Policies in Elastic Desktop Service (EDS) are used to control user experience, security, audit, peripherals, remote collaboration, and AI. This topic describes the policies used to control peripherals.
Use scenarios
You can use peripheral policies to limit cloud computers from accessing the disks or peripherals of local devices.
Cloud computers access disks of local devices: After you enable local disk mapping, you can access the disks of local devices from a cloud computer.
Cloud computers access peripherals of local devices: You can configure redirection policies to limit the peripherals of local devices that cloud computers can access and specify the redirection method. In addition to redirection policies for peripherals, you can configure a peripheral whitelist or blacklist to control peripheral access in a fine-grained manner.
Configurations
Configuration item | Description | Requirement or limit |
Local disk redirection | ||
Local Disk Mapping | Maps the disks of local devices to the disks of cloud computers. This enables cloud computers to access the disks of local devices. Valid values:
|
|
Peripheral redirection | ||
USB Redirection | After you enable this feature, you can use a cloud computer to access USB devices connected to a client. In addition, you can configure a USB device whitelist or blacklist or configure USB redirection for different types of devices. After you disable this feature, the corresponding peripheral is automatically switched from USB Redirection to Deny. |
|
Webcam | Redirection policies for different types of peripherals. Valid values:
| Only Windows cloud computers for ASP are supported. Only device redirection is supported. |
Scanner | Only USB redirection is supported. | |
ADB | No limit. | |
Printer |
| |
Serial Device | No limit. | |
Peripheral blacklist and whitelist | ||
Peripheral Blacklist/Whitelist | After you configure USB redirection policies for different types of peripherals, you can configure a peripheral whitelist or blacklist. The peripheral blacklist and whitelist take precedence over USB redirection policies configured for different types of peripherals.
|
|
Peripheral management policies | ||
Custom Rules | You can configure custom redirection policies to manage peripherals based on VIDs and PIDs. |
|
Recommended Rule for Best Practice | Policies recommended by EDS for best practices. |
|