Updated on 2024-10-23 GMT+08:00

Configuring Advanced Policy Parameters

Scenario

During policy configuration, you can customize advanced policies for special scenarios.

You can plan and customize application policies of the following types to create efficient policy management solutions for different scenarios.

  • indicates that the policy is enabled.
  • indicates that the policy is disabled.

Peripherals

Configure peripheral application policies, as shown in Table 1.

A peripheral may support USB port redirection, device redirection, and serial port (device) redirection.

Table 1 Peripheral policies

Type

Parameter

Description

Example Value

USB Port Redirection

USB port redirection switch

  • : Workspace end users can use USB devices connected to terminals by using USB port redirection.
  • : Workspace end users cannot use USB devices connected to terminals by using USB port redirection.
  • Default value:

Graphics Device (such as scanners)

  • : End users can use USB graphics devices connected to terminals through USB port redirection.
  • : End users cannot use USB graphics devices connected to terminals through USB port redirection.
  • Default value:

Print Device (such as printer)

  • : End users can use USB print devices connected to terminals through USB port redirection.
  • : End users cannot use USB print devices connected to terminals through USB port redirection.
  • Default value:

Smart Card (such as Ukey)

  • : End users can use smart card devices on a computer through USB port redirection.
  • : End users cannot use smart card devices on a computer through USB port redirection.
  • Default value:

Video Device (such as cameras)

  • : End users can use USB video devices connected to terminals through USB port redirection.
  • : End users cannot use USB video devices connected to terminals through USB port redirection.
  • Default value:

Storage Device (such as USB flash drives)

  • : End users can use USB storage devices connected to terminals through USB port redirection.
  • : End users cannot use USB storage devices connected to terminals through USB port redirection.
  • Default value:

Network Device (such as wireless NIC)

  • : End users can use network devices on a computer through USB port redirection.
  • : End users cannot use network devices on a computer through USB port redirection.
  • Default value:

Wireless Device (such as bluetooth)

  • : End users can use wireless devices on a computer through USB port redirection.
  • : End users cannot use wireless devices on a computer through USB port redirection.
  • Default value:

Other USB Devices

  • : End users can use other USB devices (excluding graphics devices, video devices, printers, storage devices, and smart cards) connected to terminals through USB port redirection.
  • : End users cannot use other USB devices (excluding graphics devices, video devices, printers, storage devices, and smart cards) connected to terminals through USB port redirection.
  • Default value:

USB Port Redirection Customization Policy

Users can customize USB policies and ADV policies using the customized ID or class policy. Use vertical bars (|) to separate multiple policies and store them in a configuration file as a complete string. The string contains a maximum of 1024 characters and cannot contain any of the following special characters: "!@#$%^&*()>?. Format examples are as follows:

  • Customized ID policy format:

    ID:VID:PID:isShare:isCompress

    NOTE:

    PID fuzzy match format (for peripherals with the same VID): ID:VID:FFFF:isShare:isCompress

  • Customized class policy format:

    CLASS:DeviceClass:DeviceSubClass:DeviceProtocol:InterfaceClass:InterfaceSubClass:InterfaceProtocol: isShare:isCompress

  • USB key policy format:

    USBKEY:VID:PID

  • ADV policy format:

    ADV:VID:PID:isSelectConfig:isResetInterface:isSelectInterface:isRevert

    NOTE:
    • Priority: Customized ID policies > customized class policies > basic class policies.
    • PID fuzzy match: This policy is used to forbid or allow the redirection of peripherals with the same VID.
    • ADV: performs advanced debugging on non-standard devices
    • VID: specifies the vendor ID
    • PID: specifies the product ID
    • isShare: specifies whether to allow device redirection If yes, the value is 1. If no, the value is 0.
    • isCompress: specifies whether to allow camera compression, which is only available for cameras. If yes, the value is 1. If no, the value is 0.
    • DeviceClass: specifies the device descriptor class
    • DeviceSubClass: specifies the device descriptor subclass
    • DeviceProtocol: specifies the device descriptor protocol
    • InterfaceClass: specifies the interface descriptor class
    • InterfaceSubClass: specifies the interface descriptor subclass
    • InterfaceProtocol: specifies the interface descriptor protocol
    • The USB key is used together with the key lock function of Westone.
    • isSelectConfig: specifies whether to run the command of selecting configuration on the Linux client
    • isResetInterface: specifies whether to run the command of resetting an interface when selecting configuration on the Linux client
    • isSelectInterface: specifies whether to run the command of selecting an interface on the Linux client
    • isRevert: specifies whether to run the command of negating a device ID on the Linux client
    • Policies are configured for standard devices. If devices cannot be redirected due to custom classes, configure custom policies.

ID:147E:2016:1:0|CLASS:08:06:50:08:06:50:1:0|USBKEY:147E:2016|ADV:78e:79f:1:1:1:1

Linux TC USB Redirection Mode

  • This option is available only for setting the USB redirection mode of Linux TCs.
  • The common mode is recommended for Linux TCs. If a USB device is incompatible with the general mode, you can use the classic mode.

General mode

Printer Redirection

Printer redirection switch

  • : End users can use printers connected to TCs through printer redirection (a policy of device redirection).
  • : End users cannot use printers connected to TCs through printer redirection.
  • Default value:
    NOTICE:

    The printer driver must be installed on both the TC and computer.

