You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Administrative template for Azure Virtual Desktop
3
-
description: Learn how to use the administrative template (ADMX) for Azure Virtual Desktop with Intune or Group Policy to configure certain settings on your session hosts.
2
+
title: Add the administrative template for Azure Virtual Desktop to Group Policy
3
+
description: Learn how to add the administrative template (ADMX) for Azure Virtual Desktop to Group Policy to configure certain features.
4
4
author: dknappettmsft
5
5
ms.topic: how-to
6
-
ms.date: 04/29/2024
6
+
ms.date: 08/12/2024
7
7
ms.author: daknappe
8
8
---
9
9
10
-
# Use the administrative template for Azure Virtual Desktop
10
+
# Add the administrative template for Azure Virtual Desktop to Group Policy
11
11
12
-
We've created an administrative template for Azure Virtual Desktop to configure some features of Azure Virtual Desktop. You can use the template with:
12
+
We've created an administrative template for Azure Virtual Desktop to configure some features of Azure Virtual Desktop. The template is available for:
13
13
14
-
- Intune, which enables you to centrally configure session hosts that are enrolled in Intune and joined to Microsoft Entra ID or Microsoft Entra hybrid joined.
14
+
-Microsoft Intune, which enables you to centrally configure session hosts that are enrolled in Intune and joined to Microsoft Entra ID or Microsoft Entra hybrid joined. The administrative template is available in the Intune settings catalog without any further configuration.
15
15
16
16
- Group Policy with Active Directory (AD), which enables you to centrally configure session hosts that are joined to an AD domain.
17
17
@@ -28,12 +28,6 @@ You can configure the following features with the administrative template:
28
28
29
29
Before you can configure the template settings, you need to meet the following prerequisites. Select a tab for your scenario.
30
30
31
-
# [Intune](#tab/intune)
32
-
33
-
For Intune device configuration profile, you need the following permission:
34
-
35
-
- Assigned the [**Policy and Profile manager**](/mem/intune/fundamentals/role-based-access-control-reference#policy-and-profile-manager) built-in role-based access control (RBAC) role.
36
-
37
31
# [Group Policy (AD)](#tab/group-policy-domain)
38
32
39
33
For Group Policy in an Active Directory (AD) domain, you need the following permission:
@@ -48,60 +42,60 @@ For local Group Policy on a session host, you need the following permission:
48
42
49
43
---
50
44
51
-
## Configure the administrative template
52
-
53
-
To configure the administrative template, select a tab for your scenario and follow these steps.
54
-
55
-
# [Intune](#tab/intune)
56
-
57
-
1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com/).
45
+
## Add the administrative template to Group Policy
58
46
59
-
1.[Create or edit a configuration profile](/mem/intune/configuration/administrative-templates-windows) for **Windows 10 and later** devices, with the **Settings catalog** profile type.
60
-
61
-
1. In the settings picker, browse to **Administrative templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see settings in the Azure Virtual Desktop subcategory available for you to configure, as shown in the following screenshot:
62
-
63
-
:::image type="content" source="media/administrative-template/azure-virtual-desktop-intune-settings-catalog.png" alt-text="A screenshot of the Intune admin center showing Azure Virtual Desktop settings." lightbox="media/administrative-template/azure-virtual-desktop-intune-settings-catalog.png":::
64
-
65
-
1. Once you've configured settings, apply the configuration profile to your session hosts, then restart your session hosts for the settings to take effect.
47
+
To add the administrative template to Group Policy, select a tab for your scenario and follow these steps.
66
48
67
49
# [Group Policy (AD)](#tab/group-policy-domain)
68
50
69
-
> [!NOTE]
70
-
> These steps assume you're using the [Central Store for Group Policy](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
51
+
1. Download the latest [Azure Virtual Desktop administrative template files](https://aka.ms/avdgpo) and extract the contents of the `.cab` file and `.zip` archive.
71
52
72
-
1.Download the latest [Azure Virtual Desktop administrative template files](https://aka.ms/avdgpo) and extract the contents of the .cab file and .zip archive.
