You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/screen-capture-protection.md
+20-2Lines changed: 20 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to enable screen capture protection in Azure Virtual Desk
4
4
ms.topic: how-to
5
5
author: dougeby
6
6
ms.author: avdcontent
7
-
ms.date: 02/05/2025
7
+
ms.date: 06/06/2025
8
8
---
9
9
10
10
# Enable screen capture protection in Azure Virtual Desktop
@@ -55,8 +55,26 @@ The steps to configure screen capture protection depend on where you configure i
55
55
> [!IMPORTANT]
56
56
> You need to choose which local devices to use with screen capture protection based on your requirements. There isn't a scenario where you can enable screen capture protection on all platforms from the same session hosts at the same time. If both are configured, screen capture protection on session hosts takes precedence over using an Intune MAM policy on local devices.
57
57
58
+
## Platform considerations for screen capture protection on macOS
59
+
60
+
While fully supported on Windows, there are known limitations on macOS due to the platform's current security architecture:
61
+
62
+
-**Microsoft Teams compatibility**: on macOS, enabling screen capture protection might interfere with screen sharing in Microsoft Teams, potentially causing shared windows to appear blank or not display properly. If Teams-based collaboration is required, screen capture protection might need to be temporarily disabled on the device.
63
+
64
+
-**Platform-level enforcement**: due to macOS restrictions, some native applications might not fully respect screen capture protection enforcement. This is a limitation of the operating system's available APIs, not a defect in screen capture protection itself.
65
+
66
+
Here are some recommendations for these limitations:
67
+
68
+
- For collaboration-heavy macOS workflows, consider configuring screen capture protection settings based on business need and risk level.
69
+
70
+
- For highly sensitive content, Windows endpoints are recommended for full enforcement of screen protection features.
71
+
72
+
- Watermarking and administrative policies can be used to further discourage misuse on platforms with limited enforcement.
73
+
58
74
## Prerequisites
59
75
76
+
Before you can configure screen capture protection, ensure you meet the following prerequisites:
77
+
60
78
- For scenarios where you need to configure session hosts, those session hosts must be running a Windows 11, version 22H2 or later, or Windows 10, version 22H2 or later.
61
79
62
80
- Users must connect to Azure Virtual Desktop with Windows App or the Remote Desktop app to use screen capture protection. The following table shows supported scenarios:
@@ -156,7 +174,7 @@ To use screen capture protection on iOS/iPadOS and Android devices running Windo
156
174
157
175
To configure an Intune app protection policy to enable screen capture protection on iOS/iPadOS and Android devices:
158
176
159
-
1. Follow the steps to [Require local client device security compliance with Microsoft Intune and Microsoft Entra Conditional Access](/windows-app/manage-device-redirection-intune?context=/azure/virtual-desktop/context/context). This provides the foundation to configure screen capture protection on iOS/iPadOS and Android devices running Windows App.
177
+
1. Follow the steps to [Require local client device security compliance with Microsoft Intune and Microsoft Entra Conditional Access](/windows-app/manage-device-redirection-intune?context=/azure/virtual-desktop/context/context). Local client device security compliance provides the foundation to configure screen capture protection on iOS/iPadOS and Android devices running Windows App.
160
178
161
179
1. When configuring an app protection policy, on the **Data protection** tab, configure the following setting, depending on the platform:
0 commit comments