Microsoft Remote Desktop Mac Enable Folder Redirection

 
  1. Microsoft Remote Desktop Mac Os X
  2. Enable Folder Redirection Remote Desktop Mac

If you donʼt have Microsoft Remote Desktop for the Mac, you must download and install it. To download and install the Microsoft Remote Desktop client: From the Apple menu, choose App Store. Search for “Microsoft Remote Desktop.” Follow the instructions to download and install the latest version of Microsoft Remote Desktop for the Mac. Aug 22, 2007 Folder redirection can also provide locked down Desktop and Start Menu Folders by redirecting to Network Shares from which the end users can only read, or it can be set up so users' individual Start Menu and Desktop folders reside on a File Share instead of being copied back and forth with the rest of the roaming profile. Mar 22, 2010 Seems like I am going in circles. I am trying to enable folder redirection for Remote desktop users but it doesn't seem to work. If I turn on Folder Redirection, it seems to work well at the console logon but not at the terminal session logon that follows (I want my users to work almost exclusively from a TS session: Office, home software, etc.).

  1. If you can connect using Microsoft Remote Desktop for Mac, you can try exporting the connection and importing it back into Royal TSX. To do this, right-click the entry in MSRDP and select 'Export'. In the save panel, select a location to save the.rdp file to. Back in Royal TSX select the folder you want to import the connection to.
  2. 2019-9-19  Setting up remote access: Instructions for Macintosh users Downloading and installing. First, determine whether you have Microsoft Remote Desktop for the Mac: click Search on your desktop and type in “Remote”. If the application is on the list of installed programs, select it and go to Configuring the connection. If you donʼt have Microsoft Remote Desktop for the Mac, you must download.

Administrators can configure the client system to specify which USB devices can be redirected to a remote desktop.

You can configure USB policies for both View Agent or Horizon Agent, on the remote desktop, and Horizon Client, on the local system, to achieve the following goals:

  • Restrict the types of USB devices that Horizon Client makes available for redirection.
  • Make View Agent or Horizon Agent prevent certain USB devices from being forwarded from a client computer.
  • Specify whether Horizon Client should split composite USB devices into separate components for redirection.

    Composite USB devices consist of a combination of two or more devices, such as a video input device and a storage device.

Configuration settings on the client might be merged with or overridden by corresponding policies set for View Agent or Horizon Agent on the remote desktop. For information about how USB settings on the client work in conjunction with View Agent or Horizon Agent USB policies, see the topics about using policies to control USB redirection, in the Configuring Remote Desktop Features in Horizon 7 document.

Using Rules From a Previous Horizon Client Release

In previous Horizon Client releases, you had to use sudo to configure USB filtering and splitting rules. You can use the following procedure to move rules that use sudo to new rules that do not use sudo.

  1. On the Mac client, open Terminal (/Applications/Utilities/Terminal.app) and run the following command:
  2. Open a Terminal window (press command+N) and run the following command:
  3. In the first Terminal window, run the following command:
  4. Close both Terminal windows.

You can now use defaults write com.vmware.viewusb propertyvalue to update the rules.

Syntax for Configuring USB Redirection

You can configure filtering and splitting rules to exclude or include USB devices from being redirected to a remote desktop. On a Mac client, you configure USB functionality by using Terminal (/Applications/Utilities/Terminal.app) and running a command as root.

  • To list the rules:

    For example:

  • To remove a rule:

    For example:

  • To set or replace a filter rule:

    For example:

    Important: Some configuration parameters require the VID (vendor ID) and PID (product ID) for a USB device. To find the VID and PID, you can search on the Internet for the product name combined with vid and pid. Alternatively, you can look in the USB Log file after you plug in the USB device to the local system when Horizon Client is running. For more information, see Turn On Logging for USB Redirection.
  • To set or replace a splitting rule for a composite device:

    For example:

    Composite USB devices consist of a combination of two or more devices, such as a video input device and a storage device. The first line in this example turns on automatic splitting of composite devices. The second line excludes the specified composite USB device (Vid-03f0_Pid-2a12) from splitting.

    The third line tells Horizon Client to treat the components of a different composite device (Vid-0911_Pid-149a) as separate devices but to exclude the following component from being redirected: the component whose interface number is 03. This component is kept local.

