Download Microsoft Remote Desktop Connection Broker

Author: m | 2025-04-24

★★★★☆ (4.3 / 1066 reviews)

vm workstation 15 pro

Configuring the Microsoft Remote Desktop broker connection To configure the Microsoft Remote Desktop broker setup: 1 From the desktop menu, click System Setup, and then click Remote Connections. The Remote Connections dialog box is displayed. 2 In the Broker Setup tab, from the drop-down list, select Microsoft, and do the following: Broker

dave bautista wallpapers hd 4k ultra hd

Remote Desktop and Connection Broker

AnyViewer > How-to Articles > 3 Tested Ways to Fix Terminal Services Session Broker Client 1306 Error How can you fix Terminal Services Session Broker Client 1306 failed to redirect the user? Here in this post, we will offer you several solutions to solve this problem. If you encounter the same issue, you are going to the right place! By Ellie / Updated on December 13, 2024 Share this: What is the Terminal Services session broker client 1306 error?I got the Terminal Services Session Broker Client 1306 error. When I tried to connect directly to RDS01, even after logging in successfully, I got a message saying I didn't have access. In the event log, I saw event 1306 saying 'The Remote Desktop Connection Broker Client failed to redirect the user'. How can I fix this?”- Question from Windows ForumAfter adding a new tool to watch over remote desktop services in SCOM, certain servers commenced generating alerts featuring Event ID 1306 originating from the source TerminalServices-SessionBroker-Client in their event logs (Eventvwr > Applications and services > Microsoft > Windows > TerminalServices-SessionBroker-Client > Operational). The event's explanation denotes that "Remote Desktop Connection Broker Client failed to redirect the user. Event ID: 1306. Error: NULL".What causes the Terminal Services session broker client 1306 error?All the affected servers shared a common trait: they were equipped with the Remote Desktop Session Host role, yet lacked any RDS Collections configured. However, after adding an RDS Collection to each server and performing a re-login, the error events ceased to appear. Instead, informational events 1308 and 1301 emerged, indicating that “RD Connection Broker Client processes a request from a user.”In cases where an RDS Collection already exists, another potential cause of this error lies in the collection’s security layer.How to fix Remote Desktop Connection Broker Client failed to redirect the user [3 solutions]Here are three solutions to fix "Remote Desktop Connection Broker Client failed to redirect the user. Error: NULL".Solution 1. Create a new registry valueTo prevent session redirection to RDSH in a fresh RDS setup, adjust the default collection settings in the RD Connection Broker's registry. Begin by establishing the registry value "DefaultTsvUrl" within the path:HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\ClusterSettingsAssign the value "tsv://MS Terminal Services Plugin.1." to "DefaultTsvUrl" on the RD Connection Broker. Verify the value in Event Viewer on the RD Connection Broker.Note: It's essential to create a backup before making any changes to the registry.Solution 2. Configure RDP The latest version of our Remote Desktop Commander Suite (Version 6) now offers reporting that tracks CAP (Connection Authorization Policies) and RAP (Resource Authorization Policies) failures on your Remote Desktop Gateway servers. Why is it important to track these failures? Here are three very important reasons . . .CAP and RAP Failures on Your Remote Desktop Gateways May Be Indicative of Hack AttemptsPut simply, Remote Desktop Gateway CAPs control WHO (which users and groups) can access your Remote Desktop Services deployments, and Remote Desktop Gateway RAPs control WHAT (e.g. which computers) they can access in the deployment. If you are seeing either CAP or RAP failures in your event logs, it could be an intruder trying to gain access to your internal network’s systems. This is especially true if you are *not using* a MFA solution on your network to better validate RDS users authenticating through a Terminal Services Gateway.For instance, if you see a CAP failure (Event ID 201 in the Microsoft-Windows-TerminalServices-Gateway/Operational event log), it could indicate that an attacker has managed to successfully authenticate with one of your Remote Desktop Gateway servers, but the compromised user was not a user approved to access your RDS deployment. Or in other words, a hacker has obtained the correct username/pw combo for a user in your Active Directory, but that user is NOT authorized to use your RDS collections.In this CAP failure example, a hacker may have gotten the password for ‘CompromisedAccount’, and then attempted to authenticate through the Gateway in attempt to access other systems internal to your network.In contrast, if you see a RAP failure (Event ID 301 in the Microsoft-Windows-TerminalServices-Gateway/Operational event log), an attacker may be trying to connect to a system BEYOND your RDS deployment and has been blocked from doing so. That is more likely if you’ve already done what I’ve recommended in my book on securing RDS deployments and tightened down your RAPs. A normal user typically uses the default RDP file they obtain from your RDWeb feed. An attacker, on the other hand, could have altered an RDP file to keep your gateway server information, but instead target a non-RDS server by it’s name or IP address. In this RAP failure example, a hacker may have gotten the password for ‘CompromisedAccount’, and then attempted to access your Domain Controller or another critical server beyond your RDS deployment through the Gateway.You Could Have a Configuration Issue On Your GatewaysIt’s easy to screw up CAP and RAP policies on a Gateway. For instance, let’s say you’ve setup an RDS deployment with a single connection broker. Then, you decide to add a second connection broker and put the deployment into High Availability mode. Did you remember to visit both of your Remote Desktop Gateway servers and add the new broker to each of their RAPs? If not, users who get load balanced to the new, second broker will have problems connecting via the gateway because they’re not yet authorized to connect via the RAP.In another scenario I’ve

