Tech Tip: Enable Concurrent Desktop Sessions in Windows

This work only with local user account not in a domain with AD users.... no good!!
and yes. it break the license agreement!!
 
Actually you can use something like logmein or Ammyy Admin in case if it a one-time connection.
 
Thankyou so much.. This is what I've been looking for.. And it's worked for me!! Thank you! (y)(y)(y):)
 
Actually it can work with domain users just fine.

Been running for well over a year, however after running windows updates just now, it seems to not be working anymore :(

Will probably try a repatch.
 
Actually it can work with domain users just fine.

Been running for well over a year, however after running windows updates just now, it seems to not be working anymore :(

Will probably try a repatch.

Repatch didn't work... ran the install.cmd and it said "Patched Already ,Config Editing..."

Trying to log on another user now prompts to kick first user.
 
Repatch didn't work... ran the install.cmd and it said "Patched Already ,Config Editing..."

Trying to log on another user now prompts to kick first user.

I believe it to be one of these treacherous updates
alrALhh.png
 
1. control panel/programs/programs & features/view installed updates
2. find 2984972 in the list, right click, uninstall
3. you'll now need to reboot
4. control panel/windows update/check for updates
5. wait for the check, takes a while
6. click the important update(s) link
7. untick 2984972, right click and 'hide update'

That's it now this update shouldn't be applied in any future auto updates.
 
The MS update 2984972 will break this patch.

Until the patch on this blog is updated, you can roll back MS patch 2984972 by doing the above... (make sure you don't need restricted admin logons support2.microsoft.com/kb/2984972)
 
The MS update 2984972 will break this patch.

Until the patch on this blog is updated, you can roll back MS patch 2984972 by doing the above... (make sure you don't need restricted admin logons support2.microsoft.com/kb/2984972)

Your the man, this solves the problem. Thanks
 
Wow, Nov 2014 patch Tuesday breaks this too!

KB 3003743 - this update does have security implications that would be nice to have. Basically, from what I understand, the vulnerability that is patched here was one enabling an attacker to bypass log on logging which in turn meant limits on number of failed login attempts can be bypassed.

Thus, unfortunately not a good idea to reject this update on internet facing RDP machines unless you have very strong passwords. I would also imagine adding two factor authentication if you reject this patch with something like duo security would mitigate the main value of a remote attacker getting a password through brute force.
 
Back