Search
StarWind is a hyperconverged (HCI) vendor with focus on Enterprise ROBO, SMB & Edge

Resetting the RDS 120-Day Grace Period on Windows Server 2022

  • July 20, 2024
  • 7 min read
Storage and Virtualization Engineer. Volodymyr has broad experience in solution architecture and data protection, backed by a technical background in applied physics.
Storage and Virtualization Engineer. Volodymyr has broad experience in solution architecture and data protection, backed by a technical background in applied physics.

Disclaimer: Resetting the RDS grace period is not a substitute for purchasing and installing the required Remote Desktop CALs. The following steps are intended only for non-production, test, or lab environments. Applying this method on a production system may violate licensing terms and can lead to compliance issues.

For lab or test environments, it’s still possible to trick the 120‑day RDS licensing countdown in Windows Server 2022. The registry location has not changed – it remains under:

HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod

Inside that key is a single REG_BINARY value named L$RTMTIMEBOMB…, which acts as the “time bomb.” By default this entry is locked down (even Administrators can’t delete it without raising permissions). In practice, the same approach that worked on 2016/2019 also works on Server 2022: launch a SYSTEM‑level PowerShell or Regedit and delete the L$RTMTIMEBOMB value, then reboot.

Accordingly, you still need System privileges to do this (because the key’s ACL forbids normal admins from touching it). The simplest way is with Sysinternals PsExec: for example, run

psexec -s -i powershell

from an elevated prompt (accept the EULA on first run) to spawn a SYSTEM PowerShell session. Then you can remove the registry entry. For instance:

Remove-ItemProperty -Path Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal` Server\RCM\GracePeriod `

-Name 'L$RTMTIMEBOMB_*'

After deleting that value and rebooting, RDS will behave as if it’s fresh: the L$RTMTIMEBOMB entry is recreated and you get a new 120‑day countdown.

Steps

1. Prepare PsExec (Sysinternals): Download PsExec from Microsoft (Sysinternals) and unzip it (e.g. to C:\PSTools\).

2. Launch SYSTEM shell: Open an admin CMD and run psexec -s -i powershell.exe. A consent dialog will appear first time – click Agree. A new PowerShell window opens running as the LOCAL SYSTEM account.

3. Delete the grace-period key: In that SYSTEM PowerShell, run:

Remove-ItemProperty `

-Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod' `

-Name 'L$RTMTIMEBOMB_*'

(You can also navigate with regedit launched via psexec -s -i regedit.exe and delete the entry by hand.) The key space “Terminal Server” contains a space, so make sure to quote it or use the HKLM: drive syntax as above.

4. Reboot: After deleting the L$RTMTIMEBOMB value, restart the server. On reboot, Windows will recreate a fresh timebomb entry and reset the countdown to 120 days.

That’s it – same as before.

Tool and Command Changes

One update for 2024: WMIC/GWMI are deprecated. Microsoft’s own documentation still shows using the old wmic or gwmi to query the grace period, but this is no longer ideal. (In fact, WMIC is disabled by default on recent Windows builds.) Instead, use PowerShell’s CIM commands. For example, to check days remaining you could run:

(Get-CimInstance -Namespace root/CIMV2/TerminalServices -ClassName Win32_TerminalServiceSetting).GetGracePeriodDays().DaysLeft

In short, replace any old wmic /namespace:… GetGracePeriodDays or gwmi Win32_TerminalServiceSetting calls with modern CIM (Get-CimInstance or Invoke-CimMethod).

Aside from that, PsExec itself is still available from Microsoft. The procedure hasn’t changed. Just remember: run PsExec from an elevated prompt, accept its license, and use -s -i to make it interactive.

Summary

In summary, yes – the old “timebomb” trick still works on Windows Server 2022 in 2024. The registry key path and value name are the same, and using PsExec to gain SYSTEM rights remains the easiest way to delete it. After removal and a reboot, you should see 120 days restored. Just bear in mind the official stance: this is a last-resort lab hack, not a permanent fix. If you need RDS access long-term, the real solution is to install and configure the proper RDS licensing infrastructure.

Found Volodymyr’s article helpful? Looking for a reliable, high-performance, and cost-effective shared storage solution for your production cluster?
Dmytro Malynka
Dmytro Malynka StarWind Virtual SAN Product Manager
We’ve got you covered! StarWind Virtual SAN (VSAN) is specifically designed to provide highly-available shared storage for Hyper-V, vSphere, and KVM clusters. With StarWind VSAN, simplicity is key: utilize the local disks of your hypervisor hosts and create shared HA storage for your VMs. Interested in learning more? Book a short StarWind VSAN demo now and see it in action!