53
+
1.On your domain controllers, copy and paste the following files to the relevant location, depending if you store Group Policy templates in the local `PolicyDefinitions` folder or the [Group Policy Central Store](/troubleshoot/windows-client/group-policy/create-and-manage-central-store). Replace `contoso.com` with your domain name, and `en-US` if you're using a different language.
73
54
74
-
1. Copy and paste the **terminalserver-avd.admx** file to the Group Policy Central Store for your domain, for example `\\contoso.com\SYSVOL\contoso.com\Policies\PolicyDefinitions`, where *contoso.com* is your domain name. Then copy the **terminalserver-avd.adml** file to the `en-us` subfolder.
1. On a device you use to manage Group Policy, open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your session hosts.
77
64
78
65
1. To verify that the Azure Virtual Desktop administrative template is available, browse to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see policy settings for Azure Virtual Desktop available for you to configure, as shown in the following screenshot:
79
66
80
67
:::image type="content" source="media/administrative-template/azure-virtual-desktop-gpo.png" alt-text="A screenshot of the Group Policy Management Editor showing Azure Virtual Desktop policy settings." lightbox="media/administrative-template/azure-virtual-desktop-gpo.png":::
81
68
82
-
1. Once you've configured settings, ensure the policy is applied to your session hosts, then refresh Group Policy on the session hosts or restart them for the settings to take effect.
69
+
1. Refer to the feature you want to configure for detailed instructions on how to configure the settings:
70
+
71
+
-[Graphics related data logging](connection-latency.md#connection-graphics-data-preview)
72
+
-[RDP Shortpath for managed networks](rdp-shortpath.md?tabs=managed-networks)
1. Download the latest [Azure Virtual Desktop administrative template files](https://aka.ms/avdgpo) and extract the contents of the .cab file and .zip archive.
78
+
1. Download the latest [Azure Virtual Desktop administrative template files](https://aka.ms/avdgpo) and extract the contents of the `.cab` file and `.zip` archive.
87
79
88
-
1.Copy and paste the **terminalserver-avd.admx** file to the PolicyDefinitions folder at `%windir%\PolicyDefinitions`. Then copy the **terminalserver-avd.adml** file to the `en-us` subfolder.
80
+
1.On each session host, copy and paste the following files to the relevant location. Replace `en-US` if you're using a different language.
89
81
90
-
1. Open the **Local Group Policy Editor** console.
1. To verify that the Azure Virtual Desktop administrative template is available, browse to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see policy settings for Azure Virtual Desktop available for you to configure, as shown in the following screenshot:
:::image type="content" source="media/administrative-template/azure-virtual-desktop-gpo.png" alt-text="Screenshot of the Local Group Policy Editor showing Azure Virtual Desktop policy settings." lightbox="media/administrative-template/azure-virtual-desktop-gpo.png":::
88
+
1. Open the **Local Group Policy Editor** console on a session host.
95
89
96
-
1.Once you've configured settings, ensure the policy is applied to your session hosts, then refresh Group Policy on the session hosts or restart them for the settings to take effect.
90
+
1.To verify that the Azure Virtual Desktop administrative template is available, browse to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see policy settings for Azure Virtual Desktop available for you to configure, as shown in the following screenshot:
97
91
98
-
---
92
+
:::image type="content" source="media/administrative-template/azure-virtual-desktop-gpo.png" alt-text="Screenshot of the Local Group Policy Editor showing Azure Virtual Desktop policy settings." lightbox="media/administrative-template/azure-virtual-desktop-gpo.png":::
99
93
100
-
## Related content
94
+
1. Refer to the feature you want to configure for detailed instructions on how to configure the settings:
101
95
102
-
Learn how to use the administrative template with the following features:
96
+
-[Graphics related data logging](connection-latency.md#connection-graphics-data-preview)
97
+
-[RDP Shortpath for managed networks](rdp-shortpath.md?tabs=managed-networks)
0 commit comments