Welcome to the Microsoft Q&A Platform!
Thank you for sharing your concern with us.
Based on your description, this behavior is expected when connecting from an on‑premises Active Directory–joined PC to an Azure AD (Microsoft Entra ID) only device. Disabling Network Level Authentication (NLA) or modifying the .rdp file alone is not sufficient. On Azure AD only devices, Azure AD authentication for Remote Desktop must be explicitly enabled. By default, Remote Desktop does not allow Azure AD authentication on Azure AD–joined devices, so authentication will fail even if NLA is disabled, CredSSP settings are modified and valid credentials are provided. Azure AD authentication must be enabled either at the operating system level or at the Host Pool level (for AVD).
Recommendations
1.Enable Azure AD Authentication for RDP
Configure the following registry value on the Azure AD only device:
- Path: HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
- Type: DWORD
- Name: fEnableRdsAadAuth
- Value: 1
2.Verify User Permissions
Add the connecting user to the "Remote Desktop Users" group.
3. Check RDP Listener and Port
Ensure RDP is enabled and listening on port 3389.
4.Use Correct Sign-In Method
For Azure AD accounts, use the full UPN (e.g AzureAD******@domain.com) when connecting.
5. If Using Azure Virtual Desktop
Enable Azure AD authentication at the Host Pool level by configuring RDP Properties and adding: enablerdsaadauth:i:1 (Host Pool → RDP Properties → Advanced)
Reference: Supported RDP properties - Azure Virtual Desktop | Microsoft Learn
Hope this helps, and I wish you a great day!