Skip to content

Commit 8c170ba

Browse files
authored
Merge pull request #279580 from dknappettmsft/avd-scp-windows-app
AVD screen capture protection added Windows App and reformat
2 parents b073b35 + d5b627c commit 8c170ba

File tree

3 files changed

+86
-20
lines changed

3 files changed

+86
-20
lines changed
41 KB
Loading
53 KB
Loading
Lines changed: 86 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,21 @@
11
---
22
title: Screen capture protection in Azure Virtual Desktop
3-
titleSuffix: Azure
4-
description: Learn how to enable screen capture protection in Azure Virtual Desktop (preview) to help prevent sensitive information from being captured on client endpoints.
5-
author: dknappettmsft
3+
description: Learn how to enable screen capture protection in Azure Virtual Desktop (preview) to help prevent sensitive information from being captured on client devices.
64
ms.topic: how-to
7-
ms.date: 07/21/2023
5+
author: dknappettmsft
86
ms.author: daknappe
7+
ms.date: 06/28/2024
98
---
109

1110
# Enable screen capture protection in Azure Virtual Desktop
1211

13-
Screen capture protection, alongside [watermarking](watermarking.md), helps prevent sensitive information from being captured on client endpoints through a specific set of operating system (OS) features and Application Programming Interfaces (APIs). When you enable screen capture protection, remote content is automatically blocked in screenshots and screen sharing.
12+
Screen capture protection, alongside [watermarking](watermarking.md), helps prevent sensitive information from being captured on client endpoints through a specific set of operating system (OS) features and Application Programming Interfaces (APIs). When you enable screen capture protection, remote content is automatically blocked in screenshots and screen sharing. You can configure screen capture protection using Microsoft Intune or Group Policy on your session hosts.
1413

1514
There are two supported scenarios for screen capture protection, depending on the version of Windows you're using:
1615

17-
- **Block screen capture on client**: the session host instructs a supported Remote Desktop client to enable screen capture protection for a remote session. This prevents screen capture from the client of applications running in the remote session.
16+
- **Block screen capture on client**: the session host instructs a supported Remote Desktop client to enable screen capture protection for a remote session. This option prevents screen capture from the client of applications running in the remote session.
1817

19-
- **Block screen capture on client and server**: the session host instructs a supported Remote Desktop client to enable screen capture protection for a remote session. This prevents screen capture from the client of applications running in the remote session, but also prevents tools and services within the session host from capturing the screen.
18+
- **Block screen capture on client and server**: the session host instructs a supported Remote Desktop client to enable screen capture protection for a remote session. This option prevents screen capture from the client of applications running in the remote session, but also prevents tools and services within the session host from capturing the screen.
2019

2120
When screen capture protection is enabled, users can't share their Remote Desktop window using local collaboration software, such as Microsoft Teams. With Teams, neither the local Teams app or using [Teams with media optimization](teams-on-avd.md) can share protected content.
2221

@@ -32,30 +31,97 @@ When screen capture protection is enabled, users can't share their Remote Deskto
3231
- **Block screen capture on client** is available with a [supported version of Windows 10 or Windows 11](prerequisites.md#operating-systems-and-licenses).
3332
- **Block screen capture on client and server** is available starting with Windows 11, version 22H2.
3433

35-
- Users must connect to Azure Virtual Desktop with one of the following Remote Desktop clients to use screen capture protection. If a user tries to connect with a different client or version, the connection is denied and shows an error message with the code `0x1151`.
34+
- Users must connect to Azure Virtual Desktop with Windows App or the Remote Desktop app to use screen capture protection. The following table shows supported scenarios. If a user tries to connect with a different app or version, the connection is denied and shows an error message with the code `0x1151`.
3635

37-
| Client | Client version | Desktop session | RemoteApp session |
36+
| App | Version | Desktop session | RemoteApp session |
3837
|--|--|--|--|
39-
| Remote Desktop client for Windows | 1.2.1672 or later | Yes | Yes. Client device OS must be Windows 11, version 22H2 or later. |
38+
| Windows App on Windows | Any | Yes | Yes. Client device OS must be Windows 11, version 22H2 or later. |
39+
| Remote Desktop client on Windows | 1.2.1672 or later | Yes | Yes. Client device OS must be Windows 11, version 22H2 or later. |
4040
| Azure Virtual Desktop Store app | Any | Yes | Yes. Client device OS must be Windows 11, version 22H2 or later. |
41-
| Remote Desktop client for macOS | 10.7.0 or later | Yes | Yes |
41+
| Windows App on macOS | Any | Yes | Yes |
42+
| Remote Desktop client on macOS | 10.7.0 or later | Yes | Yes |
43+
44+
- To configure Microsoft Intune, you need:
45+
46+
- Microsoft Entra ID account that is assigned the [Policy and Profile manager](/mem/intune/fundamentals/role-based-access-control-reference#policy-and-profile-manager) built-in RBAC role.
47+
48+
- A group containing the devices you want to configure.
49+
50+
- To configure Group Policy, you need:
51+
52+
- A domain account that is a member of the **Domain Admins** security group.
53+
54+
- A security group or organizational unit (OU) containing the devices you want to configure.
4255

