Skip to content

Commit b607aa2

Browse files
authored
Merge pull request #210945 from Heidilohr/work-screen-capture
Fixing up screen capture article and moving to how-tos
2 parents 7ae31a7 + bc108c8 commit b607aa2

File tree

2 files changed

+20
-19
lines changed

2 files changed

+20
-19
lines changed

articles/virtual-desktop/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -139,8 +139,6 @@
139139
href: security-guide.md
140140
- name: Security baseline
141141
href: /security/benchmark/azure/baselines/virtual-desktop-security-baseline?context=/azure/virtual-desktop/context/context
142-
- name: Screen capture protection
143-
href: screen-capture-protection.md
144142
- name: Azure Virtual Desktop for Azure Stack HCI
145143
items:
146144
- name: Overview (preview)
@@ -227,6 +225,8 @@
227225
href: move-resources.md
228226
- name: Use Azure Virtual Desktop license
229227
href: apply-windows-license.md
228+
- name: Screen capture protection
229+
href: screen-capture-protection.md
230230
- name: Customize session host image
231231
items:
232232
- name: Set up golden image in Azure

articles/virtual-desktop/screen-capture-protection.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure
44
description: How to set up screen capture protection for Azure Virtual Desktop.
55
author: femila
66
ms.topic: conceptual
7-
ms.date: 08/30/2021
7+
ms.date: 09/14/2022
88
ms.author: femila
99
ms.service: virtual-desktop
1010
---
@@ -16,36 +16,37 @@ The screen capture protection feature prevents sensitive information from being
1616
## Prerequisites
1717

1818
The screen capture protection feature is configured on the session host level and enforced on the client. Only clients that support this feature can connect to the remote session.
19-
Following clients currently support screen capture protection:
2019

21-
* Windows Desktop client supports screen capture protection for full desktops only.
22-
* macOS client version 10.7.0 or later supports screen capture protection for both RemoteApp and full desktops.
20+
The following clients currently support screen capture protection:
2321

24-
Suppose the user attempts to use an unsupported client to connect to the protected session host. In that case, the connection will fail with error 0x1151.
22+
- The Windows Desktop client supports screen capture protection for full desktops only.
23+
- The macOS client (version 10.7.0 or later) supports screen capture protection for both RemoteApps and full desktops.
24+
25+
If a user tries to connect to a capture-protected session host with an unsupported client, the connection won't work and will instead show an error message labeled "0x1151."
2526

2627
## Configure screen capture protection
2728

28-
1. To configure screen capture protection, you need to install administrative templates that add rules and settings for Azure Virtual Desktop.
29-
2. Download the [Azure Virtual Desktop policy templates file](https://aka.ms/avdgpo) (AVDGPTemplate.cab) and extract the contents of the cab file and zip archive.
30-
3. Copy the **terminalserver-avd.admx** file to **%windir%\PolicyDefinitions** folder.
31-
4. Copy the **en-us\terminalserver-avd.adml** file to **%windir%\PolicyDefinitions\en-us** folder.
32-
5. To confirm the files copied correctly, open the Group Policy Editor and navigate to **Computer Configuration** -> **Administrative Templates** -> **Windows Components** -> **Remote Desktop Services** -> **Remote Desktop Session Host** -> **Azure Virtual Desktop**
33-
6. You should see one or more Azure Virtual Desktop policies, as shown below.
29+
To configure screen capture protection:
30+
31+
1. Download the [Azure Virtual Desktop policy templates file](https://aka.ms/avdgpo) (AVDGPTemplate.cab) and extract the contents of the cab file and zip archive.
32+
2. Copy the **terminalserver-avd.admx** file to the **%windir%\PolicyDefinitions** folder.
33+
3. Copy the **en-us\terminalserver-avd.adml** file to the **%windir%\PolicyDefinitions\en-us** folder.
34+
4. To confirm the files copied correctly, open the Group Policy Editor and go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see one or more Azure Virtual Desktop policies, as shown in the following screenshot.
3435

3536
:::image type="content" source="media/azure-virtual-desktop-gpo.png" alt-text="Screenshot of the group policy editor" lightbox="media/azure-virtual-desktop-gpo.png":::
3637

3738
> [!TIP]
3839
> You can also install administrative templates to the group policy Central Store in your Active Directory domain.
39-
> For more information about Central Store for Group Policy Administrative Templates, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
40+
> For more information, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
4041
41-
7. Open the **"Enable screen capture protection"** policy and set it to **"Enabled"**.
42+
5. Finally, open the **"Enable screen capture protection"** policy and set it to **"Enabled"**.
4243

4344
## Limitations and known issues
4445

45-
* This feature protects the Remote Desktop window from being captured through a specific set of public operating system features and APIs. However, there's no guarantee that this feature will strictly protect content, for example, where someone takes photography of the screen.
46-
* Customers should use the feature together with disabling clipboard, drive, and printer redirection. Disabling redirection will help to prevent the user from copying the captured screen content from the remote session.
47-
* Users can't share the Remote Desktop window using local collaboration software, such as Microsoft Teams, when the feature is enabled. If Microsoft Teams is used, both the local Teams app and Teams running with media optimizations can't share the protected content.
46+
- This feature protects the Remote Desktop window from being captured through a specific set of public operating system features and Application Programming Interfaces (APIs). However, there's no guarantee that this feature will strictly protect content in scenarios where a user were to take a photo of their screen with a physical camera.
47+
- For maximum security, customers should use this feature while also disabling clipboard, drive, and printer redirection. Disabling redirection prevents users from copying any captured screen content from the remote session.
48+
- Users can't share their Remote Desktop window using local collaboration software, such as Microsoft Teams, while this feature is enabled. When they use Microsoft Teams, neither the local Teams app nor Teams with media optimization can share protected content.
4849

4950
## Next steps
5051

51-
* To learn about Azure Virtual Desktop security best practices, see [Azure Virtual Desktop security best practices](security-guide.md).
52+
Learn about how to secure your Azure Virtual Desktop deployment at [Security best practices](security-guide.md).

0 commit comments

Comments
 (0)