Skip to content
Tech News
← Back to articles

Microsoft fixes Remote Desktop warnings displaying incorrectly

read original get Remote Desktop Management Tool → more articles
Why This Matters

Microsoft has addressed a critical display issue affecting Remote Desktop security warnings on Windows systems with multiple monitors and varied display scaling. This fix enhances user experience and security by ensuring that security prompts are clearly visible and interactable, which is vital given the increased use of RDP files in enterprise environments and their exploitation in cyberattacks. The update underscores Microsoft's ongoing efforts to improve security and usability in remote connection tools for consumers and businesses alike.

Key Takeaways

Microsoft has fixed a known issue causing newly introduced Windows security warnings to display incorrectly when opening Remote Desktop (.rdp) files.

This known issue affects all supported Windows versions, including Windows 11 (KB5083768 & KB5083769), Windows 10 (KB5082200), and Windows Server (KB5082063), on devices with multiple monitors and different display scaling settings.

Microsoft addressed the bug in the optional KB5083631 preview cumulative update for Windows 11, released on Thursday, along with 34 other changes.

"This update addresses an issue that affects the Remote Desktop Connection security warning dialog. The dialog could render incorrectly in multi-monitor scenario when the monitors had different scaling set," Microsoft said. "This might occur after installing the April 2026 (KB5083769) security update."

As Microsoft explained when it acknowledged the bug on Wednesday, the security warnings appearing when opening RDP files may not display correctly. On affected Windows systems, the buttons in the alert windows are misaligned or partially hidden, and the text is hard to read, making it difficult, and in some cases impossible, to interact with the security dialog.

These warnings were introduced on Windows systems with the April 2026 cumulative updates to disable risky shared resources by default as a defense against phishing attacks that abuse Remote Desktop connection (.rdp) files.

Remote Desktop Connection security warning (Microsoft)

​RDP files are commonly used to connect to remote systems in enterprise environments because they can be preconfigured to automatically redirect local resources to a remote host. However, threat actors have also increasingly abused them in phishing campaigns, including the Russian APT29 cyber-espionage group, which has used them to steal documents and credentials from victims' devices remotely.

After installing the April security updates, a one-time educational prompt will appear when opening an RDP file for the first time, warning about the associated risks.

Afterward, a security dialog is displayed before any connection is made when opening RDP files, showing whether the file is signed by a verified publisher, the remote system's address, and all local resource redirections (including drives, clipboard, or devices), with every option disabled by default.

... continue reading