Published App on Remote Desktop Connection Broker - Microsoft

Seen in my consulting work, a client migrated their RDS deployment from one datacenter to another, and then had an issue with name resolution because of legacy RDP files still in use. The gateways had RAP entries for the fully qualified domain names of the session hosts, but not for their equivalent NetBIOS short names and IP addresses. As a result, some connections were working and others were not.Your End Users Could Be Using Misconfigured RDP FilesYour end users will continually cause you pain by doing things like caching copies of the RDP files they’ve downloaded to their desktop. Then, when you push changes and reconfigurations out to RDWeb via the Connection Broker, they’ll bypass RDWeb or RADC in favor of their out of date RDP file already stashed on their desktop. That, in turn, can generate RAP failures and/or connection broker connection request failures. If you’re monitoring CAP/RAP failures and connection broker failures, you can make a list of the “wayward children” who need to get a tap on the shoulder!The Takeaway – You Need Automated Collection and Reporting of Remote Desktop Gateway CAP and RAP FailuresIn busy deployments, the Microsoft-Windows-TerminalServices-Gateway/Operational event log wraps VERY quickly. I’ve seen these logs wrap within an hour, because no one remembers to boost their retention settings via Group Policy. And even if you fix the retention, consolidating things by username or by gateway server to make sense of it all will take some doing, even if you do have a SIEM or other log aggregation solution in place.Our Remote Desktop Commander Suite solution automates all of this for you.First, it continually collects CAP, RAP and other informational events from your Remote Desktop Gateways and stores them in its SQL database. Doing so allows you to produce reports like these on demand or on a scheduled basis with powerful filtering capabilities around usernames and server names.Secondly, it has a Top Level Deployment Status Dashboard where you can continually keep your eye on Remote Desktop Gateway health, current connection count, recent connection failures, plus summon reports like those above with just two mouse clicks. To give you an idea of that dashboard’s power, please watch this video below (remember to expand it to full screen!)The Remote Desktop Commander Suite can monitor and report on your gateways for only $11.49 per server per month, with volume discounts available. Contact our sales team for more information or to set up a demo. -->. Configuring the Microsoft Remote Desktop broker connection To configure the Microsoft Remote Desktop broker setup: 1 From the desktop menu, click System Setup, and then click Remote Connections. The Remote Connections dialog box is displayed. 2 In the Broker Setup tab, from the drop-down list, select Microsoft, and do the following: Broker

