Skip to content

Commit 71be696

Browse files
author
Angela Fleischmann
authored
Merge pull request #6722 from ErikjeMS/aadjopnc2
more changes per Christian
2 parents 30e37e7 + c048b8e commit 71be696

3 files changed

Lines changed: 60 additions & 19 deletions

File tree

windows-365/enterprise/add-device-images.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -39,22 +39,21 @@ If you want to use a custom device image, you can add it into your Azure subscri
3939
4040
## Add a custom device image
4141

42-
You can upload the custom image to the Windows 365 service by following these steps:
42+
For both hybrid Azure Active Directory (Azure AD) join and Azure AD join connections, you can upload the custom image to the Windows 365 service by following these steps:
4343

44-
> [!NOTE]
45-
> For Azure AD Join on-premises network connections (OPNC) without your own network, you can upload custom images from your Azure subscription. You must first [create an on-premises network connection](create-on-premises-network-connection.md) with the Azure subscription associated with the targeted custom images.
44+
1. For Azure AD join on-premises network connections (OPNC) without your own network, you can upload custom images from your Azure subscription. You must first [create an on-premises network connection](create-on-premises-network-connection.md) with the Azure subscription associated with the targeted custom images.
4645

47-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
46+
2. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
4847

49-
2. Select **Devices** > **Windows 365** (under **Provisioning**) > **Device images** > **Add**.
48+
3. Select **Devices** > **Windows 365** (under **Provisioning**) > **Device images** > **Add**.
5049
![Screenshot of add device image](./media/add-device-images/add-device-image.png)
5150

52-
3. In the **Add image** pane, provide the following information:
51+
4. In the **Add image** pane, provide the following information:
5352
- **Image name**: The name of the image you want to add.
5453
- **Image version**: A version number of the image with this format: Major(int).Minor(int).Patch(int) format. For example: 0.0.1, 1.5.13.
5554
- **Source Image**: Choose an image to add. The list will populate with all custom images from your subscription that meet the pre-requisites.
5655

57-
3. Select **Add** to add the image to your device image list.
56+
5. Select **Add** to add the image to your device image list.
5857

5958
## Delete a custom device image
6059

@@ -64,7 +63,7 @@ You can delete a custom image from Windows 365 by following these steps:
6463
2. On the **Device images** page, select the check box next to the image > **Delete**.
6564
3. Select **Yes** on the confirmation pop up to permanently delete the image.
6665

67-
Device images being used in a provisioning policy cannot be deleted. Delete the provisioning policy first and then the associated device image.
66+
Device images being used in a provisioning policy can't be deleted. Delete the provisioning policy first and then the associated device image.
6867

6968
<!-- ########################## -->
7069
## Next steps

windows-365/enterprise/create-on-premises-network-connection.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@ To create an OPNC, you must:
5959
6. On the **AD domain** page, provide the following information:
6060
- **AD domain name**: The DNS name of the Active Directory domain that you want to use for connecting and provisioning Cloud PCs. For example, corp.contoso.com.
6161
- **Organizational unit**: (Optional.) An organizational unit (OU) is a container within an Active Directory domain, which can hold users, groups, and computers. Make sure that this OU is enabled to sync with Azure AD Connect. Provisioning will fail if this OU isn't syncing.
62-
- **AD domain username**: The username, in user principal name (UPN) format, that you want to use for connecting the Cloud PCs to your Active Directory domain. For example, [email protected]. This service account must have permission to join computers to the domain and, if set, the target OU.
62+
- **AD domain username**: The username, in user principal name (UPN) format, that you want to use for connecting the Cloud PCs to your Active Directory domain. For example, [email protected]. This service account must have permission to join computers to the domain and, if set, the target OU.
63+
6364
- AD domain password: The password for the user specified above.
6465
- Confirm AD domain password: The password for the user specified above.
6566

windows-365/enterprise/manage-rdp-device-redirections.md

Lines changed: 51 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -32,21 +32,62 @@ ms.collection:
3232

3333
Remote Desktop Protocol (RDP) can be used to create redirections that let users connect to peripherals (like cameras, USB drives, and printers) from remote devices like Cloud PCs. By default, these redirections are enabled for Cloud PCs. For security reasons, you might want to override the default and block these redirections.
3434

35-
## Use GPO to manage RDP device redirections
35+
To understand which redirections are supported based on which platform is used to access the Cloud PC, see [Compare the clients: redirections](/windows-server/remote/remote-desktop-services/clients/remote-desktop-app-compare).
3636

