You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Replaced Remote Desktop with Windows App for iOS setup instructions. Android still requires Remote Desktop for MAM as of Nov 1st 2024.
Android Windows App Preview support for MAM might be announced end of Nov.
Copy file name to clipboardExpand all lines: articles/virtual-desktop/client-device-redirection-intune.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Configure client device redirection settings for Windows App and the Remote Desktop app using Microsoft Intune
3
-
description: Learn how to configure redirection settings for Windows App and the Remote Desktop app for iOS/iPadOS and Android client devices using Microsoft Intune.
3
+
description: Learn how to configure redirection settings for iOS/iPadOS Windows App and Android Remote Desktop client using Microsoft Intune.
4
4
ms.topic: how-to
5
5
author: dknappettmsft
6
6
ms.author: daknappe
7
-
ms.date: 08/21/2024
7
+
ms.date: 10/31/2024
8
8
---
9
9
10
10
# Configure client device redirection settings for Windows App and the Remote Desktop app using Microsoft Intune
@@ -139,14 +140,13 @@ Before you can configure redirection settings on a client device using Microsoft
139
140
140
141
- At least one security group containing users to apply the policies to.
141
142
142
-
- To use the Remote Desktop app with enrolled devices on iOS and iPadOS, you need to add each app to Intune from the App Store. For more information, see [Add iOS store apps to Microsoft Intune](/mem/intune/apps/store-apps-ios).
143
+
- To use the Windows App with enrolled devices on iOS and iPadOS, you need to add each app to Intune from the App Store. For more information, see [Add iOS store apps to Microsoft Intune](/mem/intune/apps/store-apps-ios).
143
144
144
145
- A client device running one of the following versions of Windows App or the Remote Desktop app:
145
146
- For Windows App:
146
-
- iOS and iPadOS: 10.5.2 or later.
147
+
- iOS and iPadOS: 11.0.4 or later.
147
148
148
149
- Remote Desktop app:
149
-
- iOS and iPadOS: 10.5.8 or later.
150
150
- Android: 10.0.19.1279 or later.
151
151
152
152
- There are more Intune prerequisites for configuring app configuration policies, app protection policies, and Conditional Access policies. For more information, see:
@@ -162,11 +162,11 @@ To learn about filters and how to create them, see [Use filters when assigning y
162
162
163
163
## Create an app configuration policy for managed devices
164
164
165
-
For iOS and iPadOS devices that are enrolled only, you need to create an [app configuration policy for managed devices](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for the Remote Desktop app.
165
+
For iOS and iPadOS devices that are enrolled only, you need to create an [app configuration policy for managed devices](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for the Windows App app. This step is not needed for Android.
166
166
167
167
To create and apply an app configuration policy for managed devices, follow the steps in [Add app configuration policies for managed iOS/iPadOS devices](/mem/intune/apps/app-configuration-policies-use-ios) and use the following settings:
168
168
169
-
- On the **Basics** tab, for **targeted app**, select the **Remote Desktop Mobile** app from the list. You need to have added the app to Intune from the App Store for it to show in this list.
169
+
- On the **Basics** tab, for **targeted app**, select the **Windows App** app from the list. You need to have added the app to Intune from the App Store for it to show in this list.
170
170
171
171
- On the **Settings** tab, for the **Configuration settings format** drop-down list, select **Use configuration designer**, then enter the following settings exactly as shown:
172
172
@@ -180,11 +180,11 @@ To create and apply an app configuration policy for managed devices, follow the
180
180
181
181
## Create an app configuration policy for managed apps
182
182
183
-
You need to create an [app configuration policy for managed apps](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for Windows App and the Remote Desktop app, which enable you to provide configuration settings.
183
+
You need to create a separate [app configuration policy for managed apps](/mem/intune/apps/app-configuration-policies-overview#managed-devices) for Windows App (iOS/iPadOS) and the Remote Desktop app (Android), which enable you to provide configuration settings. Do not configure both Android and iOS in the same configuration policy or you will not be able to configure policy targeting based on managed and unmanaged devices.
184
184
185
185
To create and apply an app configuration policy for managed apps, follow the steps in [App configuration policies for Intune App SDK managed apps](/mem/intune/apps/app-configuration-policies-managed-app) and use the following settings:
186
186
187
-
- On the **Basics** tab, select **Select public apps**, then search for and select **Remote Desktop**. Selecting **Remote Desktop** applies to both Windows App and the Remote Desktop app.