Remote Desktop Connection Broker Monitoring

Skip to main contentSkip to in-page navigation This browser is no longer supported. Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. -->Remove-RDVirtualDesktopFromCollection Reference Removes virtual desktops from a virtual desktop collection. Syntax Remove-RDVirtualDesktopFromCollection [-CollectionName] -VirtualDesktopName [-ConnectionBroker ] [-Force] [-WhatIf] [-Confirm] [] Description The Remove-RDVirtualDesktopFromCollection cmdlet removes one or more virtual desktops from a virtual desktop collection. Examples Example 1: Remove a virtual desktop from a virtual desktop collection PS C:\> Remove-RDVirtualDesktopFromCollection -CollectionName "Virtual Desktop Pool" -VirtualDesktopName @("RDS-WKS-A27") -ConnectionBroker "rdcb.contoso.com" This command removes the virtual desktop named "RDS-WKS-A27" from the virtual desktop collection named "Virtual Desktop Pool". Parameters-CollectionName Specifies the name of a virtual desktop collection. Type:String Position:0 Default value:None Required:True Accept pipeline input:True Accept wildcard characters:False -Confirm Prompts you for confirmation before running the cmdlet. Type:SwitchParameter Aliases:cf Position:Named Default value:False Required:False Accept pipeline input:False Accept wildcard characters:False -ConnectionBroker Specifies the Remote Desktop Connection Broker (RD Connection Broker) server for a remote desktop deployment.If you do not specify a value, the cmdlet uses the fully qualified domain name (FQDN) of the local computer. Type:String Position:Named Default value:None Required:False Accept pipeline input:False Accept wildcard characters:False -Force Forces the command to run without asking for user confirmation. Type:SwitchParameter Position:Named Default value:None Required:False Accept pipeline input:False Accept wildcard characters:False -VirtualDesktopName Specifies an array of names of virtual desktops. Type:String[] Position:Named Default value:None Required:True Accept pipeline input:False Accept wildcard characters:False -WhatIf Shows what would happen if the cmdlet runs.The cmdlet is not run. Type:SwitchParameter Aliases:wi Position:Named Default On This Page :What Is Microsoft Remote Desktop?Microsoft Remote Desktop Download and Install on Windows 10/11Download Microsoft Remote Desktop for Mac, iPhone, AndroidHow to Use Microsoft Remote Desktop to Connect a Remote PCBottom Line"> Home News Microsoft Remote Desktop Download/Connection on Windows 10/11 By Alisa | Last Updated August 30, 2022 This post teaches you how to download and install Microsoft Remote Desktop for Windows 10/11, Mac, Android, or iPhone. Also learn how to use Remote Desktop to connect a remote PC to access the PC anywhere. For more computer tips and useful tools, you may visit MiniTool Software official website.On This Page :What Is Microsoft Remote Desktop?Microsoft Remote Desktop Download and Install on Windows 10/11Download Microsoft Remote Desktop for Mac, iPhone, AndroidHow to Use Microsoft Remote Desktop to Connect a Remote PCBottom LineThis post introduces Microsoft Remote Desktop and teaches you how to get Microsoft Remote Desktop downloaded for your Windows 10/11 PC, Mac, iPhone, or Android. Use Microsoft Remote Desktop to easily connect a remote PC and access apps and other content on it.What Is Microsoft Remote Desktop?Microsoft develops a propriety protocol named Remote Desktop Protocol (RDP) to help users easily connect to another remote computer. Users can use RDP client software to connect to a remote PC that runs RDP server software. Microsoft provides the official RDP client software – Remote Desktop Connection or Remote Desktop Services – in Windows OS. And the RDP servers are built into Windows OS.Windows 10/11 comes with a built-in Remote Desktop Connection feature that lets you easily connect to a remote PC or a virtual machine over a network connection. A standalone Remote Desktop app is also available for download. Microsoft Remote Desktop app is available on PC, mobile device, Hub, and HoloLens.Microsoft Remote Desktop Download and Install on Windows 10/11If you’d like to download the Microsoft Remote Desktop app on Windows 10/11 and use it to connect a remote PC or virtual apps/desktops, you can easily get it from Microsoft Store.Open the Microsoft Store app or go to the Microsoft Store website.Search for Microsoft Remote Desktop to get to its

