This article has not been completed yet. However, it may already contain helpful Information and therefore it has been published at this stage.

  • Open up Group Policy Management Console (GPMC).
  • Create a New Group Policy Object and name it Enable Remote Desktop.
  • Navigate to: Computer Configuration -> Windows Settings -> Security Settings -> Windows Firewall with Advanced Security -> Windows Firewall with Advanced Security -> Inbound Rules and Create a New Rule.
  • Select Port in the New Inbound Rule Wizard.
  • Ensure TCP and Specific Local Port : 3389
  • Allow the Connection and only select Domain and Private Profiles.
  • Name this rule – Inbound Rule for RDP Port 3389

Now that we have added the local ports, we’ll need to enable the Remote Desktop Session Host policies.

  • Go to Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Connections
  • Allow users to connect remotely by using Remote Desktop Services to Enable.
  • Now we’re going to enable Network Level Authentication.  This is highly recommended and has many security advantages.  
  • Go to Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Security
  • Set Require user authentication for remote connections by using Network Level Authentication to Enable.
  • Last  we need to apply the newly created GPO to an Organizational Unit. For my own particular scenario, I set up the GPO at the top level, since I want to be able to access all devices remotely.

Sources:

Link

Link