Turn on TPM backup to Active Directory Domain Services

This policy setting allows you to manage the Active Directory Domain Services (AD DS) backup of Trusted Platform Module (TPM) owner information. TPM owner information includes a cryptographic hash of the TPM owner password. Certain TPM commands can only be run by the TPM owner. This hash authorizes the TPM to run these commands. If you enable this policy setting TPM owner information will be automatically and silently backed up to AD DS when you use Windows to set or change a TPM owner password. By enabling this policy setting a TPM owner password cannot be set or changed unless the computer is connected to the domain and the AD DS backup succeeds. If you disable or do not configure this policy setting TPM owner information will not be backed up to AD DS. Note: You must first set up appropriate schema extensions and access control settings on the domain before AD DS backup can succeed. Consult online documentation for more information about setting up Active Directory Domain Services for TPM. Note: The TPM cannot be used to provide enhanced security features for BitLocker Drive Encryption and other applications without first setting an owner. To take ownership of the TPM with an owner password run “tpm. msc” and select the action to “Initialize TPM”. Note: If the TPM owner information is lost or is not available limited TPM management is possible by running “tpm. msc” on the local computer.

Configure the level of TPM owner authorization information available to the operating system

This policy setting configures how much of the TPM owner authorization information is stored in the registry of the local computer. Depending on the amount of TPM owner authorization information stored locally the operating system and TPM-based applications can perform certain TPM actions which require TPM owner authorization without requiring the user to enter the TPM owner password. You can choose to have the operating system store either the full TPM owner authorization value the TPM administrative delegation blob plus the TPM user delegation blob or none. If you enable this policy setting Windows will store the TPM owner authorization in the registry of the local computer according to the operating system managed TPM authentication setting you choose. Choose the operating system managed TPM authentication setting of “Full” to store the full TPM owner authorization the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting allows use of the TPM without requiring remote or external storage of the TPM owner authorization value. This setting is appropriate for scenarios which do not depend on preventing reset of the TPM’anti-hammering logic or changing the TPM owner authorization value. Some TPM-based applications may require this setting be changed before features which depend on the TPM’anti-hammering logic can be used. Choose the operating system managed TPM authentication setting of “Delegated” to store only the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting is appropriate for use with TPM-based applications that depend on the TPM anti-hammering logic. External or remote storage of the full TPM owner authorization value for example by backing up the value to Active Directory Domain Services (AD DS) is recommended when using this setting. Choose the operating system managed TPM authentication setting of “None” for compatibility with previous operating systems and applications or for use with scenarios that require TPM owner authorization not be stored locally. Using this setting might cause issues with some TPM-based applications. If this policy setting is disabled or not configured and the “Turn on TPM backup to Active Directory Domain Services” policy setting is also disabled or not configured the default setting is to store the full TPM authorization value in the local registry. If this policy is disabled or not configured and the “Turn on TPM backup to Active Directory Domain Services” group policy setting is enabled then only the administrative delegation and the user delegation blobs are stored in the local registry. Note: If the operating system managed TPM authentication setting is changed from “Full” to “Delegated” the full TPM owner authorization value will be regenerated and any copies of the original TPM owner authorization value will be invalid. If you are backing up the TPM owner authorization value to AD DS the new owner authorization value will be automatically backed up to AD DS when it is changed.

Configure the list of blocked TPM commands

This policy setting allows you to manage the Group Policy list of Trusted Platform Module (TPM) commands blocked by Windows. If you enable this policy setting Windows will block the specified commands from being sent to the TPM on the computer. TPM commands are referenced by a command number. For example command number 129 is TPM_OwnerReadInternalPub and command number 170 is TPM_FieldUpgrade. To find the command number associated with each TPM command run “tpm. msc” and navigate to the “Command Management” section. If you disable or do not configure this policy setting only those TPM commands specified through the default or local lists may be blocked by Windows. The default list of blocked TPM commands is pre-configured by Windows. You can view the default list by running “tpm. msc” navigating to the “Command Management” section and making visible the “On Default Block List” column. The local list of blocked TPM commands is configured outside of Group Policy by running “tpm. msc” or through scripting against the Win32_Tpm interface. See related policy settings to enforce or ignore the default and local lists of blocked TPM commands.

Ignore the default list of blocked TPM commands

This policy setting allows you to enforce or ignore the computer’s default list of blocked Trusted Platform Module (TPM) commands. If you enable this policy setting Windows will ignore the computer’s default list of blocked TPM commands and will only block those TPM commands specified by Group Policy or the local list. The default list of blocked TPM commands is pre-configured by Windows. You can view the default list by running “tpm. msc” navigating to the “Command Management” section and making visible the “On Default Block List” column. The local list of blocked TPM commands is configured outside of Group Policy by running “tpm. msc” or through scripting against the Win32_Tpm interface. See the related policy setting to configure the Group Policy list of blocked TPM commands. If you disable or do not configure this policy setting Windows will block the TPM commands in the default list in addition to commands in the Group Policy and local lists of blocked TPM commands.

