks can take days and even weeks to complete. An astounding number of attempts need to be made to connect through the RDP/SSH ports. So if you only have the port open when you need it, you reduce the vulnerability. Just-in-time (JIT) VM access only opens the ports when you need them and locks them down to your IP address / range. After you have finished what you were doing on the VM, it closes the port again.
You can enable JIT easily from Azure Security Center, configure it through an Azure Virtual Machine blade or configure a JIT policy on a VM programmatically.
Pros: Reduces the risk of succesfull brute force attacks as the port is only open when you need it
Cons: You still need to open port 3389 to public internet leaving you vulnerable within the allotted time frame.
Public Load Balancer with Network Address Translation (NAT)
A Public Load Balancer has a public IP address, and a Network Address Translation (NAT) rule forwards traffic from a specific port of the front-end IP address to a specific port of a back-end VM on its Private IP. So, the VM you want to access with RDP doesn’t have to have a Public IP and its private IP isn’t visible.
Pros: Minimizes the number of Azure Public IP addresses, obfuscates management ports of virtual machines, load balances traffic across the virtual machines configured under it
Cons: This approach has certain limitations so it may not be suitable in some scenarios. The load-balancing rules and inbound NAT rules support TCP and UDP but not other IP protocols like ICMP. The load balancer doesn’t terminate, respond or interact with the payload of a UDP or TCP flow.
Provision a Jumphost VM
Rather than exposing all your virtual machines to public internet, you can use the Jumphost solution. This creates a single VM – called the Jumphost – in Azure with RDP connection to the internet. From this box you connect to your other VMs in your virtual network.
An NSG can be used to restrict the IP addresses that can communicate with the Jumphost. Monitoring and logging can also only be done on this one VM. You can easily turn it off to stop all RDP when needed.
Jumphosts are easy to deploy and greatly increase security on the overall Azure VM infrastructure maintenance. You can find CIS Hardened images ready for easy deployment and management in the Microsoft Azure marketplace.
Pros: Access your VMs through one locked down, hardened jumphost. Your VMs don’t need Public IPs.
Cons: Jumphost still involves opening one VM to public internet without eliminating outside threats completely. The additional cost of one VM, configuration, ACLs, monitoring and auditing can make this a costly solution.
Azure Bastion – a jump host PaaS service
In late 2019 Microsoft released Azure Bastion into General Availability. It is a new fully platform-managed PaaS service which provides secure and seamless RDP/SSH connectivity to your virtual machines directly in the Azure portal over SSL.
Azure Bastion provisions directly in your Azure Virtual Network acting like a jump server as-a-service. You don’t need Public IPs to access your VMs over RDP/SSH.
Additionally, Azure Bastion provides integrated connectivity using RDP/SSH directly from your browser and the Azure portal experience. You don’t need an additional client, agent, or piece of software.
Deployment of Azure Bastion is per virtual network, thus, once deployed in a virtual network, it is available to all VMs in the virtual network.
Bastion host servers are designed and configured to withstand attacks. Azure Bastion is also reinforced by automatic patching, handled by Microsoft, to best guard customers against zero-day exploits.
Pros: You don’t need public IP addresses on your virtual machines, get the benefits of a jumphost without the overhead, RDP and SSH directly in Azure portal.
Cons: The disadvantages of Azure Bastion are hard to find. This PaaS Service is not yet available worldwide, but can currently be used in 29 regions. Please ask one of our consultants for the current availability outside the UK, if this is relevant to your business.
Overall Azure Bastion is the ideal solution that IT professionals have been waiting for. It provides an easy and fool proof solution to eliminate outside threats with minimal maintenance overhead. You get all the benefits of RDP but connect to Azure VM without Remote Desktop client.
Future capabilities and features of Azure Bastion
Microsoft is still developing Azure Bastion to meet user needs. Along with the expansion to all regions the following updates are expected:
- Azure Active Directory integration and Azure MFA (Multi-Factor Authentication)
- Extending two-factor authentication to RDP/SSH connections
- Added support for native RDP/SSH clients so that you can use your favourite client applications to securely connect to Azure Virtual Machines using Azure Bastion
- Enhanced auditing experience for RDP sessions with full session video recording.
