Skip to content

Commit d919166

Browse files
authored
Merge pull request #284492 from dknappettmsft/avd-unidirectional-clipboard-updates
AVD clarified clipboard redirection
2 parents b8cc7f2 + 1f3a593 commit d919166

File tree

5 files changed

+109
-134
lines changed

5 files changed

+109
-134
lines changed

articles/virtual-desktop/TOC.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -464,11 +464,8 @@
464464
- name: Watermarking
465465
displayName: security
466466
href: watermarking.md
467-
- name: Configure clipboard transfer direction
468-
displayName: security
469-
href: clipboard-transfer-direction-data-types.md
470-
- name: Configure forensic evidence
471-
displayName: security, purview
467+
- name: Onboard to Purview forensic evidence
468+
displayName: security, purview insider risk management
472469
href: purview-forensic-evidence.md
473470
- name: Connect
474471
items:
@@ -528,6 +525,9 @@
528525
- name: Clipboard
529526
displayName: devices, peripherals, redirections, copy, paste
530527
href: redirection-configure-clipboard.md
528+
- name: Clipboard transfer direction and data types
529+
displayName: security, unidirectional, copy, paste
530+
href: clipboard-transfer-direction-data-types.md
531531
- name: Drives and storage
532532
displayName: devices, peripherals, redirections, usb, drives, storage, flash drive
533533
href: redirection-configure-drives-storage.md
Lines changed: 39 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Administrative template for Azure Virtual Desktop
3-
description: Learn how to use the administrative template (ADMX) for Azure Virtual Desktop with Intune or Group Policy to configure certain settings on your session hosts.
2+
title: Add the administrative template for Azure Virtual Desktop to Group Policy
3+
description: Learn how to add the administrative template (ADMX) for Azure Virtual Desktop to Group Policy to configure certain features.
44
author: dknappettmsft
55
ms.topic: how-to
6-
ms.date: 04/29/2024
6+
ms.date: 08/12/2024
77
ms.author: daknappe
88
---
99

10-
# Use the administrative template for Azure Virtual Desktop
10+
# Add the administrative template for Azure Virtual Desktop to Group Policy
1111

12-
We've created an administrative template for Azure Virtual Desktop to configure some features of Azure Virtual Desktop. You can use the template with:
12+
We've created an administrative template for Azure Virtual Desktop to configure some features of Azure Virtual Desktop. The template is available for:
1313

14-
- Intune, which enables you to centrally configure session hosts that are enrolled in Intune and joined to Microsoft Entra ID or Microsoft Entra hybrid joined.
14+
- Microsoft Intune, which enables you to centrally configure session hosts that are enrolled in Intune and joined to Microsoft Entra ID or Microsoft Entra hybrid joined. The administrative template is available in the Intune settings catalog without any further configuration.
1515

1616
- Group Policy with Active Directory (AD), which enables you to centrally configure session hosts that are joined to an AD domain.
1717

@@ -28,12 +28,6 @@ You can configure the following features with the administrative template:
2828

2929
Before you can configure the template settings, you need to meet the following prerequisites. Select a tab for your scenario.
3030

31-
# [Intune](#tab/intune)
32-
33-
For Intune device configuration profile, you need the following permission:
34-
35-
- Assigned the [**Policy and Profile manager**](/mem/intune/fundamentals/role-based-access-control-reference#policy-and-profile-manager) built-in role-based access control (RBAC) role.
36-
3731
# [Group Policy (AD)](#tab/group-policy-domain)
3832

3933
For Group Policy in an Active Directory (AD) domain, you need the following permission:
@@ -48,60 +42,60 @@ For local Group Policy on a session host, you need the following permission:
4842

4943
---
5044

51-
## Configure the administrative template
52-
53-
To configure the administrative template, select a tab for your scenario and follow these steps.
54-
55-
# [Intune](#tab/intune)
56-
57-
1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com/).
45+
## Add the administrative template to Group Policy
5846

59-
1. [Create or edit a configuration profile](/mem/intune/configuration/administrative-templates-windows) for **Windows 10 and later** devices, with the **Settings catalog** profile type.
60-
61-
1. In the settings picker, browse to **Administrative templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see settings in the Azure Virtual Desktop subcategory available for you to configure, as shown in the following screenshot:
62-
63-
:::image type="content" source="media/administrative-template/azure-virtual-desktop-intune-settings-catalog.png" alt-text="A screenshot of the Intune admin center showing Azure Virtual Desktop settings." lightbox="media/administrative-template/azure-virtual-desktop-intune-settings-catalog.png":::
64-
65-
1. Once you've configured settings, apply the configuration profile to your session hosts, then restart your session hosts for the settings to take effect.
47+
To add the administrative template to Group Policy, select a tab for your scenario and follow these steps.
6648

6749
# [Group Policy (AD)](#tab/group-policy-domain)
6850

69-
> [!NOTE]
70-
> These steps assume you're using the [Central Store for Group Policy](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
51+
1. Download the latest [Azure Virtual Desktop administrative template files](https://aka.ms/avdgpo) and extract the contents of the `.cab` file and `.zip` archive.
7152

