You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/screen-capture-protection.md
+18-17Lines changed: 18 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure
4
4
description: How to set up screen capture protection for Azure Virtual Desktop.
5
5
author: femila
6
6
ms.topic: conceptual
7
-
ms.date: 08/30/2021
7
+
ms.date: 09/14/2022
8
8
ms.author: femila
9
9
ms.service: virtual-desktop
10
10
---
@@ -16,36 +16,37 @@ The screen capture protection feature prevents sensitive information from being
16
16
## Prerequisites
17
17
18
18
The screen capture protection feature is configured on the session host level and enforced on the client. Only clients that support this feature can connect to the remote session.
19
-
Following clients currently support screen capture protection:
20
19
21
-
* Windows Desktop client supports screen capture protection for full desktops only.
22
-
* macOS client version 10.7.0 or later supports screen capture protection for both RemoteApp and full desktops.
20
+
The following clients currently support screen capture protection:
23
21
24
-
Suppose the user attempts to use an unsupported client to connect to the protected session host. In that case, the connection will fail with error 0x1151.
22
+
- The Windows Desktop client supports screen capture protection for full desktops only.
23
+
- The macOS client (version 10.7.0 or later) supports screen capture protection for both RemoteApps and full desktops.
24
+
25
+
If a user tries to connect to a capture-protected session host with an unsupported client, the connection won't work and will instead show an error message labeled "0x1151."
25
26
26
27
## Configure screen capture protection
27
28
28
-
1.To configure screen capture protection, you need to install administrative templates that add rules and settings for Azure Virtual Desktop.
29
-
2. Download the [Azure Virtual Desktop policy templates file](https://aka.ms/avdgpo) (AVDGPTemplate.cab) and extract the contents of the cab file and zip archive.
30
-
3. Copy the **terminalserver-avd.admx**file to **%windir%\PolicyDefinitions** folder.
31
-
4. Copy the **en-us\terminalserver-avd.adml** file to **%windir%\PolicyDefinitions\en-us** folder.
32
-
5. To confirm the files copied correctly, open the Group Policy Editor and navigate to **Computer Configuration** -> **Administrative Templates** -> **Windows Components** -> **Remote Desktop Services** -> **Remote Desktop Session Host** -> **Azure Virtual Desktop**
33
-
6.You should see one or more Azure Virtual Desktop policies, as shown below.
29
+
To configure screen capture protection:
30
+
31
+
1. Download the [Azure Virtual Desktop policy templates file](https://aka.ms/avdgpo) (AVDGPTemplate.cab) and extract the contents of the cab file and zip archive.
32
+
2. Copy the **terminalserver-avd.admx** file to the **%windir%\PolicyDefinitions** folder.
33
+
3. Copy the **en-us\terminalserver-avd.adml** file to the **%windir%\PolicyDefinitions\en-us** folder.
34
+
4. To confirm the files copied correctly, open the Group Policy Editor and go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see one or more Azure Virtual Desktop policies, as shown in the following screenshot.
34
35
35
36
:::image type="content" source="media/azure-virtual-desktop-gpo.png" alt-text="Screenshot of the group policy editor" lightbox="media/azure-virtual-desktop-gpo.png":::
36
37
37
38
> [!TIP]
38
39
> You can also install administrative templates to the group policy Central Store in your Active Directory domain.
39
-
> For more information about Central Store for Group Policy Administrative Templates, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
40
+
> For more information, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
40
41
41
-
7. Open the **"Enable screen capture protection"** policy and set it to **"Enabled"**.
42
+
5. Finally, open the **"Enable screen capture protection"** policy and set it to **"Enabled"**.
42
43
43
44
## Limitations and known issues
44
45
45
-
* This feature protects the Remote Desktop window from being captured through a specific set of public operating system features and APIs. However, there's no guarantee that this feature will strictly protect content, for example, where someone takes photography of the screen.
46
-
* Customers should use the feature together with disabling clipboard, drive, and printer redirection. Disabling redirection will help to prevent the user from copying the captured screen content from the remote session.
47
-
* Users can't share the Remote Desktop window using local collaboration software, such as Microsoft Teams, when the feature is enabled. If Microsoft Teams is used, both the local Teams app and Teams running with media optimizations can't share the protected content.
46
+
- This feature protects the Remote Desktop window from being captured through a specific set of public operating system features and Application Programming Interfaces (APIs). However, there's no guarantee that this feature will strictly protect content in scenarios where a user were to take a photo of their screen with a physical camera.
47
+
- For maximum security, customers should use this feature while also disabling clipboard, drive, and printer redirection. Disabling redirection prevents users from copying any captured screen content from the remote session.
48
+
- Users can't share their Remote Desktop window using local collaboration software, such as Microsoft Teams, while this feature is enabled. When they use Microsoft Teams, neither the local Teams app nor Teams with media optimization can share protected content.
48
49
49
50
## Next steps
50
51
51
-
* To learn about Azure Virtual Desktop security best practices, see [Azure Virtual Desktop security best practices](security-guide.md).
52
+
Learn about how to secure your Azure Virtual Desktop deployment at [Security best practices](security-guide.md).
0 commit comments