Create a policy group

Perform this task to create a policy group in an office scenario.

Procedure

  1. From the left navigation pane, select Policies > Policy Groups.

  2. On the Policy Group page, click Create.

  3. Configure basic information such as name, policy type, description, and schedule, and click Next.

  4. Configure policy parameters for VDI, such as peripheral, client, session, display, watermarking, bandwidth limit, security, data management, and application acceleration, and click Next.

  5. Configure policy parameters for IDV, such as peripheral, session, watermarking, network rules, security, data management, and application acceleration, and click Next.

  6. Configure policy parameters for VOI/TCI, such as peripheral, session, watermarking, network rules, security, data management, and application acceleration, and click Next.

  7. Configure policy parameters for physical hosts, such as peripheral, watermarking, network rules, security, and application acceleration, and click Next.

  8. Configure policy parameters for virtual application, such as peripheral, session, and watermarking, and click Next.

  9. Configure policy parameters for shared desktop, such as security and application acceleration, and click Next.

  10. Select application objects, such as object type and object name, and click Next. If the policy group contains upgraded policies, you cannot authorize these policies to application objects. To authorize these policies to application objects, copy this policy group and then add application objects.

  11. Confirm the configuration, and click Finish.

Parameters

Peripheral settings

  • Only VDI and Virtual Application policy groups support local resource mappings. The mapping direction for clipboard mapping can be bidirectional, and you can edit it.

  • Local resource mappings of Virtual Application policy groups support only disk and clipboard policies. USB redirection only supports printers and cameras.

  • Shared Desktop policy groups do not support peripheral configuration.

  • In an education scenario, only VDI policy groups support local resource mappings. Serial ports, parallel ports, clipboard policies, CDs/DVDs, and printers take effect only on the teacher desktops.

  • For ARM hosts, only VDI policy groups support local resource mapping and USB redirection, and local resource mapping supports only camera, disk, and clipboard policies.

  • Configure USB redirection under the guidance of professionals. Wrong configuration will cause peripherals to be unusable.

  • After a USB peripheral is redirected, an endpoint cannot use the USB peripheral locally. For the endpoint to use the USB peripheral, disable it in the authentication policy.

Client settings

  • Only VDI policy groups support client configuration.

  • TLS encryption is not supported in an office scenario.

  • In an education scenario, only VDI policy groups support client configuration, and the following features are available only in the education scenario and take effect only on the teacher desktops:

    • Allow Desktop to Disconnect

    • Allow Desktop to Reboot

    • Allow Desktop to Shut Down

    • Allow Desktop to Power Off

    • Shutdown from OS Start Menu

    • Allow Desktop to Return

Session parameter settings

  • IDV and VOI/TCI policy groups support only user acceptance of remote assistance.

  • Virtual application policy groups support only vApp session logout time limit, vApp session prestart, desktop shortcut creation for vApp, and input method transparent transmission for vApps.

Actions upon login

Actions upon timeout

Other actions

Display parameter settings

  • Only VDI policy groups support configuring display parameters.

  • Retain the default settings for the recommended display parameters.

  • ARM hosts do not support vGPU configuration.

Watermark settings

  • For VDI policy groups, blind watermarking and non-blind watermarking can be configured simultaneously. For IDV, VOI/TCI, and physical host policy groups, you can configure either blind watermarking or non-blind watermarking, but not both. Virtual application policy groups support only non-blind watermarking.

  • The IP address and MAC address of a cloud desktop in abnormal state might not be displayed because the system might be unable to obtain them. To solve this issue, disconnect from and reconnect the cloud desktop.

  • Web clients do not support blind watermarking.

  • ARM hosts do not support blind watermarking.

  • Only Windows cloud desktops support blind watermarking.

Network rules

Only IDV, VOI/TCI, and physical host policy groups support network rule configuration.

Bandwidth limit settings

Only VDI policy groups support bandwidth limit configuration.

Security settings

  • Only virtual application policy groups do not support security configuration.

  • Only Windows cloud desktops support security configuration.

  • Only VDI policy groups support enabling screen monitoring.

  • Shared desktop policy groups and physical host policy groups support only software denylist and allowlist.

  • Software denylist and allowlist are available only in an education scenario.

  • ARM hosts do not support user security configuration.

  • The matched process name must be in English.

  • The software denylist and allowlist feature can block or allow only the .exe programs of the Windows 7 or Windows 10 operating system.

  • The Windows applications in the C:\Windows\XXX folders are in the allowlist by default, such as Calculator.

Data management

  • Custom data policies only apply to application objects of user types and desktop pool types, and cannot be used simultaneously with optimization tool profile customization. When policies are assigned to both users and desktop pools, the policy with higher priority takes effect.

  • When the local roaming directory for a custom data policy is a data disk and the restoration mode of the desktop pool is system restore, the data management feature can operate correctly. In the following situations, the data management feature does not take effect, and user roaming data cannot be saved:

    • When the local roaming directory is specified on the system disk (C:) and the restoration mode for the desktop pool is system restore or full restore, the system disk will be restored upon an endpoint restart.

    • When the local roaming directory is specified on a data disk and the restoration mode for the desktop pool is full restore, all disks will be restored upon an endpoint restart.

  • Only VDI, IDV, and VOI policy groups in an office scenario support data management configuration.

  • On the roaming server, make sure no user group uses the same name as a roaming user. Otherwise, data roaming will fail.

  • To avoid data confusion, do not authorize custom data policies to users with the same name but different user types.

  • When you configure data management in different types of policies for a client, you can specify the same configuration file directory created on the remote server as the roaming directory path for the Roaming Directory field. For example, data management configuration for VDI, IDV, and VOI/TCI policies can use the same configuration file directory.

  • X86 management nodes support only Windows roaming configuration, which provides user data roaming for the data management policy for Windows cloud desktops. ARM management nodes support only Linux ARM 64 configuration, which provides user data roaming for the data management policy for Kylin V10 cloud desktops.

  • After you configure a data management policy group, the snapshot feature does not take effect for data in the default roaming directory and third-party roaming directories.

Windows roaming configuration

Linux roaming configuration

Application acceleration

  • Virtual application policy groups do not support application acceleration.

  • Only Windows cloud desktops support application acceleration.

  • ARM hosts do not support application acceleration.