72-
1. Download the latest [Azure Virtual Desktop administrative template files](https://aka.ms/avdgpo) and extract the contents of the .cab file and .zip archive.
53+
1. On your domain controllers, copy and paste the following files to the relevant location, depending if you store Group Policy templates in the local `PolicyDefinitions` folder or the [Group Policy Central Store](/troubleshoot/windows-client/group-policy/create-and-manage-central-store). Replace `contoso.com` with your domain name, and `en-US` if you're using a different language.
7354

74-
1. Copy and paste the **terminalserver-avd.admx** file to the Group Policy Central Store for your domain, for example `\\contoso.com\SYSVOL\contoso.com\Policies\PolicyDefinitions`, where *contoso.com* is your domain name. Then copy the **terminalserver-avd.adml** file to the `en-us` subfolder.
55+
- **Filename**: `terminalserver-avd.admx`
56+
- **Local location**: `C:\Windows\PolicyDefinitions\`
57+
- **Central Store**: `\\contoso.com\SYSVOL\contoso.com\Policies\PolicyDefinitions`
7558

76-
1. Open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your session hosts.
59+
- **Filename**: `en-US\terminalserver-avd.adml`
60+
- **Local location**: `C:\Windows\PolicyDefinitions\en-US\`
61+
- **Central Store**: `\\contoso.com\SYSVOL\contoso.com\Policies\PolicyDefinitions\en-US`
62+
63+
1. On a device you use to manage Group Policy, open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your session hosts.
7764

7865
1. To verify that the Azure Virtual Desktop administrative template is available, browse to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see policy settings for Azure Virtual Desktop available for you to configure, as shown in the following screenshot:
7966

8067
:::image type="content" source="media/administrative-template/azure-virtual-desktop-gpo.png" alt-text="A screenshot of the Group Policy Management Editor showing Azure Virtual Desktop policy settings." lightbox="media/administrative-template/azure-virtual-desktop-gpo.png":::
8168

82-
1. Once you've configured settings, ensure the policy is applied to your session hosts, then refresh Group Policy on the session hosts or restart them for the settings to take effect.
69+
1. Refer to the feature you want to configure for detailed instructions on how to configure the settings:
70+
71+
- [Graphics related data logging](connection-latency.md#connection-graphics-data-preview)
72+
- [RDP Shortpath for managed networks](rdp-shortpath.md?tabs=managed-networks)
73+
- [Screen capture protection](screen-capture-protection.md)
74+
- [Watermarking](watermarking.md)
8375

8476
# [Local Group Policy](#tab/local-group-policy)
8577

86-
1. Download the latest [Azure Virtual Desktop administrative template files](https://aka.ms/avdgpo) and extract the contents of the .cab file and .zip archive.
78+
1. Download the latest [Azure Virtual Desktop administrative template files](https://aka.ms/avdgpo) and extract the contents of the `.cab` file and `.zip` archive.
8779

88-
1. Copy and paste the **terminalserver-avd.admx** file to the PolicyDefinitions folder at `%windir%\PolicyDefinitions`. Then copy the **terminalserver-avd.adml** file to the `en-us` subfolder.
80+
1. On each session host, copy and paste the following files to the relevant location. Replace `en-US` if you're using a different language.
8981

90-
1. Open the **Local Group Policy Editor** console.
82+
- **Filename**: `terminalserver-avd.admx`
83+
- **Local location**: `C:\Windows\PolicyDefinitions\`
9184

92-
1. To verify that the Azure Virtual Desktop administrative template is available, browse to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see policy settings for Azure Virtual Desktop available for you to configure, as shown in the following screenshot:
85+
- **Filename**: `en-US\terminalserver-avd.adml`
86+
- **Local location**: `C:\Windows\PolicyDefinitions\en-US\`
9387

94-
:::image type="content" source="media/administrative-template/azure-virtual-desktop-gpo.png" alt-text="Screenshot of the Local Group Policy Editor showing Azure Virtual Desktop policy settings." lightbox="media/administrative-template/azure-virtual-desktop-gpo.png":::
88+
1. Open the **Local Group Policy Editor** console on a session host.
9589

96-
1. Once you've configured settings, ensure the policy is applied to your session hosts, then refresh Group Policy on the session hosts or restart them for the settings to take effect.
90+
1. To verify that the Azure Virtual Desktop administrative template is available, browse to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see policy settings for Azure Virtual Desktop available for you to configure, as shown in the following screenshot:
9791

98-
---
92+
:::image type="content" source="media/administrative-template/azure-virtual-desktop-gpo.png" alt-text="Screenshot of the Local Group Policy Editor showing Azure Virtual Desktop policy settings." lightbox="media/administrative-template/azure-virtual-desktop-gpo.png":::
9993

100-
## Related content
94+
1. Refer to the feature you want to configure for detailed instructions on how to configure the settings:
10195

102-
Learn how to use the administrative template with the following features:
96+
- [Graphics related data logging](connection-latency.md#connection-graphics-data-preview)
97+
- [RDP Shortpath for managed networks](rdp-shortpath.md?tabs=managed-networks)
98+
- [Screen capture protection](screen-capture-protection.md)
99+
- [Watermarking](watermarking.md)
103100

104-
- [Graphics related data logging](connection-latency.md#connection-graphics-data-preview)
105-
- [Screen capture protection](screen-capture-protection.md)
106-
- [RDP Shortpath for managed networks](rdp-shortpath.md?tabs=managed-networks)
107-
- [Watermarking](watermarking.md)
101+
---

0 commit comments

Comments
 (0)