Require use of Specific Security Layer for Remote Connections using Intune

Key Takeaways:

  • Enforces the use of a specific security layer
  • Setting can be deployed via Intune configuration profiles
  • Helps organizations align with security best practices
  • IT admins gain centralized control to prevent weaker or outdated protocols

Let’s discuss Require use of Specific Security Layer for Remote Connections using Intune. This policy setting specifies whether to require the use of a specific security layer to secure communications between clients and RD Session Host servers during Remote Desktop Protocol (RDP) connections. 

Table of Contents

Require use of Specific Security Layer for Remote Connections using Intune

This policy setting is a critical component of hardening Windows environments against remote attacks. Understanding it requires looking at how RDP (Remote Desktop Protocol) handles the “handshake” and data encryption between a client and a host.

Example

Imagine an employee working from a public Wi-Fi (like a coffee shop). An attacker on the same network could perform an ARP spoofing attack to intercept traffic. If the RDP session is set to “RDP” (legacy) or “Negotiate” (with fallback enabled), the attacker might be able to intercept the session or present a fake server to capture the user’s password. If the policy is set to “SSL,” the user’s client will detect that the server certificate doesn’t match, and it will refuse to connect, stopping the attack instantly.

How to Start Policy Creation

As an Admin, you can quickly configure this policy on your organisation. To start the Policy Creation, open the Microsoft Intune Admin center. Then go to Devices > Configuration >+ Create > +New Policy.

Patch My PC
Require use of Specific Security Layer for Remote Connections using Intune - Fig.1
Require use of Specific Security Layer for Remote Connections using Intune – Fig.1

Profile Creation

Profile creation is the necessary step that helps you to assign the policy to appropriate platform and Profile. Here I would like to configure the policy to  Windows 10 and later platform and settings catalog profile. Then click on the Create button.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.2
Require use of Specific Security Layer for Remote Connections using Intune – Fig.2

Filling the Basic Tab

Naming the policy is the primary step that help admins to identify the policy later. This is important and necessary step that allows you to know the purpose of the policy. Here is Name is mandatory and description is optional. After adding this click on the Next button.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.3
Require use of Specific Security Layer for Remote Connections using Intune – Fig.3

Configure Dial-up Password

With Settings Picker, you can use the Configuration Settings Tab. On this tab, you can click on the +Add Settings hyperlink to get the Settings Picker. The settings picker shows huge number of settings. Here, I would like to select the settings by browsing by Category. I choose System. Then, I choose Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security > Require use of specific security layer for remote (RDP) connections.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.4
Require use of Specific Security Layer for Remote Connections using Intune – Fig.4

Disable Specific Security Layer

If you disable or do not configure this policy setting, the security method to be used for remote connections to RD Session Host servers is not specified at the Group Policy level.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.5
Require use of Specific Security Layer for Remote Connections using Intune – Fig.5

Enable Specific Security Layer

If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the security method specified in this setting. The following security methods are available.

ValueDetails
NegotiateThe Negotiate method enforces the most secure method that is supported by the client. If Transport Layer Security (TLS) version 1.0 is supported, it is used to authenticate the RD Session Host server. If TLS is not supported, native Remote Desktop Protocol (RDP) encryption is used to secure communications, but the RD Session Host server is not authenticated. Native RDP encryption (as opposed to SSL encryption) is not recommended
RDPThe RDP method uses native RDP encryption to secure communications between the client and RD Session Host server. If you select this setting, the RD Session Host server is not authenticated. Native RDP encryption (as opposed to SSL encryption) is not recommended
SSL (TLS 1.0)The SSL method requires the use of TLS 1.0 to authenticate the RD Session Host server. If TLS is not supported, the connection fails. This is the recommended setting for this policy
Require use of Specific Security Layer for Remote Connections using Intune – Table.1
Require use of Specific Security Layer for Remote Connections using Intune - Fig.6
Require use of Specific Security Layer for Remote Connections using Intune – Fig.6

Scope Tags

With scope tags, you create a restriction to the visibility of the Specific Security Layer. It helps to organise resources as well. Here, I would like to skip this section, because it is not mandatory. Click on the Next button.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.7
Require use of Specific Security Layer for Remote Connections using Intune – Fig.7

Assignments Tab for Selecting Group

To assign the policy to specific groups, you can use the Assignment Tab. Here I click, +Add groups option under Included groups. I choose a group from the list of groups and click on the Select button. Again, I click on the Select button to continue.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.8
Require use of Specific Security Layer for Remote Connections using Intune – Fig.8

Review + Create Tab

Before completing the policy creation, you can review each tab to avoid misconfiguration or policy failure. After verifying all the details, click on the Create Button. After creating the policy, you will get a success message.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.9
Require use of Specific Security Layer for Remote Connections using Intune – Fig.9

Monitoring Status

The Monitoring Status page shows whether the policy has succeeded or not. To quickly configure the policy and take advantage of the policy sync the assigned device on Company Portal. Open the Intune Portal. Go to Devices > Configuration > Search for the Policy. Here, the policy shows as successful.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.10
Require use of Specific Security Layer for Remote Connections using Intune – Fig.10

Event Viewer Details

Event Viewer helps you check the client side and verify the policy status. Open the Client device and open the Event Viewer. Go to Start > Event Viewer. Navigate to Logs: In the left pane, go to Application and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider > Admin.

Event ID Details
MDM PolicyManager: Set policy string, Policy: (TS_SECURITY_LAYER_POLICY), Area:
(ADMX_TerminalServer), EnrollmentID requesting merge: (EB427D85-802F-46D9-A3E2-
D5B414587F63), Current User: (Device), String: (), Enrollment Type: (0x6), Scope: (0x0).
Require use of Specific Security Layer for Remote Connections using Intune – Table.2
Require use of Specific Security Layer for Remote Connections using Intune - Fig.11
Require use of Specific Security Layer for Remote Connections using Intune – Fig.11

Removing the Assigned Group from Specific Security Layer Settings

If you want to remove the Assigned group from the policy, it is possible from the Intune Portal. To do this, open the Policy on Intune Portal and edit the Assignments tab and the Remove Policy.

To get more detailed information, you can refer to our previous post – Learn How to Delete or Remove App Assignment from Intune using by Step-by-Step Guide.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.12
Require use of Specific Security Layer for Remote Connections using Intune – Fig.12

How to Specific Security Layer

You can easily delete the Policy from the Intune Portal. From the Configuration section, you can delete the policy. It will completely remove it from the client devices.

For detailed information, you can refer to our previous post – How to Delete Allow Clipboard History Policy in Intune Step by Step Guide.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.13
Require use of Specific Security Layer for Remote Connections using Intune – Fig.13

Windows CSP Details

Specific Security Layer policy is applicable for Windows 10, version 2004 with KB5005101 [10.0.19041.1202] and later, Windows 10, version 20H2 with KB5005101 [10.0.19042.1202] and later, Windows 10, version 21H1 with KB5005101 [10.0.19043.1202] and later, Windows 11, version 21H2 [10.0.22000] and later.

Require use of Specific Security Layer for Remote Connections using Intune - Fig.14
Require use of Specific Security Layer for Remote Connections using Intune – Fig.14

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community  and WhatsApp Channel to get the latest news on Microsoft Technologies. We are there on Reddit as well.

Author

Anoop C Nair has been Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM,  Windows,  Cloud PC,  Windows, Entra, Microsoft Security, Career, etc.

Leave a Comment