Skip to content

Commit 1249edb

Browse files
authored
Merge pull request #170610 from MicrosoftDocs/release-virtual-desktop-screen-capture-protection
Release virtual desktop screen capture protection--scheduled release at 9AM of 8/30
2 parents 3316589 + 2fe2a9e commit 1249edb

File tree

3 files changed

+50
-0
lines changed

3 files changed

+50
-0
lines changed

articles/virtual-desktop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -206,6 +206,8 @@
206206
items:
207207
- name: Security baseline
208208
href: /security/benchmark/azure/baselines/windows-virtual-desktop-security-baseline?context=/azure/virtual-desktop/context/context
209+
- name: Screen capture protection
210+
href: screen-capture-protection.md
209211
- name: Troubleshoot
210212
items:
211213
- name: Troubleshooting overview, feedback, and support
257 KB
Loading
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
title: Azure Virtual Desktop screen capture protection
3+
titleSuffix: Azure
4+
description: How to set up screen capture protection for Azure Virtual Desktop.
5+
author: gundarev
6+
ms.topic: conceptual
7+
ms.date: 08/30/2021
8+
ms.author: denisgun
9+
ms.service: virtual-desktop
10+
---
11+
12+
# Screen capture protection
13+
14+
The screen capture protection feature prevents sensitive information from being captured on the client endpoints. When you enable this feature, remote content will be automatically blocked or hidden in screenshots and screen shares. Also, the Remote Desktop client will hide content from malicious software that may be capturing the screen.
15+
16+
## Prerequisites
17+
18+
The screen capture protection feature is configured on the session host level and enforced on the client. Only clients that support this feature can connect to the remote session.
19+
Currently, only the Windows Desktop client supports screen capture protection.
20+
Only full desktops are supported.
21+
Suppose the user attempts to use an unsupported client to connect to the protected session host or access RemoteApp published on the protected session host. In that case, the connection will fail with error 0x1151.
22+
23+
## Configure screen capture protection
24+
25+
1. To configure screen capture protection, you need to install administrative templates that add rules and settings for Azure Virtual Desktop.
26+
2. Download the [Azure Virtual Desktop policy templates file](https://aka.ms/avdgpo) (AVDGPTemplate.cab) and extract the contents of the cab file and zip archive.
27+
3. Copy the *terminalserver-avd.admx* file to *%windir%\PolicyDefinitions* folder
28+
4. Copy the *en-us\terminalserver-avd.adml* file to *%windir%\PolicyDefinitions\en-us* folder
29+
5. To confirm the files copied correctly, open the Group Policy Editor and navigate to **Computer Configuration** -> **Administrative Templates** -> **Windows Components** -> **Remote Desktop Services** -> **Remote Desktop Session Host** -> **Azure Virtual Desktop**
30+
6. You should see one or more Azure Virtual Desktop policies, as shown below.
31+
32+
:::image type="content" source="media/azure-virtual-desktop-gpo.png" alt-text="Screenshot of the group policy editor" lightbox="media/azure-virtual-desktop-gpo.png":::
33+
34+
> [!TIP]
35+
> You can also install administrative templates to the group policy Central Store in your Active Directory domain.
36+
> For more information about Central Store for Group Policy Administrative Templates, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
37+
38+
7. Open the **"Enable screen capture protection"** policy and set it to **"Enabled"**.
39+
40+
## Limitations and known issues
41+
42+
- This feature protects the Remote Desktop window from being captured through a specific set of public operating system features and APIs. However, there's no guarantee that this feature will strictly protect content, for example, where someone takes photography of the screen.
43+
- Customers should use the feature together with disabling clipboard, drive, and printer redirection. Disabling redirection will help to prevent the user from copying the captured screen content from the remote session.
44+
- Users can't share the Remote Desktop window using local collaboration software, such as Microsoft Teams, when the feature is enabled. If Microsoft Teams is used, both the local Teams app and Teams running with media optimizations can't share the protected content.
45+
46+
## Next steps
47+
48+
* To learn about Azure Virtual Desktop security best practices, see [Azure Virtual Desktop security best practices](security-guide.md).

0 commit comments

Comments
 (0)