Create a policy group

Perform this task to create a policy group in an office scenario.

Procedure

  1. From the left navigation pane, select Policies > Policy Group.

  1. On the Policy Group page, click Create.

  1. Configure basic information such as name, policy type, description, and schedule, and click Next.

  1. Configure policy parameters for VDI, such as peripheral, client, session, display, watermarking, bandwidth limit, security, data management, and application acceleration, and click Next.

  1. Configure policy parameters for IDV, such as peripheral, session, watermarking, network rules, security, and data management, and click Next.

  1. Configure policy parameters for VOI, such as peripheral, session, watermarking, network rules, security, and data management, and click Next.

  1. Configure policy parameters for physical hosts, such as peripheral, watermarking, network rules, security, and application acceleration, and click Next.

  1. Configure policy parameters for vApps, such as peripheral, session, watermarking, and data management, and click Next.

  1. Configure policy parameters for winserver, such as security and application acceleration, and click Next.

  1. Select application objects, such as object type and object name, and click Next. If the policy group contains upgraded policies, you cannot authorize these policies to application objects. To authorize these policies to application objects, copy this policy group and then add application objects.

  1. Confirm the configuration, and click Finish.

Parameters

Peripheral settings

·          Only VDI and vApp authorization policies support local resource mappings. vApp authorization policies support only disk and clipboard mappings. The mapping direction for clipboard mapping can be bidirectional, and you can edit it.

·          Winserver authorization policies do not support peripheral configuration.

·          In an education scenario, only VDI authorization policies support local resource mappings. Serial ports, parallel ports, VDP clipboards, mapping directions, CDs/DVDs, and printers take effect only on the teacher desktops.

·          For ARM hosts, only VDI authorization policies support local resource mapping. VDI authorization policies support only camera and VDP clipboard mappings.

 

 

·          The clipboard feature is supported only on endpoints running UOS 1022 or 1042, Windows 7, Windows 10, Kylin 2107, and MacOS. In addition, the endpoints cannot use the MIPS architecture.

·          The clipboard feature is supported only on cloud desktops running UOS 1022 or 1042, Windows 7, Windows 10, and Kylin 2107.

 

You can set one of the following mapping directions for VDP clipboard mapping:

 

·          Configure USB redirection under the guidance of professionals. Wrong configuration will cause peripherals to be unusable.

·          After a USB peripheral is redirected, an endpoint cannot use the USB peripheral locally. For the endpoint to use the USB peripheral, disable it in the authentication policy.

 

Client settings

Only VDI authorization policies support client configuration.

In an education scenario, only VDI authorization policies support client configuration, and the following features are available only in the education scenario and take effect only on the teacher desktops:

·          Allow Desktop to Disconnect

·          Allow Desktop to Reboot

·          Allow Desktop to Shut Down

·          Allow Desktop to Power Off

·          Shutdown from OS Start Menu

·          Allow Desktop to Return

 

Session parameter settings

 

·          IDV and VOI authorization policies support only user acceptance of remote assistance.

·          vApp authorization policies support only vApp session prestart, desktop shortcut creation for vApp, and input method transparent transmission for vApps,.

·          Winserver authorization policies support only the vApp session logout time limit.

 

This option and the Shut Down Desktops upon Disconnection Timeout option cannot be both set.

With this function enabled, do not enable the Shut Down Thin Clients with Desktop parameter in the authorization policy.

This option and the Suspend Desktops upon Disconnection Timeout option cannot be both set.

This policy does not take effect on a cloud desktop accessed from the console.

Display parameter settings

 

·          Only VDI authorization policies support configuring display parameters.

·          Retain the default settings for the recommended display parameters.

·          ARM hosts do not support vGPU configuration.

 

Watermark settings

 

·          For VDI authorization policies, blind watermarking and non-blind watermarking can be configured simultaneously. For IDV, VOI, and physical host authorization policies, you can configure either blind watermarking or non-blind watermarking, but not both. vApp authorization policies support only non-blind watermarking.

·          The IP address and MAC address of a cloud desktop in abnormal state might not be displayed because the system might be unable to obtain them. To solve this issue, disconnect from and reconnect the cloud desktop.

·          Web clients do not support blind watermarking.

·          ARM hosts do not support blind watermarking.

·          Only Windows cloud desktops support blind watermarking.

 

Network rules

 

Only IDV, VOI, and physical host authorization policies support network rule configuration.

 

Bandwidth limit settings

 

Only VDI authorization policies support bandwidth limit configuration.

 

Security settings

 

·          Only vApp authorization policies do not support security configuration.

·          Only Windows cloud desktops support security configuration.

·          Only VDI authorization policies support enabling screen monitoring.

·          Winserver authorization policies support only software denylist and allowlist. Physical host authorization policies support only software denylist.

·          Software denylist and allowlist are available only in an education scenario.

·          ARM hosts do not support user authorization group, and software denylist and allowlist.

·          The matched process name must be in English.

·          The software denylist and allowlist feature can block or allow only the .exe programs of the Windows 7 or Windows 10 operating system.

·          The Windows applications in the C:\Windows\XXX folders are in the allowlist by default, such as Calculator.

 

Data management

 

·          Only VDI, IDV, VOI, and vApp authorization policies in an office scenario support data management configuration.

·          You can authorize vApp authorization policies to virtual applications and shared desktops. The data management feature takes effect only on shared desktops, not on virtual applications.

·          When you configure data management in different types of policies for a client, you can specify the same configuration file directory created on the remote server as the roaming directory path for the Roaming Directory field. For example, data management configuration for VDI, IDV, and VOI policies can use the same configuration file directory and so it is with the data management configuration for VDI and vAPP policies.

·          X86 management nodes support only Windows roaming configuration, which provides user data roaming for the data management policy for Windows cloud desktops. ARM management nodes support only Linux ARM 64 configuration, which provides user data roaming for the data management policy for Kylin V10 cloud desktops.

 

Windows roaming configuration

Linux roaming configuration

Application acceleration

 

·          vApp authorization policies do not support application acceleration.

·          Only Windows cloud desktops support application acceleration.

·          ARM hosts do not support application acceleration.

 

Management

Priority

Affinity

Clamping