187
+
- On the **Basics** tab, select **Select public apps**, then search for and select **Remote Desktop** for Android and **Windows App** for iOS/iPadOS.
188
188
189
189
- On the **Settings** tab, expand **General configuration settings**, then enter the following name and value pairs for each redirection setting you want to configure exactly as shown. These values correspond to the RDP properties listed on [Supported RDP properties](/azure/virtual-desktop/rdp-properties#device-redirection), but the syntax is different:
190
190
@@ -203,13 +203,13 @@ To create and apply an app configuration policy for managed apps, follow the ste
203
203
204
204
## Create an app protection policy
205
205
206
-
You need to create an [app protection policy](/mem/intune/apps/app-protection-policy) for Windows App and the Remote Desktop app, which enable you to control how data is accessed and shared by apps on mobile devices.
206
+
You need to create a separate [app protection policy](/mem/intune/apps/app-protection-policy) for Windows App (iOS/iPadOS) and the Remote Desktop app (Android), which enable you to control how data is accessed and shared by apps on mobile devices. Do not configure both Android and iOS/iPadOS in the same protection policy or you will not be able to configure policy targeting based on managed and unmanaged devices.
207
207
208
-
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings. You need to create an app protection policy for each platform you want to target.
208
+
To create and apply an app protection policy, follow the steps in [How to create and assign app protection policies](/mem/intune/apps/app-protection-policies) and use the following settings.
209
209
210
-
- On the **Apps** tab, select **Select public apps**, then search for and select **Remote Desktop**. Selecting **Remote Desktop** applies to both Windows App and the Remote Desktop app.
210
+
- On the **Apps** tab, select **Select public apps**, then search for and select **Remote Desktop** for Android and **Windows App** for iOS/iPadOS.
211
211
212
-
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
212
+
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
213
213
214
214
- For iOS and iPadOS you can configure the following settings:
215
215
@@ -234,7 +234,7 @@ To create and apply an app protection policy, follow the steps in [How to create
234
234
| Primary MTD service | Device condition | Based on your requirements.<br /><br />Your MTD connector must be set up. For **Microsoft Defender for Endpoint**, [configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure). | Block access |
For version details, see [What's new in Windows App](/windows-app/whats-new), [What's new in the Remote Desktop client for iOS and iPadOS](whats-new-client-ios-ipados.md), and [What's new in the Remote Desktop client for Android and Chrome OS](whats-new-client-android-chrome-os.md).
237
+
For version details, see [What's new in Windows App](/windows-app/whats-new?tabs=ios-ipados), and [What's new in the Remote Desktop client for Android and Chrome OS](whats-new-client-android-chrome-os.md).
238
238
239
239
For more information about the available settings, see [Conditional launch in iOS app protection policy settings](/mem/intune/apps/app-protection-policy-settings-ios#conditional-launch) and [Conditional launch in Android app protection policy settings](/mem/intune/apps/app-protection-policy-settings-android#conditional-launch).
240
240
@@ -250,7 +250,7 @@ To create and apply a Conditional Access policy, follow the steps in [Set up app
250
250
251
251
- For **Assignments**, include the security group containing the users to apply the policy to. You must apply the policy to a group of users to have the policy take effect.
252
252
253
-
- For **Target resources**, select to apply the policy to **Cloud apps**, then for **Include**, select **Select apps**. Search for and select **Azure Virtual Desktop** and **Windows 365**. You only have Azure Virtual Desktop in the list if you [registered the `Microsoft.DesktopVirtualization` resource provider on a subscription](prerequisites.md#azure-account-with-an-active-subscription) in your Microsoft Entra tenant.
253
+
- For **Target resources**, select to apply the policy to **Cloud apps**, then for **Include**, select **Select apps**. Search for and select **Azure Virtual Desktop** and **Windows 365**. You only have Azure Virtual Desktop in the list if you [registered the `Microsoft.DesktopVirtualization` resource provider on a subscription](prerequisites.md#azure-account-with-an-active-subscription) in your Microsoft Entra tenant. If single sign-on on a managed device is use, additional apps are required.
254
254
255
255
- For **Conditions**:
256
256
- Select **Device platforms**, then include **iOS** and **Android**.
0 commit comments