Skip to content

Commit d360c32

Browse files
Merge pull request #284501 from sipastak/avd-mam-ga
MAM support for AVD (GA)
2 parents ff37239 + e954b20 commit d360c32

File tree

1 file changed

+5
-13
lines changed

1 file changed

+5
-13
lines changed

articles/virtual-desktop/client-device-redirection-intune.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,11 @@ description: Learn how to configure redirection settings for Windows App and the
44
ms.topic: how-to
55
author: dknappettmsft
66
ms.author: daknappe
7-
ms.date: 05/29/2024
7+
ms.date: 08/21/2024
88
---
99

1010
# Configure client device redirection settings for Windows App and the Remote Desktop app using Microsoft Intune
1111

12-
> [!IMPORTANT]
13-
> Configure redirection settings for Windows App and the Remote Desktop app using Microsoft Intune is currently in PREVIEW.
14-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15-
1612
> [!TIP]
1713
> This article contains information for multiple products that use the Remote Desktop Protocol (RDP) to provide remote access to Windows desktops and applications.
1814
@@ -49,7 +45,7 @@ For Windows App:
4945

5046
| Device platform | Managed devices | Unmanaged devices |
5147
|--|:--:|:--:|
52-
| iOS and iPadOS | <sub>:::image type="icon" source="media/no.svg" border="false":::</sub> | <sub>:::image type="icon" source="media/yes.svg" border="false":::</sub> |
48+
| iOS and iPadOS | <sub>:::image type="icon" source="media/yes.svg" border="false":::</sub> | <sub>:::image type="icon" source="media/yes.svg" border="false":::</sub> |
5349

5450
For the Remote Desktop app:
5551

@@ -188,11 +184,7 @@ You need to create an [app configuration policy for managed apps](/mem/intune/ap
188184

189185
To create and apply an app configuration policy for managed apps, follow the steps in [App configuration policies for Intune App SDK managed apps](/mem/intune/apps/app-configuration-policies-managed-app) and use the following settings:
190186

191-
- On the **Basics** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
192-
193-
- For Windows App, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple` and for platform, select **iOS/iPadOS**.
194-
195-
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop** for each platform you want to target.
187+
- On the **Basics** tab, search for and select **Windows App** or **Remote Desktop**.
196188

197189
- On the **Settings** tab, expand **General configuration settings**, then enter the following name and value pairs for each redirection setting you want to configure exactly as shown. These values correspond to the RDP properties listed on [Supported RDP properties](/azure/virtual-desktop/rdp-properties#device-redirection), but the syntax is different:
198190

@@ -217,9 +209,9 @@ To create and apply an app protection policy, follow the steps in [How to create
217209

218210
- On the **Apps** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
219211

220-
- For Windows App on iOS/iPadOS, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple`.
212+
- For Windows App on iOS/iPadOS, select **Select public apps**, then search for and select **Windows App**.
221213

222-
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop**.
214+
- For the Remote Desktop app on Android, select **Select public apps**, then search for and select **Remote Desktop**.
223215

224216
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
225217

0 commit comments

Comments
 (0)