Allow RDP redirection of other supported RemoteFX USB devices from this computer

This policy setting allows you to permit RDP redirection of other supported RemoteFX USB devices from this computer. Redirected RemoteFX USB devices will not be available for local usage on this computer. If you enable this policy setting you can choose to give the ability to redirect other supported RemoteFX USB devices over RDP to all users or only to users who are in the Administrators group on the computer. If you disable or do not configure this policy setting other supported RemoteFX USB devices are not available for RDP redirection by using any user account. For this change to take effect you must restart Windows.

Configure RemoteFX

This policy setting allows you to control the availability of RemoteFX on both a Remote Desktop Virtualization Host (RD Virtualization Host) server and a Remote Desktop Session Host (RD Session Host) server. When deployed on an RD Virtualization Host server RemoteFX delivers a rich user experience by rendering content on the server by using graphics processing units (GPUs). By default RemoteFX for RD Virtualization Host uses server-side GPUs to deliver a rich user experience over LAN connections and RDP 7. 1. When deployed on an RD Session Host server RemoteFX delivers a rich user experience by using a hardware-accelerated compression scheme. If you enable this policy setting RemoteFX will be used to deliver a rich user experience over LAN connections and RDP 7. 1. If you disable this policy setting RemoteFX will be disabled. If you do not configure this policy setting the default behavior will be used. By default RemoteFX for RD Virtualization Host is enabled and RemoteFX for RD Session Host is disabled.

Optimize visual experience when using RemoteFX

This policy setting allows you to specify the visual experience that remote users will have in Remote Desktop Connection (RDC) connections that use RemoteFX. You can use this policy to balance the network bandwidth usage with the type of graphics experience that is delivered. Depending on the requirements of your users you can reduce network bandwidth usage by reducing the screen capture rate. You can also reduce network bandwidth usage by reducing the image quality (increasing the amount of image compression that is performed). If you have a higher than average bandwidth network you can maximize the utilization of bandwidth by selecting the highest setting for screen capture rate and the highest setting for image quality. By default Remote Desktop Connection sessions that use RemoteFX are optimized for a balanced experience over LAN conditions. If you disable or do not configure this policy setting Remote Desktop Connection sessions that use RemoteFX will be the same as if the medium screen capture rate and the medium image compression settings were selected (the default behavior).

Enable RemoteFX encoding for RemoteFX clients designed for Windows Server 2008 R2 SP1

This policy setting allows you to configure graphics encoding to use the RemoteFX Codec on the Remote Desktop Session Host server so that the sessions are compatible with non-Windows thin client devices designed for Windows Server 2008 R2 SP1. These clients only support the Windows Server 2008 R2 SP1 RemoteFX Codec. If you enable this policy setting users’ sessions on this server will only use the Windows Server 2008 R2 SP1 RemoteFX Codec for encoding. This mode is compatible with thin client devices that only support the Windows Server 2008 R2 SP1 RemoteFX Codec. If you disable or do not configure this policy setting non-Windows thin clients that only support the Windows Server 2008 R2 SP1 RemoteFX Codec will not be able to connect to this server. This policy setting applies only to clients that are using Remote Desktop Protocol (RDP) 7. 1 and does not affect clients that are using other RDP versions.

Select network detection on the server

This policy setting allows you to specify how the Remote Desktop Protocol will try to detect the network quality (bandwidth and latency). You can choose to disable Connect Time Detect Continuous Network Detect or both Connect Time Detect and Continuous Network Detect. If you disable Connect Time Detect Remote Desktop Protocol will not determine the network quality at the connect time and it will assume that all traffic to this server originates from a low-speed connection. If you disable Continuous Network Detect Remote Desktop Protocol will not try to adapt the remote user experience to varying network quality. If you disable Connect Time Detect and Continuous Network Detect Remote Desktop Protocol will not try to determine the network quality at the connect time; instead it will assume that all traffic to this server originates from a low-speed connection and it will not try to adapt the user experience to varying network quality. If you disable or do not configure this policy setting Remote Desktop Protocol will spend up to a few seconds trying to determine the network quality prior to the connection and it will continuously try to adapt the user experience to varying network quality.

Select RDP transport protocols

This policy setting allows you to specify which protocols can be used for Remote Desktop Protocol (RDP) access to this server. If you enable this policy setting you must specify if you would like RDP to use UDP. You can select one of the following options: “Use both UDP and TCP (default)” “Use only TCP” or “Use either UDP or TCP” If you select “Use either UDP or TCP” and the UDP connection is successful most of the RDP traffic will use UDP. If the UDP connection is not successful or if you select “Use only TCP” all of the RDP traffic will use TCP. If you disable or do not configure this policy setting RDP will choose the optimal protocols for delivering the best user experience.