Skip to content
Tech Master Tech Master

OneStopTechnical Forum

  • Books
  • AI
  • Networking
  • Windows
  • Linux
  • Cloud
  • Mac
  • Active Directory
  • Azure
  • Cloud
  • Exchange
  • M365
  • Server 2025
  • Storage
  • Vsphere
  • Website
  • Database
  • Security
  • Knowledge Base
  • VPN
Tech Master
Tech Master

OneStopTechnical Forum

Network Level Authentication (NLA) in Windows Server

blog.payperitem.com, April 12, 2025

To disable Network Level Authentication (NLA) in Windows Server, you have several options depending on whether you can access the server locally, via RDP, or only through Safe Mode or offline registry. Below are the most common methods:


✅ Method 1: Disable NLA via System Properties (GUI)

  1. Log into the server locally or via RDP.
  2. Press Win + R → type SystemPropertiesRemote.exe → Enter.
  3. Under Remote Desktop, uncheck: “Allow connections only from computers running Remote Desktop with Network Level Authentication (recommended)”
  4. Click Apply → OK.

✅ Method 2: Disable NLA via Registry (regedit)

  1. Open regedit.exe.
  2. Navigate to: pgsql
  3. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
  4. Find the value:
    • UserAuthentication → Double-click and set to 0.
  5. Reboot the server.

✅ Method 3: Disable NLA via PowerShell

Run this in an elevated PowerShell session:

powershell

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" -Name "UserAuthentication" -Value 0

Optional (ensure RDP is enabled):

powershell

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server" -Name "fDenyTSConnections" -Value 0
Enable-NetFirewallRule -DisplayGroup "Remote Desktop"

✅ Method 4: Disable NLA via Group Policy

  1. Run gpedit.msc.
  2. Navigate to:
  3. pgsql
  4. Computer Configuration → Administrative Templates → Windows Components → Remote Desktop Services → Remote Desktop Session Host → Security
  5. Set “Require user authentication for remote connections by using Network Level Authentication” to Disabled.
  6. Run gpupdate /force.

🛠️ Offline or Recovery Mode (if locked out)

If you’re locked out due to NLA and cannot RDP, you can:

  1. Boot into Safe Mode with Networking (F8 or Shift+Restart).
  2. Then disable NLA via registry or PowerShell as shown above.
    • OR mount the drive offline on another machine and edit the registry manually.

Active Directory Security Windows

Post navigation

Previous post
Next post

Related Posts

Deep insight knowledge of lansweeper

April 4, 2025April 4, 2025

Lansweeper is a popular network management and IT asset discovery tool used by organizations to manage their IT infrastructure more effectively. It provides capabilities for network scanning, asset management, reporting, and troubleshooting. Below is a deep dive into its functionalities, features, and best practices for deploying and utilizing Lansweeper in…

Read More
Windows

How to close an unresponsive app in Windows

January 21, 2025January 26, 2025

We’ve all been there. You’re working on an important document or playing your favorite game, and suddenly, the application freezes. The window becomes unresponsive; no matter how much you click or tap, it just sits there. While it’s frustrating, there are several methods you can use to close unresponsive applications…

Read More
Active Directory

LAPS: Automatically generate admin accounts, use passphrases, enable rollback detection

March 8, 2025April 2, 2025

Since Windows 11 23H2, the Local Administrator Password Solution (LAPS) has been integrated into the OS and 24H2 brought some interesting innovations. These include the automatic management of local admin accounts, the use of passphrases and the generation of a new password when the computer is reset. LAPS is designed…

Read More

Recent Posts

  • List of AD Schema Versions
  • OldNewExplorer Free Download For Windows 11, 10, 8 and 7 [Latest Version]
  • How to Get the Classic (old) Context Menu on Windows 11
  • BitLocker Recovery Keys
  • Active Directory and Server hardening

Recent Comments

No comments to show.
June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« May    
Log in
©2025 Tech Master | WordPress Theme by SuperbThemes
  • Login
  • Sign Up
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }