Skip to content

Commit 256b73b

Browse files
Merge pull request #279016 from dknappettmsft/patch-29
AVD client redirection added conditions table and clarified apps flow
2 parents 0f3728a + 28e19fc commit 256b73b

File tree

1 file changed

+12
-5
lines changed

1 file changed

+12
-5
lines changed

articles/virtual-desktop/client-device-redirection-intune.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ Here are some recommended policy settings you should use with Intune and Conditi
127127
- Specify a minimum device operating system version.
128128
- Specify a minimum Windows App and/or Remote Desktop app version number.
129129
- Block jailbroken/rooted devices.
130-
- Require a mobile threat defense solution on devices, with no threats detected.
130+
- Require a mobile threat defense (MTD) solution on devices, with no threats detected.
131131

132132
- Conditional Access:
133133
- Block access unless criteria set in Intune mobile application management policies are met.
@@ -213,13 +213,13 @@ To create and apply an app configuration policy for managed apps, follow the ste
213213

214214
You need to create an [app protection policy](/mem/intune/apps/app-protection-policy) for Windows App and the Remote Desktop app, which enable you to control how data is accessed and shared by apps on mobile devices.
215215

216-
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings:
216+
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings. You need to create an app protection policy for each platform you want to target.
217217

218218
- On the **Apps** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
219219

220-
- For Windows App, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple` and for platform, select **iOS/iPadOS**.
220+
- For Windows App on iOS/iPadOS, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple`.
221221

222-
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop** for each platform you want to target.
222+
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop**.
223223

224224
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
225225

@@ -237,7 +237,14 @@ To create and apply an app protection policy, follow the steps in [How to create
237237
> [!TIP]
238238
> If you disable clipboard redirection in an app configuration policy, you should set **Restrict cut, copy, and paste between other apps** to **Blocked**.
239239
240-
- On the **Conditional launch** tab, we recommend you configure **Min app version** from the drop-down list. Enter a value based on your requirements for the minimum version of the app, then set the action to **Block access**.
240+
- On the **Conditional launch** tab, we recommend you add the following conditions:
241+
242+
| Condition | Condition type | Value | Action |
243+
|--|--|--|--|
244+
| Min app version | App condition | Based on your requirements. | Block access |
245+
| Min OS version | Device condition | Based on your requirements. | Block access |
246+
| Primary MTD service | Device condition | Based on your requirements.<br /><br />Your MTD connector must be set up. For **Microsoft Defender for Endpoint**, [configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure). | Block access |
247+
| Max allowed device threat level | Device condition | Secured | Block access |
241248

242249
For version details, see [What's new in Windows App](/windows-app/whats-new), [What's new in the Remote Desktop client for iOS and iPadOS](whats-new-client-ios-ipados.md), and [What's new in the Remote Desktop client for Android and Chrome OS](whats-new-client-android-chrome-os.md).
243250

0 commit comments

Comments
 (0)