
This article has not been completed yet. However, it may already contain helpful Information and therefore it has been published at this stage.
- Open up Group Policy Management Console (GPMC).
- Create a New Group Policy Object and name it Enable Remote Desktop.

- Navigate to: Computer Configuration -> Windows Settings -> Security Settings -> Windows Firewall with Advanced Security -> Windows Firewall with Advanced Security -> Inbound Rules and Create a New Rule.


- Select Port in the New Inbound Rule Wizard.

- Ensure TCP and Specific Local Port : 3389

- Allow the Connection and only select Domain and Private Profiles.


- Name this rule – Inbound Rule for RDP Port 3389

Now that we have added the local ports, we’ll need to enable the Remote Desktop Session Host policies.
- Go to Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Connections
- Allow users to connect remotely by using Remote Desktop Services to Enable.

- Now we’re going to enable Network Level Authentication. This is highly recommended and has many security advantages.
- Go to Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Security
- Set Require user authentication for remote connections by using Network Level Authentication to Enable.

- Last we need to apply the newly created GPO to an Organizational Unit. For my own particular scenario, I set up the GPO at the top level, since I want to be able to access all devices remotely.

Sources: