Microsoft Remote Desktop 0x3000067

Use Microsoft Remote Desktop for Mac to connect to a remote PC or virtual apps and desktops made available by your admin. With Microsoft Remote Desktop, you can be productive no matter where you are. Configure your PC for remote access using the information at https://aka.ms/rdsetup. Nov 30, 2018 Hi Jake! Check this from another user: I have checked with our Admin and turns out that we have VPN. So, I had to connect to VPN first. Now everything is working fine with the new Microsoft Remote Desktop. Oct 29, 2020 After a reboot i got the message 'Your computer cant connect to the Remote Desktop Gateway'. I checked the services were running for Remote Desktop. Server 2016 (RDG.domain.com) Applied Global Cert Remote Desktop Gateway/Licensing server port: 3390.

This forum is for Apple's Remote Desktop and therefore not for you. Microsoft's Remote Desktop forum is here:


Microsoft remote desktop mac 0x204Microsoft remote desktop for mac


You should have a word with your network administrator and ask them the question. FWIW I think there's a certificate or a protocol setting that needs to be configured somewhere that will allow your Mac to 'pass-through'. This could be something built-in on a PC or pre-configured when your IT department roll out the setting to their PC clients. Be patient and persistent and don't let them fob you off simply because you're on a Mac and not a PC. They should be supporting you properly irrespective of platform. It's their job after all

Desktop


Apr 3, 2020 4:17 AM

TodayMicrosoft released a set of fixes for Remote Desktop Services that include twocritical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Likethe previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that anyfuture malware that exploits these could propagate from vulnerable computer tovulnerable computer without user interaction.

The affected versions of Windows are Windows 7 SP1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, and all supported versions of Windows 10, including server versions.

Windows XP, Windows Server 2003, and Windows Server 2008 are not affected, nor isthe Remote Desktop Protocol (RDP) itself affected.

These vulnerabilitieswere discovered by Microsoft during hardening of Remote Desktop Services aspart of our continual focus on strengthening the security of our products. Atthis time, we have no evidence that these vulnerabilities were known to anythird party.

Microsoft

It is important that affected systems are patched as quickly as possible because of the elevated risks associated with wormable vulnerabilities like these, and downloads for these can be found in the Microsoft Security Update Guide. Customers who have automatic updates enabled are automatically protected by these fixes. By default, Windows 10 Home and Windows 10 Pro users will be updated automatically.

Microsoft Remote Desktop Assistant

Thereis partial mitigation on affected systems that have Network LevelAuthentication (NLA) enabled. The affected systems are mitigated against‘wormable’ malware or advanced malware threats that could exploit thevulnerability, as NLA requires authentication before the vulnerability can betriggered. However, affected systems are still vulnerable to Remote CodeExecution (RCE) exploitation if the attacker has valid credentials that can beused to successfully authenticate.

Resources
Links to downloads

Microsoft Remote Desktop 0x3000067 Free

SimonPope, Director of Incident Response, Microsoft Security Response Center (MSRC)