You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/client-device-redirection-intune.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -184,7 +184,11 @@ You need to create an [app configuration policy for managed apps](/mem/intune/ap
184
184
185
185
To create and apply an app configuration policy for managed apps, follow the steps in [App configuration policies for Intune App SDK managed apps](/mem/intune/apps/app-configuration-policies-managed-app) and use the following settings:
186
186
187
-
- On the **Basics** tab, search for and select **Windows App** or **Remote Desktop**.
187
+
- On the **Basics** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
188
+
189
+
- For Windows App, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple` and for platform, select **iOS/iPadOS**.
190
+
191
+
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop** for each platform you want to target.
188
192
189
193
- On the **Settings** tab, expand **General configuration settings**, then enter the following name and value pairs for each redirection setting you want to configure exactly as shown. These values correspond to the RDP properties listed on [Supported RDP properties](/azure/virtual-desktop/rdp-properties#device-redirection), but the syntax is different:
190
194
@@ -207,11 +211,11 @@ You need to create an [app protection policy](/mem/intune/apps/app-protection-po
207
211
208
212
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings. You need to create an app protection policy for each platform you want to target.
209
213
210
-
- On the **Apps** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
214
+
- On the **Apps** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app.
211
215
212
-
- For Windows App on iOS/iPadOS, select **Select public apps**, then search for and select **Windows App**.
216
+
- For Windows App on iOS/iPadOS, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple`.
213
217
214
-
- For the Remote Desktop app on Android, select **Select public apps**, then search for and select **Remote Desktop**.
218
+
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop**.
215
219
216
220
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
0 commit comments