![windows server 2016 remote desktop services windows server 2016 remote desktop services](https://c-nergy.be/blog/wp-content/gallery/win2016/RDSH_Missing_win2019Server04.png)
‘ service_description Registry_Logons_Enabled ‘ command_line $USER1$/check_nrpe -H $HOSTADDRESS$ -p 5666 -c $ARG1$” ‘ Modification History: 14-11-2018 Creation ‘ AUTHOR: Alessandro Romboli COMMENT: Script for counting values in a registry key Here is the VBS script which is executed locally on the RDS server:
#Windows server 2016 remote desktop services windows#
The most important task is to monitor your Windows 2016 RDS servers!Ī VBS script executed via the Nagios agent by the NetEye server can help monitor the problem before it can destabilize the RDS server: In a few months, RDS servers can reach more than 200,000 bloated registry items! Monitor the RDS Servers This behavior is not limited to RDS, however RDS scenarios where User Profile Disks are used may have a greater impact given that profiles are removed by default from User Profile Disks when a user disconnects. The inability to launch the Start menu or Cortana.Over time, this registry bloat can cause the following symptoms: HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable\System HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules This registry bloat can be found in the following registry keys: Due to a registry leak, the Windows Server generates registry bloat for firewall rules. Windows Server 2016 introduced the “AppContainer”, which is created when users connect to the server for the first time. 2018 Alessandro Romboli NetEye, Unified Monitoring Microsoft Remote Desktop Services 2016 Issue Remote Desktop Services 2016: The AppContainer