We are facing an issue with a Windows Server 2022 Datacenter Azure Edition v2 VM where Remote Desktop (RDP) port 3389 is not listening, despite all expected configurations being in place. This prevents RDP connections to the system.
Niket Kumar Singh
715
Reputation points
System Context
- OS: Windows Server 2022 Datacenter, Azure Edition (v2)
- Scenario: The original VM failed to allow RDP. A rescue VM was created with Hyper-V, and the original VM’s OS disk was attached as a passthrough disk. The affected OS boots and functions inside the Hyper-V guest.
- Edition-Specific Note: The guest VM is booted using the Azure Edition image, not within Azure (which may impact IMDS-based activation or Azure Benefits).
RDP Config:
- RDP enabled via
sconfig
(Option 7 shows: “Enabled (all clients)”) - Port 3389 is set correctly under : HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
-
SecurityLayer
value is2
(SSL/TLS), tested with values0
,1
, and2
.
- Service State:
-
TermService
andUmRdpService
are both running. - RDP listener
RDP-Tcp
is present in the registry. -
qwinsta
shows an activeconsole
session forazureuser
.
-
- Firewall:
- All RDP firewall rules (TCP-In/UDP-In) are enabled and allow traffic.
- No 3rd party security products are installed or interfering.
- Port Binding Failure:
-
netstat -an | findstr ":3389"
returns nothing — port 3389 is not bound. -
Test-NetConnection -ComputerName localhost -Port 3389
fails. -
Get-NetTCPConnection -LocalPort 3389
shows no bindings. - No events in the System/EventLog clearly identify binding failure.
-
- RDP Certificate (RCM): HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM
- both
Certificate
andCertificateOld
REG_BINARY
values were present. - Deleting both keys and restarting
TermService
did not resolve the issue — RDP still failed to bind to 3389.
- both
- ProfileList Registry : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList No corrupt or orphaned profile entries were found, suggesting no FSLogix or profile-related blockages.
Action Taken :
- Verified all registry entries related to RDP port and listener.
- Set
AllowTSConnections = 1
using WMI. - Set
SecurityLayer = 0
for negotiation fallback. - Confirmed no alternate services were using port 3389.
- Deleted
Certificate
andCertificateOld
entries inRCM
, restarted RDP service. - Restarted the guest OS and verified again with
netstat
,qwinsta
, andTest-NetConnection
. - Checked firewall rules in detail – all enabled and unrestricted.
- Verified that no RDS licensing misconfigurations, GPOs, or RDS role services were blocking listener registration.
- Ran DISM and CBS scans – no errors affecting RDP functionality found.
- Reviewed
subinacl
permissions onTermService
— matched with a working reference machine.
We seek clarification and guidance on:
- Why the RDP listener on port 3389 is not registering despite services running and all registry, firewall, and certificate configurations being present?
- Are there RDP/SSL binding constraints specific to Azure Edition v2 images, especially when not running in Azure?
- Are there additional certificate requirements (e.g., from IMDS or Windows Activation Services) that block listener registration?
- Are there any hidden logs, ETW providers, or advanced diagnostics that can reveal why the listener registration is failing silently?
Azure Virtual Machines
Azure Virtual Machines
An Azure service that is used to provision Windows and Linux virtual machines.
9,035 questions
Sign in to answer