Remote Desktop Connection Broker with SmartCard

First published on CloudBlogs on Dec 15, 2015 Hi everyone, this is Christian Montoya from the Remote Desktop team. I am writing to let you know of performance improvements we have made to the Remote Desktop (RD) Connection Broker in both Windows Server 2016 Technical Preview 4 and Windows Server 2012 R2 (with Hotfix KB3091411 ). In particular, we have made changes to the connection-handling logic of the RD Connection Broker to significantly improve the performance. Internal testing of the RD Connection Broker connection-handling code shows a significant improvement during logon storms and when adding/restarting RD Session Host servers to a farm. We also see similar improvements through internal testing of the end to end connection scenario via the Windows RD client (MSTSC). Specific results include: Logon Storm 100% connection success with initial burst of 100 connections at a rate of 2 connections per second 0.2 second average connection time through RD Connection Broker, down from over a minute RDSH Add/Restart 100% success adding/restarting servers at rate of 1 server per second with 5 sessions per server 2 second average add/restart time, down from over thirty minutes MSTSC End to End 100% connection success at a rate of 100 connections per minute 25 second average connection time, down from over seven minutes More scale testing is currently being done for the new RD Connection Broker in Windows Server 2016 and we hope to provide a white paper shortly. We are excited to also share these improvements with you for use on your Windows Server 2012 R2 Remote Desktop Services deployments. For the hotfix itself and for more information, see the KB article here . We hope you will take full advantage of these significant improvements to the RD Connection Broker in Windows Server 2016 and Windows Server 2012 R2. Note: Questions and comments are welcome. However, please DO NOT post a request for troubleshooting by using the comment tool at the end of this post. Instead, post a new thread in the RDS & TS forum . Thank you!

Install Remote Desktop Connection Broker

Pro Tips with Esben #3In this installment of Pro Tips, I’m covering Remote Desktop Services. While you’re probably familiar with the RDS, today I’ll be covering why and how you can keep an eye on the status of Remote Desktop Services in your environment.Remote Desktop ServicesRemote Desktop Services (RDS) is a Microsoft platform designed for virtualization. While RDS is primarily used to provide secure, remote desktop access, it can also be used for virtualized applications and allowing end-users to run their applications and desktops from the cloud.With the shift to remote working, more and more companies are relying on these types of services to provide their employees with all the tools they need. Aside from that, system administrators are more than familiar enough with jumping around from remote session to remote session to manage their servers.Manage Your Remote Desktop Services ServersA Remote Desktop Services environment relies on three server components. An RD Connection Broker server, RD Web Access server, and RD Session Host server. These roles can either be split up between multiple servers or all reside on one server. Regardless, it might be interesting to keep an eye on them as they ensure that your environment keeps running.By using the Role data that Lansweeper scans (hidden in the Software/Features tab of the asset page), you can see which roles are installed on a server. I’ve created a report that lists all servers that have the RD Connection Broker server role, RD Web Access server role, or RD Session Host server role installed.As a little bonus, you can enable performance scanning on these assets, and the performance columns in the report will also be filled up.TermService StatusThe service required to support remote desktop connections is called TermService. However, in Windows it is listed as Remote Desktop Services, just to make things a little bit more confusing.For machines that people need to connect to, you’ll want this enabled. However, the opposite is also true, if you don’t need anyone to connect to a specific device, the Remote Desktop Services service, doesn’t need to be running. We’ve already had the so-called BlueKeep vulnerability in the past that affected the Remote Desktop Services service, so it is better to know where it is enabled than be in the dark.The Remote Desktop Services Overview report can help you here by giving you an overview of all the machines that have the TermService and the status of that service. That way you can check for yourself if you’ve got any machines that are not configured correctly.. Configuring the Microsoft Remote Desktop broker connection To configure the Microsoft Remote Desktop broker setup: 1 From the desktop menu, click System Setup, and then click Remote Connections. The Remote Connections dialog box is displayed. 2 In the Broker Setup tab, from the drop-down list, select Microsoft, and do the following: Broker