37-
To block any of the redirections, create and assign a Group Policy Object with the corresponding policies as shown in the table below. To learn more about the policies, download the [Group Policy Settings Reference Spreadsheet](https://www.microsoft.com/download/101451) :
37+
## RDP device redirection settings
38+
39+
The following redirections can be managed by using the appropriate setting:
3840

3941
| Redirection | Group policy |
4042
| --- | --- |
4143
| Audio input | Allow audio recording redirection |
4244
| Audio output | Allow audio and video playback redirection |
43-
| Cameras | Do not allow video capture redirection |
44-
| Clipboard | Do not allow Clipboard redirection |
45-
| Printers | Do not allow client printer redirection |
46-
| COM ports | Do not allow COM port redirection |
47-
| Drives | Do not allow drive redirection |
48-
| Smartcards | Do not allow smart card device redirection |
49-
| USB drives| Do not allow supported Plug and Play device redirection |
45+
| Cameras | Don't allow video capture redirection |
46+
| Clipboard | Don't allow Clipboard redirection |
47+
| Printers | Don't allow client printer redirection |
48+
| COM ports | Don't allow COM port redirection |
49+
| Drives | Don't allow drive redirection |
50+
| Smartcards | Don't allow smart card device redirection |
51+
| USB drives| Don't allow supported Plug and Play device redirection |
52+
53+
There are two ways to manage these redirections:
54+
55+
- Settings Catalog: Use a device configuration policy in Microsoft Endpoint Manager. Supports both Azure Active Directory (Azure AD) join and hybrid Azure AD join Cloud PCs.
56+
- Group Policy Object (GPO): Use GPOs in Windows Server Active Directory. Supports hybrid Azure AD join Cloud PCs only.
57+
58+
Follow the appropriate guidance to manage RDP device redirections.
59+
60+
## Use the Settings Catalog to manage RDP device redirections
61+
62+
To manage any of the redirections by using the Settings Catalog, create and assign a device configuration policy:
63+
64+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create profile**.
65+
66+
2. Select the **Windows 10 and later** platform, the **Settings catalog (preview)** profile type, then **Create**.
67+
68+
3. On the **Basics** page, enter a **Name** and **Description** (optional) for the new policy.
69+
70+
4. On the **Configuration settings** page, select **+ Add settings** to list and select settings to manage.
71+
72+
- To manage printer redirection settings, search for “Printer Redirection”, select the resulting category, and select the settings you want to manage.
73+
- To manage other redirection settings, search for “Device and Resource Redirection”, select the resulting category, and select the settings you want to manage.
74+
75+
5. After you've selected all the redirection settings that you want to manage, close the **Settings picker** view, configure the settings on the **Configuration settings** page, then select **Next**.
76+
77+
6. On the **Assignments** page, select the users or groups that will receive the redirection policy, then select **Next**.
78+
79+
7. On the **Scope tags** page, select any desired scope tags to apply, then select **Next**.
80+
81+
8. On the *Review + create** page, select **Create**.
82+
83+
For more help using the settings catalog to create a device configuration policy, see [Use the settings catalog to configure settings on Windows and macOS devices](/mem/intune/configuration/settings-catalog).
84+
85+
> [!Note]
86+
> The settings catalog configures policies by using the Policy CSP. To make sure that these settings take precedence over a conflicting GPO, you can also configure the [ControlPolicyConflict CSP]( /windows/client-management/mdm/policy-csp-controlpolicyconflict#controlpolicyconflict-policies).
87+
88+
## Use a GPO to manage RDP device redirections
89+
90+
To manage any of the redirections by using GPO, create and assign a GPO in your Windows Server Active Directory domain. Make sure to use the corresponding policies as shown in the (RDP device redirection settings table)(#rdp-device-redirection-settings). To learn more about the policies, download the [Group Policy Settings Reference Spreadsheet](https://www.microsoft.com/download/101451) :
5091

5192
## Redirection support
5293

@@ -69,7 +110,7 @@ The following table lists which peripherals are supported for redirection based
69110
| Scanners | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) |
70111
| Screen capture protection | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) |
71112
| Serial port | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) |
72-
| Smart cards | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) (Windows sign in not supported) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) |
113+
| Smart cards | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) (Windows sign-in isn't supported) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) |
73114
| Speakers | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) |
74115
| Start menu integration | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) |
75116
| Teams AV | ![Supported](./media/manage-rdp-device-restrictions/checkmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) | ![Not supported](./media/manage-rdp-device-restrictions/xmark.png) |

0 commit comments

Comments
 (0)