    Because this composite device includes a component that is ordinarily excluded by default, such as a mouse or keyboard, the fourth line is necessary so that the other components of the composite device Vid-0911_Pid-149a can be redirected to the remote desktop.

    The first three properties are splitting properties. The last property is a filtering property. Filtering properties are processed before splitting properties.

Excluding a USB Ethernet Device

One example of a USB device you might want to exclude from redirection is a USB Ethernet device. Suppose that your Mac is using a USB Ethernet device to connect the network for the Mac client system to a remote desktop. If you redirect the USB Ethernet device, your local client system will lose its connection to the network and the remote desktop.

If you want to permanently hide this device from the USB connection menu, or if you have set your remote desktop to autoconnect USB devices, you can add an exception to exclude your Ethernet connection.

In this example, xxxx is the vendor ID and yyyy is the product ID of the USB Ethernet adapter.

-->

Applies to: Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows Server 2019, Windows Server 2016, Windows Server 2012, Windows Server 2012 R2, Windows Server 2008 R2, Windows Server (Semi-annual Channel)

This topic describes how to use Windows Server to deploy Folder Redirection with Offline Files to Windows client computers.

For a list of recent changes to this topic, see Change history.

Important

Due to the security changes made in MS16-072, we updated Step 3: Create a GPO for Folder Redirection of this topic so that Windows can properly apply the Folder Redirection policy (and not revert redirected folders on affected PCs).

Prerequisites

Hardware requirements

Folder Redirection requires an x64-based or x86-based computer; it is not supported by Windows® RT.

Software requirements

Folder Redirection has the following software requirements:

  • To administer Folder Redirection, you must be signed in as a member of the Domain Administrators security group, the Enterprise Administrators security group, or the Group Policy Creator Owners security group.
  • Client computers must run Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2019, Windows Server 2016, Windows Server (Semi-annual Channel), Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2, or Windows Server 2008.
  • Client computers must be joined to the Active Directory Domain Services (AD DS) that you are managing.
  • A computer must be available with Group Policy Management and Active Directory Administration Center installed.
  • A file server must be available to host redirected folders.
    • If the file share uses DFS Namespaces, the DFS folders (links) must have a single target to prevent users from making conflicting edits on different servers.
    • If the file share uses DFS Replication to replicate the contents with another server, users must be able to access only the source server to prevent users from making conflicting edits on different servers.
    • When using a clustered file share, disable continuous availability on the file share to avoid performance issues with Folder Redirection and Offline Files. Additionally, Offline Files might not transition to offline mode for 3-6 minutes after a user loses access to a continuously available file share, which could frustrate users who aren't yet using the Always Offline mode of Offline Files.

Note

Some newer features in Folder Redirection have additional client computer and Active Directory schema requirements. For more info, see Deploy primary computers, Disable Offline Files on folders, Enable Always Offline mode, and Enable optimized folder moving.

Step 1: Create a folder redirection security group

If your environment is not already set up with Folder Redirection, the first step is to create a security group that contains all users to which you want to apply Folder Redirection policy settings.

Here's how to create a security group for Folder Redirection:

  1. Open Server Manager on a computer with Active Directory Administration Center installed.
  2. On the Tools menu, select Active Directory Administration Center. Active Directory Administration Center appears.
  3. Right-click the appropriate domain or OU, select New, and then select Group.
  4. In the Create Group window, in the Group section, specify the following settings:
    • In Group name, type the name of the security group, for example: Folder Redirection Users.
    • In Group scope, select Security, and then select Global.
  5. In the Members section, select Add. The Select Users, Contacts, Computers, Service Accounts or Groups dialog box appears.
  6. Type the names of the users or groups to which you want to deploy Folder Redirection, select OK, and then select OK again.

Step 2: Create a file share for redirected folders

If you do not already have a file share for redirected folders, use the following procedure to create a file share on a server running Windows Server 2012.

Note

Some functionality might differ or be unavailable if you create the file share on a server running another version of Windows Server.

Here's how to create a file share on Windows Server 2019, Windows Server 2016, and Windows Server 2012:

  1. In the Server Manager navigation pane, select File and Storage Services, and then select Shares to display the Shares page.

