By default, Remote Desktop allows redirection of WebAuthn requests. This redirection enables users to authenticate to resources inside the Remote Desktop session using their local authenticator (e.g., Windows Hello for Business, security key, or other). This policy lets you control the redirection of web authentication (WebAuthn) requests from a Remote Desktop session to the local device. admx - Do not allow WebAuthn redirection Machine Windows components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection.Audit: Redirection Guard will log events as though it were enabled, but will not actually prevent file redirections from being used within the spooler. Disabled: Redirection Guard will not be enabled and file redirections may be used within the spooler process 3. Enabled: Redirection Guard will prevent any file redirections from being followed 2. If you enable this setting you can select the following options: 1. If you disable or do not configure it, Redirection Guard will default to being enabled. You can enable this setting to configure the Redirection Guard policy so it’s applied to spooler. This determines whether Redirection Guard is enabled for the print spooler.
0 Comments
Leave a Reply. |