Skip to content

Commit e191583

Browse files
authored
updated for iOS Windows App MAM
Replaced Remote Desktop with Windows App for iOS setup instructions. Android still requires Remote Desktop for MAM as of Nov 1st 2024. Android Windows App Preview support for MAM might be announced end of Nov.
1 parent b5009c7 commit e191583

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

articles/virtual-desktop/client-device-redirection-intune.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Configure client device redirection settings for Windows App and the Remote Desktop app using Microsoft Intune
3-
description: Learn how to configure redirection settings for Windows App and the Remote Desktop app for iOS/iPadOS and Android client devices using Microsoft Intune.
3+
description: Learn how to configure redirection settings for iOS/iPadOS Windows App and Android Remote Desktop client using Microsoft Intune.
44
ms.topic: how-to
55
author: dknappettmsft
66
ms.author: daknappe
7-
ms.date: 08/21/2024
7+
ms.date: 10/31/2024
88
---
99

1010
# Configure client device redirection settings for Windows App and the Remote Desktop app using Microsoft Intune
@@ -47,6 +47,7 @@ For Windows App:
4747
|--|:--:|:--:|
4848
| iOS and iPadOS | <sub>:::image type="icon" source="media/yes.svg" border="false":::</sub> | <sub>:::image type="icon" source="media/yes.svg" border="false":::</sub> |
4949

50+
5051
For the Remote Desktop app:
5152

5253
| Device platform | Managed devices | Unmanaged devices |
@@ -139,14 +140,13 @@ Before you can configure redirection settings on a client device using Microsoft
139140

140141
- At least one security group containing users to apply the policies to.
141142

142-
- To use the Remote Desktop app with enrolled devices on iOS and iPadOS, you need to add each app to Intune from the App Store. For more information, see [Add iOS store apps to Microsoft Intune](/mem/intune/apps/store-apps-ios).
143+
- To use the Windows App with enrolled devices on iOS and iPadOS, you need to add each app to Intune from the App Store. For more information, see [Add iOS store apps to Microsoft Intune](/mem/intune/apps/store-apps-ios).
143144

144145
- A client device running one of the following versions of Windows App or the Remote Desktop app:
145146
- For Windows App:
146-
- iOS and iPadOS: 10.5.2 or later.
147+
- iOS and iPadOS: 11.0.4 or later.
147148

148149
- Remote Desktop app:
149-
- iOS and iPadOS: 10.5.8 or later.
150150
- Android: 10.0.19.1279 or later.
151151

152152
- There are more Intune prerequisites for configuring app configuration policies, app protection policies, and Conditional Access policies. For more information, see:
@@ -162,11 +162,11 @@ To learn about filters and how to create them, see [Use filters when assigning y
162162

163163
## Create an app configuration policy for managed devices
164164

165-
For iOS and iPadOS devices that are enrolled only, you need to create an [app configuration policy for managed devices](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for the Remote Desktop app.
165+
For iOS and iPadOS devices that are enrolled only, you need to create an [app configuration policy for managed devices](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for the Windows App app. This step is not needed for Android.
166166

167167
To create and apply an app configuration policy for managed devices, follow the steps in [Add app configuration policies for managed iOS/iPadOS devices](/mem/intune/apps/app-configuration-policies-use-ios) and use the following settings:
168168

169-
- On the **Basics** tab, for **targeted app**, select the **Remote Desktop Mobile** app from the list. You need to have added the app to Intune from the App Store for it to show in this list.
169+
- On the **Basics** tab, for **targeted app**, select the **Windows App** app from the list. You need to have added the app to Intune from the App Store for it to show in this list.
170170

171171
- On the **Settings** tab, for the **Configuration settings format** drop-down list, select **Use configuration designer**, then enter the following settings exactly as shown:
172172

@@ -180,11 +180,11 @@ To create and apply an app configuration policy for managed devices, follow the
180180

181181
## Create an app configuration policy for managed apps
182182

183-
You need to create an [app configuration policy for managed apps](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for Windows App and the Remote Desktop app, which enable you to provide configuration settings.
183+
You need to create a separate [app configuration policy for managed apps](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for Windows App (iOS/iPadOS) and the Remote Desktop app (Android), which enable you to provide configuration settings. Do not configure both Android and iOS in the same configuration policy or you will not be able to configure policy targeting based on managed and unmanaged devices.
184184

