Skip to content

Commit 0a8dd7a

Browse files
committed
iOS and Android Windows App MAM
1 parent 8bfbff1 commit 0a8dd7a

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/virtual-desktop/client-device-redirection-intune.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 10/31/2024
1010
# Configure client device redirection settings for Windows App and the Remote Desktop app using Microsoft Intune
1111

1212
> [!IMPORTANT]
13-
> Configure redirection settings for the **Remote Desktop app on Android** using Microsoft Intune is currently in PREVIEW. Configure redirection settings for the **Windows App on iOS/iPadOS** using Microsoft Intune is currently in Generally Available.
13+
> Configure redirection settings for the **Remote Desktop app on Android** using Microsoft Intune is currently in PREVIEW. Configure redirection settings for **Windows App on iOS/iPadOS** using Microsoft Intune is generally available.
1414
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1515
1616
> [!TIP]
@@ -24,7 +24,7 @@ These features enable you to achieve the following scenarios:
2424

2525
- Provide an extra layer of protection against misconfigured redirection on the host pool or session host.
2626

27-
- Apply extra security settings to Windows App and the Remote Desktop app, such as, require a PIN, block third-party keyboards, and restrict cut, copy and paste operations between other apps on the client device.
27+
- Apply extra security settings to Windows App and the Remote Desktop app, such as, require a PIN, block third-party keyboards, and restrict cut, copy, and paste operations between other apps on the client device.
2828

2929
If the redirection settings on a client device conflict with the host pool RDP properties and session host for Azure Virtual Desktop, or Cloud PC for Windows 365, the more restrictive setting between the two takes effect. For example, if the session host disallows drive redirection and the client device allowing drive redirection, drive redirection is disallowed. If the redirection settings on session host and client device are both the same, the redirection behavior is consistent.
3030

@@ -144,7 +144,7 @@ Before you can configure redirection settings on a client device using Microsoft
144144

145145
- At least one security group containing users to apply the policies to.
146146

147-
- To use the Windows App with enrolled devices on iOS and iPadOS, you need to add each app to Intune from the App Store. For more information, see [Add iOS store apps to Microsoft Intune](/mem/intune/apps/store-apps-ios).
147+
- To use Windows App with enrolled devices on iOS and iPadOS, you need to add each app to Intune from the App Store. For more information, see [Add iOS store apps to Microsoft Intune](/mem/intune/apps/store-apps-ios).
148148

149149
- A client device running one of the following versions of Windows App or the Remote Desktop app:
150150
- For Windows App:
@@ -166,11 +166,11 @@ To learn about filters and how to create them, see [Use filters when assigning y
166166

167167
## Create an app configuration policy for managed devices
168168

169-
For iOS and iPadOS devices that are enrolled only, you need to create an [app configuration policy for managed devices](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for the Windows App app. This step is not needed for Android.
169+
For iOS and iPadOS devices that are enrolled only, you need to create an [app configuration policy for managed devices](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for Windows App. This step isn't needed for Android.
170170

171171
To create and apply an app configuration policy for managed devices, follow the steps in [Add app configuration policies for managed iOS/iPadOS devices](/mem/intune/apps/app-configuration-policies-use-ios) and use the following settings:
172172

173-
- On the **Basics** tab, for **targeted app**, select the **Windows App** app from the list. You need to have added the app to Intune from the App Store for it to show in this list.
173+
- On the **Basics** tab, for **targeted app**, select **Windows App** from the list. You need to have added the app to Intune from the App Store for it to show in this list.
174174

175175
- On the **Settings** tab, for the **Configuration settings format** drop-down list, select **Use configuration designer**, then enter the following settings exactly as shown:
176176

@@ -184,7 +184,7 @@ To create and apply an app configuration policy for managed devices, follow the
184184

185185
## Create an app configuration policy for managed apps
186186

187-
You need to create a separate [app configuration policy for managed apps](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for Windows App (iOS/iPadOS) and the Remote Desktop app (Android), which enable you to provide configuration settings. Do not configure both Android and iOS in the same configuration policy or you will not be able to configure policy targeting based on managed and unmanaged devices.
187+
You need to create a separate [app configuration policy for managed apps](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for Windows App (iOS/iPadOS) and the Remote Desktop app (Android), which enables you to provide configuration settings. Don't configure both Android and iOS in the same configuration policy or you won't be able to configure policy targeting based on managed and unmanaged devices.
188188

189189
To create and apply an app configuration policy for managed apps, follow the steps in [App configuration policies for Intune App SDK managed apps](/mem/intune/apps/app-configuration-policies-managed-app) and use the following settings:
190190

@@ -207,20 +207,20 @@ To create and apply an app configuration policy for managed apps, follow the ste
207207

208208
## Create an app protection policy
209209

210-
You need to create a separate [app protection policy](/mem/intune/apps/app-protection-policy) for Windows App (iOS/iPadOS) and the Remote Desktop app (Android), which enable you to control how data is accessed and shared by apps on mobile devices. Do not configure both Android and iOS/iPadOS in the same protection policy or you will not be able to configure policy targeting based on managed and unmanaged devices.
210+
You need to create a separate [app protection policy](/mem/intune/apps/app-protection-policy) for Windows App (iOS/iPadOS) and the Remote Desktop app (Android), which enable you to control how data is accessed and shared by apps on mobile devices. Don't configure both Android and iOS/iPadOS in the same protection policy or you won't be able to configure policy targeting based on managed and unmanaged devices.
211211

212212
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings.
213213

214214
- On the **Apps** tab, select **Select public apps**, then search for and select **Remote Desktop** for Android and **Windows App** for iOS/iPadOS.
215215

216216
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
217217

218-
- For iOS and iPadOS you can configure the following settings:
218+
- For iOS and iPadOS, you can configure the following settings:
219219

220220
- Restrict cut, copy, and paste between other apps
221221
- Third-party keyboards
222222

223-
- For Android you can configure the following settings:
223+
- For Android, you can configure the following settings:
224224

225225
- Restrict cut, copy, and paste between other apps
226226
- Screen capture and Google Assistant
@@ -284,4 +284,4 @@ Now that you configure Intune to manage device redirection on personal devices,
284284

285285
## Known issues
286286

287-
When creating an App Configuration Policy or an App Protection Policy for Android, Remote Desktop is listed twice. Add both apps. This will be updated soon so Remote Desktop is only shown once.
287+
When creating an app configuration policy or an app protection policy for Android, Remote Desktop is listed twice. Add both apps. This will be updated soon so Remote Desktop is only shown once.

0 commit comments

Comments
 (0)