
***Note*** – This is not recommended by Microsoft, as making sure both the client and server is patched is best practice.

To Fix the issue as a workaround, set the policy to Enabled and set the Protection Level to Vulnerable. By default this is set to Not configured. You can find this at Computer Configuration > Administrative Templates > System > Credentials Delegation > Encryption Oracle Remediation. There is a local policy setting that is added with the installed security updates. Once you have installed the patch on a “vulnerable” workstation and attempt to connect to an unpatched server, you will see the following error message that happens after you type in your password to authenticate to the RDP session. These cumulative updates include the fix for the CredSSP encryption vulnerability. Just a couple of days ago, the cumulative updates were released below for Windows 10 and Server 2016, etc.

Windows 10 RDP CredSSP Encryption Oracle Remediation Error Fix
