Before beginning, ensure your computer meets the following requirements:
To verify your setup, open PowerShell with elevated permissions and perform the following checks:
winver.exe
and press Enter to view your Windows version details.(New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)
Starting with Windows Server 2025, OpenSSH is now installed by default. You can also enable or disable the sshd
service in Server Manager.
To enable SSHD using Server Manager:
In Server Manager, on the navigation pane to the left, select Local Server.
In the Properties window, locate Remote SSH Access.
Select Disabled to enable the OpenSSH service.
Note: If you need to allow or restrict specific users or groups from using OpenSSH for remote access, add them to the OpenSSH Users user group.
Once installed, you can connect to OpenSSH Server from a Windows or Windows Server device with the OpenSSH client installed. From a PowerShell prompt, run the following command.
ssh domain\username@servername
Once connected, you get a message similar to the following output.
The authenticity of host 'servername (1.1.1.1)' can't be established.
ECDSA key fingerprint is SHA256:(<a large string>).
Are you sure you want to continue connecting (yes/no)?
Entering yes adds that server to the list of known SSH hosts on your Windows client.
At this point, the service prompts you for your password.
As a security precaution, the characters of your password aren't displayed as you enter them.
Once connected, you should see the following Windows command shell prompt:
domain\username@SERVERNAME C:\User\username>