Restoring Windows Server Access via your Google Cloud Serial Console

Fredrick Sachita
5 min readOct 15, 2021


So today it was brought to my attention by a GCP user client that they lost access to a Windows Server instance hosted on the cloud. A user at the company had made an incorrect change to the Windows Firewall configuration. The result of that change was all users were unable to access the machine via RDP or otherwise.

Unfortunately, this is more common than we’d like to think, but on the positive side, it is correctable. With the hope that this article helps others, I’ll outline the simple steps that you can follow to resolve similar situations.

Unable to connect to the machine by other means, we opted to leverage the serial port connection option provided in the Google Cloud Web Console.

To restore access to the Windows instance i will walk you through three steps. First, we’ll connect to the machine. Second, we’ll access a Windows command prompt. Last, we’ll disable the firewall to open RDP access to the machine. We’ll start at the point at which we are already signed into the Google Cloud Web Console.

To perform the steps in this article you will need the Google Cloud Platform (GCP) permissions listed.

  • compute.instances.setMetadata
  • compute.projects.setCommonInstanceMetadata

Step 1: Navigate and connect to the instance via a serial console

Once signed into the Google Cloud Web Console, navigate to the Compute Engine page to display the list of instances. Search and select the affected instance to display the Instance detail page.

VM instance detail

Ensure that serial console access is enabled by viewing the “Enable connection to serial ports” attribute. If it is not, you will need to enable it. To enable, select the “Edit” button, enable the “Enable connecting to serial ports” attribute and save the change.

Edit serial port connectivity

With serial port access enabled the “Connect to serial console” button will also be enabled. Select the button to open a serial console window. A new window will open and display the Windows Special Administration (SAC) Console.

VM instance detail — serial console enabled

The Windows SAC allows you to interact with the Windows Operating System (OS). The SAC provides OS access even when networking is not functional. It also provides a very basic set of commands for OS management.

Special Administration Console, SAC

Step 2: Connect to a Windows command prompt

We need to work with the firewall commands which are not available in the SAC. To do this we’ll create a new channel that provides access to the Windows Command prompt that we all know and love.

In the SAC terminal, use the cmd command to start another channel. The system will respond with a confirmation message for the new channel. The new channel is “Cmd0001” and we change to it using the command ch -sn Cmd0001.

Create & switch to the new channel

The system will display the new channel detail. Enter any key, aside from the <esc><tab> combinations listed, to view the channel.

Enter ch -sn with the name of the channel such as ch -sn Cmd0001. This command will change the serial console to the new channel specified.

The Windows command prompt will provide full access to the machine. The system will prompt for credentials to authenticate as an authorized user. Enter the username, domain, and password. If the machine is not on a domain then leave the domain blank.

Command prompt authentication

Step 3: Disable the firewall

Now that we’re authenticated on the machine we can perform the final step and disable the firewall rules that prevent machine access. For this, use the netsh advfirewall set allprofiles state off command. The system will respond with a short “Ok.” message indicating that the firewall rules are disabled. One can now connect to the machine and reset the configurations to the desired state. Of course, don’t forget to re-enable the firewall.

Confirmation message from netsh command


The steps above I have walked you through: how to restore access to a Windows Server instance when blocked by the operating system firewall. Remember to disable the serial console access to protect the resource. GCP also provides a safety control to protect serial console access on all machines. Setting an organization policy on serial port access will override individual machine settings. For this feature, use the “Disable VM serial port access” on the Organization Policies page.

Additionally, GCP also records all serial console access into the cloud logs. To view these logs, navigate to the Logs menu in the GCP web console. On the logs page, filter on the “GCE VM Instance” resource and search on You will need log viewer permissions on your user account for access.

There are some basic preventative steps to avoid these situations. Ensuring change control steps are in place will provide a historical record of actions. Change control records can help lead to the cause of incidents, the related resolution, and a faster recovery. Also, ensure that consistent backups are occurring. The Google Cloud Platform provides an excellent snapshot scheduling service for instances.

Related Stories: Recover VM boot Disk with GCE Rescue



Fredrick Sachita

Solutions Architect | Certified Gogle Cloud, Microsoft Azure,AWS