You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/client-device-redirection-intune.md
+12-5Lines changed: 12 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -127,7 +127,7 @@ Here are some recommended policy settings you should use with Intune and Conditi
127
127
- Specify a minimum device operating system version.
128
128
- Specify a minimum Windows App and/or Remote Desktop app version number.
129
129
- Block jailbroken/rooted devices.
130
-
- Require a mobile threat defense solution on devices, with no threats detected.
130
+
- Require a mobile threat defense (MTD) solution on devices, with no threats detected.
131
131
132
132
- Conditional Access:
133
133
- Block access unless criteria set in Intune mobile application management policies are met.
@@ -213,13 +213,13 @@ To create and apply an app configuration policy for managed apps, follow the ste
213
213
214
214
You need to create an [app protection policy](/mem/intune/apps/app-protection-policy) for Windows App and the Remote Desktop app, which enable you to control how data is accessed and shared by apps on mobile devices.
215
215
216
-
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings:
216
+
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings. You need to create an app protection policy for each platform you want to target.
217
217
218
218
- On the **Apps** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
219
219
220
-
- For Windows App, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple` and for platform, select **iOS/iPadOS**.
220
+
- For Windows App on iOS/iPadOS, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple`.
221
221
222
-
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop** for each platform you want to target.
222
+
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop**.
223
223
224
224
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
225
225
@@ -237,7 +237,14 @@ To create and apply an app protection policy, follow the steps in [How to create
237
237
> [!TIP]
238
238
> If you disable clipboard redirection in an app configuration policy, you should set **Restrict cut, copy, and paste between other apps** to **Blocked**.
239
239
240
-
- On the **Conditional launch** tab, we recommend you configure **Min app version** from the drop-down list. Enter a value based on your requirements for the minimum version of the app, then set the action to **Block access**.
240
+
- On the **Conditional launch** tab, we recommend you add the following conditions:
241
+
242
+
| Condition | Condition type | Value | Action |
243
+
|--|--|--|--|
244
+
| Min app version | App condition | Based on your requirements. | Block access |
245
+
| Min OS version | Device condition | Based on your requirements. | Block access |
246
+
| Primary MTD service | Device condition | Based on your requirements.<br /><br />Your MTD connector must be set up. For **Microsoft Defender for Endpoint**, [configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure). | Block access |
For version details, see [What's new in Windows App](/windows-app/whats-new), [What's new in the Remote Desktop client for iOS and iPadOS](whats-new-client-ios-ipados.md), and [What's new in the Remote Desktop client for Android and Chrome OS](whats-new-client-android-chrome-os.md).
0 commit comments