Want to know more? Give us a ring!
-->This article describes common issues with the Remote Desktop client and how to fix them.
Remote Desktop client for Windows 7 or Windows 10 stops responding or cannot be opened
Azure Remote Desktop Client Login
Starting with version 1.2.790, you can reset the user data from the About page or using a command.
Use the following command to remove your user data, restore default settings and unsubscribe from all Workspaces.
If you're using an earlier version of the Remote Desktop client, we recommend you uninstall and reinstall the client.
Web client won't open
First, test your internet connection by opening another website in your browser; for example, www.bing.com.
Use nslookup to confirm DNS can resolve the FQDN:
Try connecting with another client, like Remote Desktop client for Windows 7 or Windows 10, and check to see if you can open the web client.
Can't open other websites while connected to the web client
If you can't open other websites while you're connected to the web client, there might be network connection problems or a network outage. We recommend you contact network support.
Nslookup can't resolve the name
If nslookup can't resolve the name, then there might be network connection problems or a network outage. We recommend you contact network support.
Your client can't connect but other clients on your network can connect
If your browser starts acting up or stops working while you're using the web client, follow these instructions to troubleshoot it:
Azure Windows Virtual Desktop
- Restart the browser.
- Clear browser cookies. See How to delete cookie files in Internet Explorer.
- Clear browser cache. See clear browser cache for your browser.
- Open browser in Private mode.
Client doesn't show my resources
First, check the Azure Active Directory account you're using. If you've already signed in with a different Azure Active Directory account than the one you want to use for Windows Virtual Desktop, you should either sign out or use a private browser window.
If you're using Windows Virtual Desktop (classic), use the web client link in this article to connect to your resources.
If that doesn't work, make sure your app group is associated with a workspace.
Web client stops responding or disconnects
Try connecting using another browser or client.
Azure Remote Desktop Client Software
Other browsers and clients also malfunction or fail to open
If issues continue even after you've switched browsers, the problem may not be with your browser, but with your network. We recommend you contact network support.
Web client keeps prompting for credentials
Azure Remote Desktop Client Linux
If the Web client keeps prompting for credentials, follow these instructions:
- Confirm the web client URL is correct.
- Confirm that the credentials you're using are for the Windows Virtual Desktop environment tied to the URL.
- Clear browser cookies. For more information, see How to delete cookie files in Internet Explorer.
- Clear browser cache. For more information, see Clear browser cache for your browser.
- Open your browser in Private mode.
Windows client blocks Windows Virtual Desktop (classic) feed
If the Windows client feed won't show Windows Virtual Desktop (classic) apps, follow these instructions:
- Check if the Conditional Access policy includes the app IDs associated with Windows Virtual Desktop (classic).
- Check if the Conditional Access policy blocks all access except Windows Virtual Desktop (classic) app IDs. If so, you'll need to add the app ID 9cdead84-a844-4324-93f2-b2e6bb768d07 to the policy to allow the client to discover the feeds.
If you can't find the app ID 9cdead84-a844-4324-93f2-b2e6bb768d07 in the list, you'll need to register the Windows Virtual Desktop resource provider. To register the resource provider:
Remote Desktop Web Client Azure Application Proxy
- Sign in to the Azure portal.
- Go to Subscription, then select your subscription.
- In the menu on the left side of the page, select Resource provider.
- Find and select Microsoft.DesktopVirtualization, then select Re-register.
Next steps

- For an overview on troubleshooting Windows Virtual Desktop and the escalation tracks, see Troubleshooting overview, feedback, and support.
- To troubleshoot issues while creating a Windows Virtual Desktop environment and host pool in a Windows Virtual Desktop environment, see Environment and host pool creation.
- To troubleshoot issues while configuring a virtual machine (VM) in Windows Virtual Desktop, see Session host virtual machine configuration.
- To troubleshoot issues related to the Windows Virtual Desktop agent or session connectivity, see Troubleshoot common Windows Virtual Desktop Agent issues.
- To troubleshoot issues when using PowerShell with Windows Virtual Desktop, see Windows Virtual Desktop PowerShell.
- To go through a troubleshoot tutorial, see Tutorial: Troubleshoot Resource Manager template deployments.