185185
To create and apply an app configuration policy for managed apps, follow the steps in [App configuration policies for Intune App SDK managed apps](/mem/intune/apps/app-configuration-policies-managed-app) and use the following settings:
186186

187-
- On the **Basics** tab, select **Select public apps**, then search for and select **Remote Desktop**. Selecting **Remote Desktop** applies to both Windows App and the Remote Desktop app.
187+
- On the **Basics** tab, select **Select public apps**, then search for and select **Remote Desktop** for Android and **Windows App** for iOS/iPadOS.
188188

189189
- On the **Settings** tab, expand **General configuration settings**, then enter the following name and value pairs for each redirection setting you want to configure exactly as shown. These values correspond to the RDP properties listed on [Supported RDP properties](/azure/virtual-desktop/rdp-properties#device-redirection), but the syntax is different:
190190

@@ -203,13 +203,13 @@ To create and apply an app configuration policy for managed apps, follow the ste
203203

204204
## Create an app protection policy
205205

206-
You need to create an [app protection policy](/mem/intune/apps/app-protection-policy) for Windows App and the Remote Desktop app, which enable you to control how data is accessed and shared by apps on mobile devices.
206+
You need to create a separate [app protection policy](/mem/intune/apps/app-protection-policy) for Windows App (iOS/iPadOS) and the Remote Desktop app (Android), which enable you to control how data is accessed and shared by apps on mobile devices. Do not configure both Android and iOS/iPadOS in the same protection policy or you will not be able to configure policy targeting based on managed and unmanaged devices.
207207

208-
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings. You need to create an app protection policy for each platform you want to target.
208+
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings.
209209

210-
- On the **Apps** tab, select **Select public apps**, then search for and select **Remote Desktop**. Selecting **Remote Desktop** applies to both Windows App and the Remote Desktop app.
210+
- On the **Apps** tab, select **Select public apps**, then search for and select **Remote Desktop** for Android and **Windows App** for iOS/iPadOS.
211211

212-
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
212+
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
213213

214214
- For iOS and iPadOS you can configure the following settings:
215215

@@ -234,7 +234,7 @@ To create and apply an app protection policy, follow the steps in [How to create
234234
| Primary MTD service | Device condition | Based on your requirements.<br /><br />Your MTD connector must be set up. For **Microsoft Defender for Endpoint**, [configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure). | Block access |
235235
| Max allowed device threat level | Device condition | Secured | Block access |
236236

237-
For version details, see [What's new in Windows App](/windows-app/whats-new), [What's new in the Remote Desktop client for iOS and iPadOS](whats-new-client-ios-ipados.md), and [What's new in the Remote Desktop client for Android and Chrome OS](whats-new-client-android-chrome-os.md).
237+
For version details, see [What's new in Windows App](/windows-app/whats-new?tabs=ios-ipados), and [What's new in the Remote Desktop client for Android and Chrome OS](whats-new-client-android-chrome-os.md).
238238

239239
For more information about the available settings, see [Conditional launch in iOS app protection policy settings](/mem/intune/apps/app-protection-policy-settings-ios#conditional-launch) and [Conditional launch in Android app protection policy settings](/mem/intune/apps/app-protection-policy-settings-android#conditional-launch).
240240

@@ -250,7 +250,7 @@ To create and apply a Conditional Access policy, follow the steps in [Set up app
250250

251251
- For **Assignments**, include the security group containing the users to apply the policy to. You must apply the policy to a group of users to have the policy take effect.
252252

253-
- For **Target resources**, select to apply the policy to **Cloud apps**, then for **Include**, select **Select apps**. Search for and select **Azure Virtual Desktop** and **Windows 365**. You only have Azure Virtual Desktop in the list if you [registered the `Microsoft.DesktopVirtualization` resource provider on a subscription](prerequisites.md#azure-account-with-an-active-subscription) in your Microsoft Entra tenant.
253+
- For **Target resources**, select to apply the policy to **Cloud apps**, then for **Include**, select **Select apps**. Search for and select **Azure Virtual Desktop** and **Windows 365**. You only have Azure Virtual Desktop in the list if you [registered the `Microsoft.DesktopVirtualization` resource provider on a subscription](prerequisites.md#azure-account-with-an-active-subscription) in your Microsoft Entra tenant. If single sign-on on a managed device is use, additional apps are required.
254254

255255
- For **Conditions**:
256256
- Select **Device platforms**, then include **iOS** and **Android**.

0 commit comments

Comments
 (0)