Starting with the April 2026 security update, the Remote Desktop Connection app shows new security warnings when you open RDP files. This article explains what these warnings mean and how to respond to them safely.
Remote Desktop lets you connect to a computer in another location, such as your work PC, over a network connection like the internet. You can see the remote computer's screen, open files, run applications, and use your mouse and keyboard as if you were sitting in front of it.
An RDP file tells the Remote Desktop Connection app how to connect to a remote computer. Depending on its settings, the file can also share parts of your local device, such as your clipboard, drives, or camera, with the remote computer.
Malicious actors misuse this capability by sending RDP files through phishing emails. When a victim opens the file, their device silently connects to a server controlled by the attacker and shares local resources, giving the attacker access to files, credentials, and more.
Important
Never open an RDP file you weren't expecting, even if the email looks legitimate. When in doubt, contact your IT department.
Pausing to think before you click is the single most effective defense against phishing. Here are practical steps:
The first time you open an RDP file after installing this update, an educational dialog appears. It explains what RDP files are and warns about phishing risks. After you allow RDP file connections in this dialog, it doesn't appear again for your account.

Every time you open an RDP file, a security dialog appears before any connection is made. It shows the remote computer address and a check box for each local resource the file wants to access. Access to all these resources is off by default - you must explicitly enable each one.
This dialog exists in two versions depending on whether the publisher of the RDP file can be verified.
When an RDP file is not digitally signed, there's no way to verify who created it or whether it was tampered with. In this case, the security dialog shows a banner titled Caution: Unknown remote connection and sets the Publisher field to "Unknown publisher," as the following image shows.

Warning
An unsigned RDP file can come from anyone. Treat it with extreme caution, especially if you received it by email or downloaded it from the internet.
When a publisher digitally signs an RDP file, the signature confirms who created or distributed it. The publisher's name appears in the dialog, and the banner is titled "Verify the publisher of this remote connection," as the following image shows.

A signature confirms the identity of the entity that created the file and that the file wasn't tampered with since it was signed. It doesn't guarantee the file is safe. Cyberattackers can sign files by using names that closely resemble legitimate organizations - for example, "Contoso Security" instead of "Contoso Ltd." Always read the publisher name carefully and verify it matches the organization you expect.
Note
Your IT department might configure your computer to trust specific publishers. When an RDP file is signed by a trusted publisher, the experience might differ based on your organization's policies.
When you open an RDP file, it can request access to resources on your local device. These requests are called redirections. They share parts of your local device with the remote computer. After this update, all redirections requested by RDP files are turned off by default unless you opt into them.
The following list explains each redirection type and the risk it poses. Older versions of Windows support a different set of redirections, so not all of these might be available on your device.
Note
When a WebAuthn request is redirected through a remote session, Windows displays this information in the authentication prompt. If you see an indication that the request is coming from a remote connection and you didn't expect it, don't approve the request.

This warning means your organization's RDP files are unsigned. Contact your IT department - they can sign the files so they show their publisher instead.
No. This update only affects connections started by opening an RDP file. If you type a computer name directly into Remote Desktop Connection, the experience is unchanged.
RDP files from Microsoft services like Azure Virtual Desktop and Windows 365 are typically signed by Microsoft. You shouldn't see the new security dialog when connecting to these services. If you do, don't proceed - contact your IT department to investigate.
If your application relies on the Remote Desktop ActiveX Control (mstscax.dll), you can use IMsRdpExtendedSettings Property to control the dialog behavior. The RedirectionWarningDialogVersion property lets you configure whether to disable the new version of the security dialog after the update.
Warning
If you use Registry Editor incorrectly, you might cause serious problems that might require you to reinstall the operating system. Microsoft can't guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.
If the update causes temporary disruptions in your environment, you can revert to the previous dialog behavior by setting a registry value.
Select Start, type Registry Editor, and then open it.
Go to and modify the key: HKLM\Software\Policies\Microsoft\Windows NT\Terminal Services\Client with the following values:
Name: RedirectionWarningDialogVersion
Type: REG_DWORD
Data: 1
Warning
A future Windows update might remove support for this setting, even on older versions of Windows. Plan to transition your environment to work with the new security dialog.