Share via

Azure Local RDP

Handian Sudianto 7,026 Reputation points
2026-04-23T12:37:09.77+00:00

We can manage the Azure Local using WAC on the azure portal but when connect to the VM using WAC then RDP on the azure local node should be enabled.

How we can enabled the RDP but limit only can connect from WAC on the azure and block RDP access from the rest including from LAN?

Azure Local

2 answers

Sort by: Most helpful
  1. Ankit Yadav 14,005 Reputation points Microsoft External Staff Moderator
    2026-04-23T13:30:36.7833333+00:00

    Hello Handian Sudianto,

    You cannot restrict RDP to only WAC using firewall/IP rules. The correct approach is to disable direct RDP and use Azure Arc (RDP over SSH) for secure access.

    Here's a bit more detailed explanation on why:

    **How WAC connects :
    **WAC does not use fixed IP addresses. It connects either via:

    Azure Arc (secure, tunneled access), or

    Regular RDP (if enabled)

    Because there are no fixed IPs, you cannot allow “only WAC” via firewall rules.

    **
    Why your approach won’t work**

    • Firewall rules work with IPs or ranges.
    • WAC traffic doesn’t come from a known/static range.
    • So you can’t allow WAC and block everything else using RDP rules.

    Recommended solution: Use Azure Arc RDP over SSH

    • RDP is tunneled securely via Azure Arc
    • Port 3389 is not exposed to LAN or internet
    • No inbound RDP firewall rules needed
    • Access is controlled via Azure identity (secure)

    This gives you remote access without opening RDP at all.

    Best practices:

    • Disable direct RDP (port 3389)
    • Use Azure Arc for access
    • Optionally use identity controls like Just-In-Time (JIT)

    References:

    0 comments No comments

  2. Q&A Assist
    2026-04-23T12:37:26.3+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    On Azure Local nodes, RDP is disabled by default for security and can be enabled or disabled centrally, but the platform guidance is to keep RDP closed to general network access and use more secure remote-management paths (WAC, SSH over Arc, VPN) instead of exposing RDP.

    For Azure Local specifically:

    1. Enable RDP on the node only when needed
      1. From a management PC, run PowerShell as administrator.
      2. Start a remote PowerShell session to the Azure Local node:
              $ip = "<IP address of the Azure Local machine>"
              Enter-PSSession -ComputerName $ip -Credential Get-Credential
        
      3. Enable RDP on the node:
              Enable-ASRemoteDesktop
        
      4. When finished with troubleshooting or configuration, disable RDP again:
              Disable-ASRemoteDesktop
        
      This follows the security recommendation to keep RDP disabled when not needed.
    2. Restrict RDP exposure instead of leaving it open The documentation does not provide a built-in mode where RDP is enabled but only reachable from WAC in Azure while blocked from LAN. Instead, the recommended pattern is:
      • Keep direct RDP/SSH from the internet disabled.
      • Use secure management channels (for example, Windows Admin Center via Azure Arc connectivity, SSH over Azure Arc, or VPN) rather than exposing RDP.
      For Azure VMs in general, the guidance is to avoid direct RDP/SSH exposure and use a point-to-site VPN or similar so that only authenticated management clients can reach the VM. The same principle applies to Azure Local nodes: do not open RDP broadly on the LAN; instead, use WAC/Arc connectivity and only temporarily enable RDP for specific maintenance, then disable it again.

    Because the platform does not document a configuration where RDP is permanently enabled but reachable only from WAC and blocked from all LAN sources, the supported and recommended approach is:

    • Use WAC in Azure portal (via Azure Arc connectivity) for normal management.
    • When interactive desktop access is required, temporarily enable RDP with Enable-ASRemoteDesktop, perform the task, then disable it with Disable-ASRemoteDesktop.

    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.