Shadow mode for the remote desktop
To support me, you can subscribe to the channel, share and like the videos, disable your ad blocker or make a donation. Thank you!
Hello,
Remote Desktop Shadow mode will allow you to connect without disconnecting the current user.
Prerequisites
- Enable remote desktop (RDP) on the workstation
- Enable shadow remote desktop functionality
- Allow remote desktop and remote administration at firewall level
- Have an administrator account on the remote computer.
Powershell configuration of remote desktop shadow mode.
UAC remote restriction documentation: https://docs.microsoft.com/en-us/troubleshoot/windows-server/windows-security/user-account-control-and-remote-restriction
Video : Shadow mode for the remote desktop
Related links
Windows - Get remote help easily with Quick Assist
Get help easily from a distance with Quick Assist on Windows 10 and 11How to customise the Send To menu in Windows Explorer
Customise the Send To menu in Windows ExplorerLaunch software on login with a simple shortcut
Launch software on login with a simple shortcutWindows shortcuts and their settings
A video on Windows shortcuts and their settingsMicrosoft PowerToys tool
PowerToys from Microsoft is a set of tools to help you run Windows more efficientlyHow to add shortcuts on the desktop of different users under Windows 10 and 11
How to add shortcuts on the desktop of different users under Windows 10 and 11
Follow me on
Support me
Last content
Powershell - Managing IP configuration of network interfaces
Powershell - Managing the status and configuration of network interfaces
Powershell and the Left Hand Side
Powershell - Managing disks, partitions and volumes
Powershell - Managing System Restore Points in Windows
Powershell - Playing with the Windows clipboard
Powershell - Changing the state of a computer (sleep, hibernate, shutdown, restart)
Powershell - Compress-Archive and Expand-Archive to create and extract ZIP archives
Powershell - Export-Csv versus Export-Clixml
Powershell - Overview of Where-Object basic syntax and its limitations