Tag: Remote Desktop Connection Broker

Download page.Click the Get button to get Microsoft Remote Desktop downloaded to your Windows 10/11 PC.After that, you can click the downloaded installation file to follow the instructions to install the Remote Desktop app.The system requirement of Microsoft Remote Desktop is Windows 10 version 16299.0 or higher, Xbox, Windows 8 Mobile, and Windows 8.1.Download Microsoft Remote Desktop for Mac, iPhone, AndroidFor Mac users, you can open the Mac App Store, search for Microsoft Remote Desktop to download and install this app on your Mac computer.To get the Remote Desktop app for Android devices, you can open Google Play Store on your device, search and download the Remote Desktop app.To install Remote Desktop on iPhone/iPad, you can open App Store on your device to search, download, and install the Remote Desktop app.To access your computer from your iPhone/iPad or Android, you can open the Remote Desktop app, tap the “+” icon at the top-right corner and select Add PC. Then you can enter your computer name or IP address in the PC Name field. After this, you can access your PC from your iPhone or Android device.How to Use Microsoft Remote Desktop to Connect a Remote PCFor Windows 10:You need to run Windows 10 Pro. Click Start -> Settings -> System -> Remote Desktop, and turn on the Enable Remote Desktop feature of the computer you want to connect remotely. Click About in the left panel and take down the name of the computer next to Device name.Then you can press Windows + S on your local PC, type remote desktop connection in the search box, and select Remote Desktop Connection. In the Remote Desktop Connection window, you can type the name of the PC that you took down above. Click Connect to connect the PC.For Windows 11:You need to run Windows 11 Pro. Click Start -> Settings -> System, and select Remote Desktop. Turn on the Remote Desktop option and click Confirm to enable remote desktop on Windows 11. Still, note down the name of the remote PC.Next, on your local PC, you can click Start, type remote desktop connection

Comments

User3598

AnyViewer > How-to Articles > 3 Tested Ways to Fix Terminal Services Session Broker Client 1306 Error How can you fix Terminal Services Session Broker Client 1306 failed to redirect the user? Here in this post, we will offer you several solutions to solve this problem. If you encounter the same issue, you are going to the right place! By Ellie / Updated on December 13, 2024 Share this: What is the Terminal Services session broker client 1306 error?I got the Terminal Services Session Broker Client 1306 error. When I tried to connect directly to RDS01, even after logging in successfully, I got a message saying I didn't have access. In the event log, I saw event 1306 saying 'The Remote Desktop Connection Broker Client failed to redirect the user'. How can I fix this?”- Question from Windows ForumAfter adding a new tool to watch over remote desktop services in SCOM, certain servers commenced generating alerts featuring Event ID 1306 originating from the source TerminalServices-SessionBroker-Client in their event logs (Eventvwr > Applications and services > Microsoft > Windows > TerminalServices-SessionBroker-Client > Operational). The event's explanation denotes that "Remote Desktop Connection Broker Client failed to redirect the user. Event ID: 1306. Error: NULL".What causes the Terminal Services session broker client 1306 error?All the affected servers shared a common trait: they were equipped with the Remote Desktop Session Host role, yet lacked any RDS Collections configured. However, after adding an RDS Collection to each server and performing a re-login, the error events ceased to appear. Instead, informational events 1308 and 1301 emerged, indicating that “RD Connection Broker Client processes a request from a user.”In cases where an RDS Collection already exists, another potential cause of this error lies in the collection’s security layer.How to fix Remote Desktop Connection Broker Client failed to redirect the user [3 solutions]Here are three solutions to fix "Remote Desktop Connection Broker Client failed to redirect the user. Error: NULL".Solution 1. Create a new registry valueTo prevent session redirection to RDSH in a fresh RDS setup, adjust the default collection settings in the RD Connection Broker's registry. Begin by establishing the registry value "DefaultTsvUrl" within the path:HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\ClusterSettingsAssign the value "tsv://MS Terminal Services Plugin.1." to "DefaultTsvUrl" on the RD Connection Broker. Verify the value in Event Viewer on the RD Connection Broker.Note: It's essential to create a backup before making any changes to the registry.Solution 2. Configure RDP