  2. In the Shares tile, select Tasks, and then select New Share. The New Share Wizard appears.

  3. On the Select Profile page, select SMB Share – Quick. If you have File Server Resource Manager installed and are using folder management properties, instead select SMB Share - Advanced.

  4. On the Share Location page, select the server and volume on which you want to create the share.

  5. On the Share Name page, type a name for the share (for example, Users$) in the Share name box.

    Tip

    When creating the share, hide the share by putting a $ after the share name. This will hide the share from casual browsers.

  6. On the Other Settings page, clear the Enable continuous availability checkbox, if present, and optionally select the Enable access-based enumeration and Encrypt data access checkboxes.

  7. On the Permissions page, select Customize permissions…. The Advanced Security Settings dialog box appears.

  8. Select Disable inheritance, and then select Convert inherited permissions into explicit permission on this object.

  9. Set the permissions as described Table 1 and shown in Figure 1, removing permissions for unlisted groups and accounts, and adding special permissions to the Folder Redirection Users group that you created in Step 1.

    Figure 1 Setting the permissions for the redirected folders share

  10. If you chose the SMB Share - Advanced profile, on the Management Properties page, select the User Files Folder Usage value.

  11. If you chose the SMB Share - Advanced profile, on the Quota page, optionally select a quota to apply to users of the share.

  12. On the Confirmation page, select Create.Microsoft autoupdate on a mac air must be virus.

Required permissions for the file share hosting redirected folders

User AccountAccessApplies to
User AccountAccessApplies to
SystemFull controlThis folder, subfolders and files
AdministratorsFull ControlThis folder only
Creator/OwnerFull ControlSubfolders and files only
Security group of users needing to put data on share (Folder Redirection Users)List folder / read data (Advanced permissions)

Create folders / append data (Advanced permissions)

Read attributes (Advanced permissions)

Read extended attributes (Advanced permissions)

Read permissions (Advanced permissions)

This folder only
Other groups and accountsNone (remove)

Step 3: Create a GPO for Folder Redirection

If you do not already have a GPO created for Folder Redirection settings, use the following procedure to create one.

Here's how to create a GPO for Folder Redirection:

  1. Open Server Manager on a computer with Group Policy Management installed.

    Microsoft yahei mac os. Web and cloud development using C#ASP.NET Core and.NET CorePublish to AzureAzure FunctionsAzure Connected ServicesDocker container toolsDesktop developmentWPF and Windows FormsUWPMac Apps using Xamarin and C#Console apps with C#Desktop apps using CMobile and gamingMobile development with.NET using Xamarin and C#Game development using Unity and C#Mobile and game development using COther workloads and toolsJavaScript/TypeScriptPythonSQL Server data toolsNode.jsUnit testingVersion control with Git.

  2. From the Tools menu, select Group Policy Management.

  3. Right-click the domain or OU in which you want to setup Folder Redirection, then select Create a GPO in this domain, and Link it here.

  4. In the New GPO dialog box, type a name for the GPO (for example, Folder Redirection Settings), and then select OK.

  5. Right-click the newly created GPO and then clear the Link Enabled checkbox. This prevents the GPO from being applied until you finish configuring it.

  6. Select the GPO. In the Security Filtering section of the Scope tab, select Authenticated Users, and then select Remove to prevent the GPO from being applied to everyone.

  7. In the Security Filtering section, select Add.

  8. In the Select User, Computer, or Group dialog box, type the name of the security group you created in Step 1 (for example, Folder Redirection Users), and then select OK.

  9. Select the Delegation tab, select Add, type Authenticated Users, select OK, and then select OK again to accept the default Read permissions.

    This step is necessary due to security changes made in MS16-072.

Important

Due to the security changes made in MS16-072, you now must give the Authenticated Users group delegated Read permissions to the Folder Redirection GPO - otherwise the GPO won't get applied to users, or if it's already applied, the GPO is removed, redirecting folders back to the local PC. For more info, see Deploying Group Policy Security Update MS16-072.

Step 4: Configure folder redirection with Offline Files

After creating a GPO for Folder Redirection settings, edit the Group Policy settings to enable and configure Folder Redirection, as discussed in the following procedure.

