Far off work area convention (RDP) is the accepted authoritative reassure access, and it might be important to make it considerably safer by changing the TCP port utilized for the system get to. It’s additionally helpful when the distant PC is behind firewall which doesn’t permit approaching and active associations other than standard ports or clients unfit to design the port sending for Remote Desktop in the event that they’re behind firewall or switch’s NAT. you can also allow remote desktop with rdp port now.
RDP transports on TCP 3389 as a matter of course for every bolstered rendition of Windows; in the event that you need to change the port, it requires a snappy change in the Windows vault.
Note: Editing the library is dangerous, so be certain you have a confirmed reinforcement before sparing any changes.
Microsoft has a Knowledge Base article KB306759 that subtleties how to alter and change the Remote Desktop listening port by changing vault esteem.
Start Registry Editor by tapping on Start - > Run, and type in regedit in the Run text box, and afterward press Enter or snap OK.
Explore to the accompanying library branch/subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Terminal Server\WinStations\RDP-Tcp
Find the library passage PortNumber in the correct sheet.
Right snap on PortNumber and pick Modify (or select PortNumber, at that point click on Edit menu and select Modify).
On the “Alter DWORD Value” window, click on Decimal.
The default port task is spoken to as d3d in hexadecimal or 3389 in decimal.
Type in the new port number (for example 3390) on the Value Data text box.
Snap OK when done.
It might require a reboot to make the port task produce results. When the framework is tuning in on the new port, associations need to determine the new port in the RDP customer properties, as appeared in following picture.
The Windows Server framework will presently tune in on the new port with the Svchost.exe procedure, obvious in task chief by entering Netstat - a - n - o to see the current procedures and rundown the related executable.