2025-04-24
User6911

The latest version of our Remote Desktop Commander Suite (Version 6) now offers reporting that tracks CAP (Connection Authorization Policies) and RAP (Resource Authorization Policies) failures on your Remote Desktop Gateway servers. Why is it important to track these failures? Here are three very important reasons . . .CAP and RAP Failures on Your Remote Desktop Gateways May Be Indicative of Hack AttemptsPut simply, Remote Desktop Gateway CAPs control WHO (which users and groups) can access your Remote Desktop Services deployments, and Remote Desktop Gateway RAPs control WHAT (e.g. which computers) they can access in the deployment. If you are seeing either CAP or RAP failures in your event logs, it could be an intruder trying to gain access to your internal network’s systems. This is especially true if you are *not using* a MFA solution on your network to better validate RDS users authenticating through a Terminal Services Gateway.For instance, if you see a CAP failure (Event ID 201 in the Microsoft-Windows-TerminalServices-Gateway/Operational event log), it could indicate that an attacker has managed to successfully authenticate with one of your Remote Desktop Gateway servers, but the compromised user was not a user approved to access your RDS deployment. Or in other words, a hacker has obtained the correct username/pw combo for a user in your Active Directory, but that user is NOT authorized to use your RDS collections.In this CAP failure example, a hacker may have gotten the password for ‘CompromisedAccount’, and then attempted to authenticate through the Gateway in attempt to access other systems internal to your network.In contrast, if you see a RAP failure (Event ID 301 in the Microsoft-Windows-TerminalServices-Gateway/Operational event log), an attacker may be trying to connect to a system BEYOND your RDS deployment and has been blocked from doing so. That is more likely if you’ve already done what I’ve recommended in my book on securing RDS deployments and tightened down your RAPs. A normal user typically uses the default RDP file they obtain from your RDWeb feed. An attacker, on the other hand, could have altered an RDP file to keep your gateway server information, but instead target a non-RDS server by it’s name or IP address. In this RAP failure example, a hacker may have gotten the password for ‘CompromisedAccount’, and then attempted to access your Domain Controller or another critical server beyond your RDS deployment through the Gateway.You Could Have a Configuration Issue On Your GatewaysIt’s easy to screw up CAP and RAP policies on a Gateway. For instance, let’s say you’ve setup an RDS deployment with a single connection broker. Then, you decide to add a second connection broker and put the deployment into High Availability mode. Did you remember to visit both of your Remote Desktop Gateway servers and add the new broker to each of their RAPs? If not, users who get load balanced to the new, second broker will have problems connecting via the gateway because they’re not yet authorized to connect via the RAP.In another scenario I’ve