4356
## Enable screen capture protection
4457

45-
Screen capture protection is configured on session hosts and enforced by the client. You configure the settings by using Intune or Group Policy.
58+
Screen capture protection is configured on session hosts and enforced by the client. Select the relevant tab for your scenario.
59+
60+
# [Microsoft Intune](#tab/intune)
61+
62+
To configure screen capture protection using Microsoft Intune:
63+
64+
1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com/).
65+
66+
1. [Create or edit a configuration profile](/mem/intune/configuration/administrative-templates-windows) for **Windows 10 and later** devices, with the **Settings catalog** profile type.
67+
68+
1. In the settings picker, browse to **Administrative templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**.
69+
70+
:::image type="content" source="media/administrative-template/azure-virtual-desktop-intune-settings-catalog.png" alt-text="A screenshot showing the Azure Virtual Desktop options in the Microsoft Intune portal." lightbox="media/administrative-template/azure-virtual-desktop-intune-settings-catalog.png":::
71+
72+
1. Check the box for **Enable screen capture protection**, then close the settings picker.
73+
74+
1. Expand the **Administrative templates** category, then toggle the switch for **Enable screen capture protection** to **Enabled**.
75+
76+
:::image type="content" source="media/screen-capture-protection/screen-capture-protection-intune.png" alt-text="A screenshot showing the screen capture protection settings in Microsoft Intune." lightbox="media/screen-capture-protection/screen-capture-protection-intune.png":::
77+
78+
1. Toggle the switch for **Screen Capture Protection Options (Device)** to **off** for **Block screen capture on client**, or **on** for **Block screen capture on client and server** based on your requirements, then select **OK**.
79+
80+
1. Select **Next**.
81+
82+
1. *Optional*: On the **Scope tags** tab, select a scope tag to filter the profile. For more information about scope tags, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
83+
84+
1. On the **Assignments** tab, select the group containing the computers providing a remote session you want to configure, then select **Next**.
85+
86+
1. On the **Review + create** tab, review the settings, then select **Create**.
87+
88+
1. Once the policy applies to the computers providing a remote session, restart them for the settings to take effect.
89+
90+
# [Group Policy](#tab/group-policy)
91+
92+
To configure screen capture protection using Group Policy:
93+
94+
1. Follow the steps to make the [Administrative template for Azure Virtual Desktop](administrative-template.md) available to Group Policy.
95+
96+
1. Open the **Group Policy Management** console on device you use to manage the Active Directory domain.
97+
98+
1. Create or edit a policy that targets the computers providing a remote session you want to configure.
99+
100+
1. Navigate to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**.
101+
102+
:::image type="content" source="media/administrative-template/azure-virtual-desktop-gpo.png" alt-text="A screenshot showing the Azure Virtual Desktop options in Group Policy." lightbox="media/administrative-template/azure-virtual-desktop-gpo.png":::
103+
104+
1. Double-click the policy setting **Enable screen capture protection** to open it, then select **Enabled**.
105+
106+
:::image type="content" source="media/screen-capture-protection/screen-capture-protection-group-policy.png" alt-text="A screenshot showing the screen capture protection settings in Group Policy." lightbox="media/screen-capture-protection/screen-capture-protection-group-policy.png":::
107+
108+
1. From the drop-down menu, select the screen capture protection scenario you want to use from **Block screen capture on client** or **Block screen capture on client and server** based on your requirements, then select **OK**.
109+
110+
1. Ensure the policy is applied to the computers providing a remote session, then restart them for the settings to take effect.
111+
112+
---
46113

47-
To configure screen capture protection:
114+
## Verify screen capture protection
48115

49-
1. Follow the steps to make the [Administrative template for Azure Virtual Desktop](administrative-template.md) available.
116+
To verify screen capture protection is working:
50117

51-
1. Once you've verified that the administrative template is available, open the policy setting **Enable screen capture protection** and set it to **Enabled**.
118+
1. Connect to a remote session with a supported client.
52119

53-
1. From the drop-down menu, select the screen capture protection scenario you want to use from **Block screen capture on client** or **Block screen capture on client and server**.
120+
1. Take a screenshot or share your screen in a Teams call or meeting. The content should be blocked or hidden. Any existing sessions need to sign out and back in again for the change to take effect.
54121

55-
1. Apply the policy settings to your session hosts by running a Group Policy update or Intune device sync.
56122

57-
1. Connect to a remote session with a supported client and test screen capture protection is working by taking a screenshot or sharing your screen. The content should be blocked or hidden. Any existing sessions will need to sign out and back in again for the change to take effect.
123+
## Related content
58124

59-
## Next steps
125+
- Enable [watermarking](watermarking.md), where admins can use a QR code to trace the session.
60126

61-
Learn about how to secure your Azure Virtual Desktop deployment at [Security best practices](security-guide.md).
127+
- Learn about how to secure your Azure Virtual Desktop deployment at [Security best practices](security-guide.md).

0 commit comments

Comments
 (0)