IT Guide: How to Delete Saved RDP Credentials in Windows

How to Delete Saved RDP Credentials in Windows blog banner image

In this guide, we discuss the steps on how to delete saved RDP credentials. RDP, which stands for Remote Desktop Connection, is a powerful feature in Windows that allows users to remotely access another computer over a network. As you can imagine, it’s highly useful for hybrid workforces or any IT enterprise that needs to manage remote systems.

Nevertheless, RDC also introduces security risks when credentials are sacred. Managing these stored credentials is crucial to prevent unauthorized access, enhance security, and resolve login issues.

Enable or disable RDP on workstations using PowerShell.

Access the script here.

Steps to clear saved passwords in Windows Remote Desktop

We’ve listed 5 options on how to remove Remote Desktop credentials.

Option 1: Using Windows Credential Manager

Windows Credential Manager is the most user-friendly method for deleting saved RDC credentials. Follow these steps:

  1. Open the Control Panel and navigate to Credential Manager.
  2. Click on Windows Credentials to display a list of stored credentials.
  3. Locate the entry corresponding to your RDC connection. These credentials are usually labeled as TERMSRV/ followed by the remote computer’s name or IP address.
  4. Click on the credential entry to expand it, then select Remove.
  5. Confirm the deletion when prompted.

Windows Credentials option under Credential Manager window

With this method, you will be required to enter new credentials the next time you attempt to connect to the remote machine.

Option 2: Using the Remote Desktop Client (RDC) interface

The RDC client provides a direct way to delete saved credentials. Here’s how:

  1. Press Win + R, type mstsc, and press Enter to open the Remote Desktop Connection client.

Remote Desktop Connection computer information

  1. Click on Show Options at the bottom left.
  2. Under the General tab, locate the User name field where the saved credentials are stored.

General settings of Remote Desktop Connection

  1. Click Delete Credentials (if available).
  2. Close and restart RDC to ensure changes take effect.

If the “Delete Credentials” button is not visible, use Credential Manager as an alternative method.

Option 3: Modifying Group Policy Settings (for IT admins)

Administrators can enforce policies to prevent Windows from storing RDC credentials altogether. This method is ideal for securing enterprise environments.

  1. Open Group Policy Editor by pressing Win + R, typing gpedit.msc, and pressing Enter.
  2. Navigate to Computer Configuration → Administrative Templates → System → Credentials Delegation.
  3. Locate and double-click Do not allow passwords to be saved.
  4. Select Enabled, then click Apply and OK.
  5. Restart the system so that changes take effect.

By enabling this policy, users will always be required to enter credentials manually when connecting via RDC.

Option 4: Deleting credentials via Windows registry (for advanced users)

For advanced users, stored RDC credentials can be removed from the registry.

  1. Press Win + R, type regedit, and press Enter to open the Registry Editor.
  2. Navigate to: HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers
  3. Expand the Servers key and locate the subkey corresponding to the remote computer.
  4. Right-click the subkey and select Delete.
  5. Close the Registry Editor and restart the computer.

⚠️ Caution: Editing the registry carries risks. Always back up the registry before making modifications. Use a tool like NinjaOne to back up business-critical data. 

Understanding saved credentials in Remote Desktop

When a user logs in to a remote desktop session and chooses to save their credentials, Windows securely stores these credentials for future use. This allows users to connect without re-entering login details. However, saved credentials are stored in locations that, if compromised, pose a security risk.

Windows primarily stores RDC credentials in two locations:

  1. Windows Credential Manager: This tool manages stored passwords for various Windows services, including RDC.
  2. Windows Registry: Advanced users may find stored RDC credentials in the registry, particularly under Terminal Services keys.

Leaving old or unused credentials stored can be a security vulnerability, especially on shared or corporate systems. Threat actors can exploit these vulnerabilities and gain access to a compromised system. As such, regularly managing and removing saved credentials is a best practice in any robust credential management strategy.

Run scripts on Windows or Mac using any custom credentials.

→ Learn more about NinjaOne’s Credential Exchange.

8 best practices for secure Remote Desktop management

The most common cyberattacks exploit weak or improperly stored credentials. That is why IT experts continue to stress the importance of enforcing strong security measures. Regular audits, password policies, and proper session management can help safeguard sensitive remote connections. Below are eight best practices to follow for secure Remote Desktop credential management:

  1. Remove Remote Desktop credentials regularly: Periodically clear stored RDP passwords to ensure security and prevent unauthorized access.
  2. Use strong, unique passwords: Always use complex passwords for RDC accounts to reduce the risk of credential theft.
  3. Enable multi-factor authentication (MFA): Adding MFA significantly enhances security by requiring an additional verification step.
  4. Audit and monitor stored credentials: Regularly review stored RDC credentials and delete Remote Desktop saved login details that are no longer needed.
  5. Disable automatic credential saving: Use Group Policy settings to prevent Windows from storing Remote Desktop Connection credentials automatically.
  6. Implement session timeout policies: Configure timeouts to automatically disconnect idle remote sessions.
  7. Use PowerShell for bulk credential removal: Automate Remote Desktop Connection credentials removal using PowerShell for efficiency in enterprise environments.
  8. Regularly update Windows and security settings: Ensure all security patches and updates are applied to minimize vulnerabilities in RDC.

Deleting saved RDP credentials

Managing stored RDC credentials is crucial for maintaining security and troubleshooting connection issues. This guide has outlined multiple methods to remove saved credentials, ranging from simple GUI-based methods to advanced registry modifications and automation through PowerShell. By following best practices, you ensure your RDC sessions remain secure and free from unauthorized access.

Frequently Asked Questions (FAQs)

1. What happens if I delete my saved RDC credentials?

When credentials are deleted, you will be required to enter your username and password the next time you connect to the remote machine.

2. Can I disable credential saving entirely in Remote Desktop?

Yes, you can prevent users from saving RDC credentials using Group Policy Editor.

3. How do I clear credentials for multiple remote desktops?

You can systematically remove credentials for multiple remote desktops using PowerShell or Credential Manager.

Next Steps

Building an efficient and effective IT team requires a centralized solution that acts as your core service deliver tool. NinjaOne enables IT teams to monitor, manage, secure, and support all their devices, wherever they are, without the need for complex on-premises infrastructure.

Learn more about Ninja Endpoint Management, check out a live tour, or start your free trial of the NinjaOne platform.

You might also like

Ready to simplify the hardest parts of IT?
×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.

NinjaOne Terms & Conditions

By clicking the “I Accept” button below, you indicate your acceptance of the following legal terms as well as our Terms of Use:

  • Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms.
  • Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party.
  • Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library belonging to or under the control of any other software provider.
  • Warranty Disclaimer: The script is provided “as is” and “as available”, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations.
  • Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks.
  • Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script.
  • EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).