2025-03-30
User1701

Seen in my consulting work, a client migrated their RDS deployment from one datacenter to another, and then had an issue with name resolution because of legacy RDP files still in use. The gateways had RAP entries for the fully qualified domain names of the session hosts, but not for their equivalent NetBIOS short names and IP addresses. As a result, some connections were working and others were not.Your End Users Could Be Using Misconfigured RDP FilesYour end users will continually cause you pain by doing things like caching copies of the RDP files they’ve downloaded to their desktop. Then, when you push changes and reconfigurations out to RDWeb via the Connection Broker, they’ll bypass RDWeb or RADC in favor of their out of date RDP file already stashed on their desktop. That, in turn, can generate RAP failures and/or connection broker connection request failures. If you’re monitoring CAP/RAP failures and connection broker failures, you can make a list of the “wayward children” who need to get a tap on the shoulder!The Takeaway – You Need Automated Collection and Reporting of Remote Desktop Gateway CAP and RAP FailuresIn busy deployments, the Microsoft-Windows-TerminalServices-Gateway/Operational event log wraps VERY quickly. I’ve seen these logs wrap within an hour, because no one remembers to boost their retention settings via Group Policy. And even if you fix the retention, consolidating things by username or by gateway server to make sense of it all will take some doing, even if you do have a SIEM or other log aggregation solution in place.Our Remote Desktop Commander Suite solution automates all of this for you.First, it continually collects CAP, RAP and other informational events from your Remote Desktop Gateways and stores them in its SQL database. Doing so allows you to produce reports like these on demand or on a scheduled basis with powerful filtering capabilities around usernames and server names.Secondly, it has a Top Level Deployment Status Dashboard where you can continually keep your eye on Remote Desktop Gateway health, current connection count, recent connection failures, plus summon reports like those above with just two mouse clicks. To give you an idea of that dashboard’s power, please watch this video below (remember to expand it to full screen!)The Remote Desktop Commander Suite can monitor and report on your gateways for only $11.49 per server per month, with volume discounts available. Contact our sales team for more information or to set up a demo. -->

2025-04-22
User5347

Skip to main contentSkip to in-page navigation This browser is no longer supported. Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. -->Remove-RDVirtualDesktopFromCollection Reference Removes virtual desktops from a virtual desktop collection. Syntax Remove-RDVirtualDesktopFromCollection [-CollectionName] -VirtualDesktopName [-ConnectionBroker ] [-Force] [-WhatIf] [-Confirm] [] Description The Remove-RDVirtualDesktopFromCollection cmdlet removes one or more virtual desktops from a virtual desktop collection. Examples Example 1: Remove a virtual desktop from a virtual desktop collection PS C:\> Remove-RDVirtualDesktopFromCollection -CollectionName "Virtual Desktop Pool" -VirtualDesktopName @("RDS-WKS-A27") -ConnectionBroker "rdcb.contoso.com" This command removes the virtual desktop named "RDS-WKS-A27" from the virtual desktop collection named "Virtual Desktop Pool". Parameters-CollectionName Specifies the name of a virtual desktop collection. Type:String Position:0 Default value:None Required:True Accept pipeline input:True Accept wildcard characters:False -Confirm Prompts you for confirmation before running the cmdlet. Type:SwitchParameter Aliases:cf Position:Named Default value:False Required:False Accept pipeline input:False Accept wildcard characters:False -ConnectionBroker Specifies the Remote Desktop Connection Broker (RD Connection Broker) server for a remote desktop deployment.If you do not specify a value, the cmdlet uses the fully qualified domain name (FQDN) of the local computer. Type:String Position:Named Default value:None Required:False Accept pipeline input:False Accept wildcard characters:False -Force Forces the command to run without asking for user confirmation. Type:SwitchParameter Position:Named Default value:None Required:False Accept pipeline input:False Accept wildcard characters:False -VirtualDesktopName Specifies an array of names of virtual desktops. Type:String[] Position:Named Default value:None Required:True Accept pipeline input:False Accept wildcard characters:False -WhatIf Shows what would happen if the cmdlet runs.The cmdlet is not run. Type:SwitchParameter Aliases:wi Position:Named Default

2025-03-25

Add Comment