*Cube-Host– full cloud services!!
RDP is one of the most scanned services on the internet. Network Level Authentication (NLA) reduces risk by forcing authentication before a full remote desktop session is created, which helps block anonymous probing and lowers resource abuse.
If you manage a Windows VPS, enabling NLA should be part of the “day‑1” hardening checklist — together with firewall restrictions provided by your VPS hosting environment.
NLA requires the client to authenticate (typically via CredSSP) before Windows allocates a full interactive desktop session. Compared to legacy RDP behavior, this gives you:
On the server (locally or via console):
SystemPropertiesRemoteAlso confirm that the user account is allowed for RDP (member of Remote Desktop Users or Administrators) and that the firewall allows RDP only from trusted IPs.
NLA is controlled by the RDP-Tcp setting UserAuthentication. Run PowerShell as Administrator:
# Require Network Level Authentication (NLA)
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' `
-Name 'UserAuthentication' -Value 1
Optional: verify the value:
Get-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' `
-Name UserAuthentication
If you changed settings remotely, restarting the Remote Desktop Services service (or rebooting) may be required in some configurations.
NLA is important, but it’s not a substitute for network restrictions. For an internet-facing server:
On a VPS hosting platform, combine Windows Firewall rules with provider firewall/ACLs where available.
The most common “it stopped working” case is an outdated client without proper CredSSP support. Typical symptoms include messages like “The remote computer requires Network Level Authentication…”.
From your workstation (PowerShell):
Test-NetConnection 203.0.113.10 -CommonTCPPort RDP
If TcpTestSucceeded is false, the issue is usually firewall/ACL/routing — not NLA itself.
If an old client can’t authenticate and you can’t RDP in:
Disable NLA via PowerShell (temporary):
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' `
-Name 'UserAuthentication' -Value 0
Important: Treat “NLA off” as a short troubleshooting state, not a permanent setting.
For stable day-to-day administration, run RDP with NLA on a Windows VPS and keep the network perimeter tight at the VPS hosting level.