Note

Offline Files is enabled by default for redirected folders on Windows client computers, and disabled on computers running Windows Server, unless changed by the user. To use Group Policy to control whether Offline Files is enabled, use the Allow or disallow use of the Offline Files feature policy setting.For information about some of the other Offline Files Group Policy settings, see Enable Advanced Offline Files Functionality, and Configuring Group Policy for Offline Files.

Here's how to configure Folder Redirection in Group Policy:

  1. In Group Policy Management, right-click the GPO you created (for example, Folder Redirection Settings), and then select Edit.

  2. In the Group Policy Management Editor window, navigate to User Configuration, then Policies, then Windows Settings, and then Folder Redirection.

  3. Right-click a folder that you want to redirect (for example, Documents), and then select Properties.

  4. In the Properties dialog box, from the Setting box, select Basic - Redirect everyone's folder to the same location.

    Note

    To apply Folder Redirection to client computers running Windows XP or Windows Server 2003, select the Settings tab and select the Also apply redirection policy to Windows 2000, Windows 2000 Server, Windows XP, and Windows Server 2003 operating systems checkbox.

  5. In the Target folder location section, select Create a folder for each user under the root path and then in the Root Path box, type the path to the file share storing redirected folders, for example: fs1.corp.contoso.comusers$

  6. Select the Settings tab, and in the Policy Removal section, optionally select Redirect the folder back to the local userprofile location when the policy is removed (this setting can help make Folder Redirection behave more predictably for administrators and users).

  7. Select OK, and then select Yes in the Warning dialog box.

Step 5: Enable the Folder Redirection GPO

Once you have completed configuring the Folder Redirection Group Policy settings, the next step is to enable the GPO, permitting it to be applied to affected users.

Tip

If you plan to implement primary computer support or other policy settings, do so now, before you enable the GPO. This prevents user data from being copied to non-primary computers before primary computer support is enabled.

Here's how to enable the Folder Redirection GPO:

  1. Open Group Policy Management.
  2. Right-click the GPO that you created, and then select Link Enabled. A checkbox will appear next to the menu item.

Step 6: Test Folder Redirection

To test Folder Redirection, sign in to a computer with a user account configured for Folder Redirection. Then confirm that the folders and profiles are redirected.

Here's how to test Folder Redirection:

  1. Sign in to a primary computer (if you enabled primary computer support) with a user account for which you have enabled Folder Redirection.

  2. If the user has previously signed in to the computer, open an elevated command prompt, and then type the following command to ensure that the latest Group Policy settings are applied to the client computer:

  3. Open File Explorer.

  4. Right-click a redirected folder (for example, the My Documents folder in the Documents library), and then select Properties.

  5. Select the Location tab, and confirm that the path displays the file share you specified instead of a local path.

Appendix A: Checklist for deploying Folder Redirection

StatusAction


1. Prepare domain
- Join computers to domain
- Create user accounts

2. Create security group for Folder Redirection
- Group name:
- Members:

3. Create a file share for redirected folders
- File share name:

4. Create a GPO for Folder Redirection
- GPO name:





5. Configure Folder Redirection and Offline Files policy settings
- Redirected folders:
- Windows 2000, Windows XP, and Windows Server 2003 support enabled?
- Offline Files enabled? (enabled by default on Windows client computers)
- Always Offline Mode enabled?
- Background file synchronization enabled?
- Optimized Move of redirected folders enabled?



6. (Optional) Enable primary computer support
- Computer-based or User-based?
- Designate primary computers for users
- Location of user and primary computer mappings:
- (Optional) Enable primary computer support for Folder Redirection
- (Optional) Enable primary computer support for Roaming User Profiles
7. Enable the Folder Redirection GPO
8. Test Folder Redirection

Change history

The following table summarizes some of the most important changes to this topic.

Microsoft Remote Desktop Mac Os X

DateDescriptionReason
January 18, 2017Added a step to Step 3: Create a GPO for Folder Redirection to delegate Read permissions to Authenticated Users, which is now required because of a Group Policy security update.Customer feedback

Enable Folder Redirection Remote Desktop Mac

More information