Synchronize Client Default Printer

  • : The default printer of the client is synchronized.
  • : The default printer of the client is not synchronized.
  • Default value:

Universal Printer Driver

  • Default
  • HDP XPSDrv Driver
  • Universal Printing PCL 5
  • Universal Printing PCL 6
  • Universal Printing PS

If you select Default, the Universal Printing PS driver is loaded for Linux client printer redirection, and the HDP XPSDrv Driver driver is loaded for Windows client printer redirection.

NOTICE:

To simplify the printer service, ensure that all users use TCs or SCs running the same OS to log in to Workspace. For example, all TCs run Linux.

Default

Session Printer

Session printer switch

  • : After the session printer is enabled and a custom policy is configured, a network sharing printer is automatically created in the session.
  • : The session printer is disabled.
  • Default value:

Session Printer Customization Policy

  • Users can customize a session printer policy by configuring IP address;Printer name;Printer model;Default printer;Settings;Location. Configuration items are separated by semicolons (;), and multiple policies are separated by vertical bars (|) and form a string that is saved in the configuration file. The string contains a maximum of 1024 characters and cannot contain any of the following characters: "!@#$%^&*()>?.
    • IP address: IP address of the printer server, for example, 192.168.1.11. This parameter is mandatory.
    • Printer name: name of the printer, for example, EPSON TM-T88IV Receipt. This parameter is mandatory.
    • Printer model: printer driver model, for example, EPSON TM-T88IV ReceiptSC4. This parameter is mandatory.
    • Default printer: If the value is 0, the printer is not a default printer; if the value is 1, the printer is a default printer. This parameter is mandatory.
    • Settings: If the value is 0, the printer is a network sharing printer; if the value is 1, the printer is a network port printer. This parameter is mandatory.
    • Location: indicates the printer location matching. Partial matching and full matching of client IP addresses, MAC addresses, and TC host names are supported currently. For example, IP:192.168.1.12 indicates full match of IP addresses, IP:192.168 indicates partial match of IP addresses, MAC:00-ac indicates partial match of MAC addresses, and HOSTNAME:workspace-vdesktop indicates full match of host names. If location matching is not required, set the parameter to 0.

192.168.1.11;EPSON TM-T88IV Receipt;EPSON TM-T88IV ReceiptSC4;1;0;IP:192.168.1.12

Camera Redirection

Camera redirection switch

  • : End users can use cameras connected to terminals through camera redirection (a policy of device redirection).
  • : End users cannot use cameras connected to terminals through camera redirection.
  • Default value:
    NOTE:
    • The camera driver must be installed on the terminal.
    • Toggle on the USB Port Redirection switch () and select Video Device (such as cameras).

Camera Frame Rate (FPS)

The value ranges from 1 to 30.

15

Camera Max Width (Pixel)

The value ranges from 1 to 9,999.

3000

Camera Max Height (Pixel)

The value ranges from 1 to 9,999.

3000

Camera Data Compression Mode

H.264

H.264

TWAIN Redirection

TWAIN redirection switch

  • : End users can use TWAIN devices connected to terminals through TWAIN redirection (a policy of device redirection).
  • : End users cannot use TWAIN devices connected to terminals through TWAIN redirection.
  • Default value:
    NOTE:

    The TWAIN driver must be installed on the terminal.

Image Compression Level

Defines the compression level for TWAIN redirection.

  • None (no compression)
  • Low (highest speed)
  • Medium (medium speed)
  • Lossless
  • Low-loss
  • Medium-loss
  • High-loss

Medium (medium speed)

PC/SC Redirection

-

  • If you enable this option, you can use smart cards connected to terminals through PC/SC redirection (a policy of device redirection). Disconnecting user sessions when smart cards are being removed is available.
  • If you disable this option, PC/SC redirection is disabled, but the PC/SC driver is still loaded. If you enable this option again, you do not need to restart the desktop. Disconnecting user sessions when smart cards are being removed is available.
  • If you disable this option, PC/SC smart card redirection is disabled and the PC/SC driver is not loaded. If you enable this option again, you need to restart the desktop.
NOTE:

To configure PC/SC redirection, deselect Smart Card (such as Ukey) in the USB Port Redirection policy. In addition, you need to customize an ID policy in the format of ID:VID:PID:0:0. To enable PC/SC redirection, you need to install the PC/SC driver on the terminal and desktop.

Disabled

Serial Port Redirection

Serial port redirection switch

  • : End users can use serial port devices connected to terminals through serial port redirection.
  • : End users cannot use serial port devices connected to terminals through serial port redirection.
  • Default value:
    NOTE:

    The serial port device driver must be installed on the desktop.

Auto Connect Client Serial Ports

  • : When users log in to Workspace, client serial ports are automatically connected to prevent the serial ports from being used by other local programs. You are advised to enable this parameter.
  • : When users log in to Workspace, client serial ports are not automatically connected.
  • Default value:

Driver Interface Redirection

Customized Drivers

Applications on Workspace call configured APIs to use hardware on terminals.

  • Enter one or more driver file names or full paths of driver files installed on terminals. If multiple ones are entered, separate them with semicolons (;)
  • You can enter driver file names or full paths of driver files on different types of terminals. The HDP client dynamically identifies them.
  • Full path of a driver file. If the path contains spaces, use double quotation marks ("") to quote the path.
  • A driver file name must not contain special characters such as ;*?<>|.
  • This parameter is left empty by default, indicating that the function is disabled.
    NOTE:

    Ensure that hardware devices are supported.

/sdcard/HdpClient/Api/libSKFAPI_arm.so;/sdcard/HdpClient/Api/libSKFAPI_arm64.so;SKFAPI.dll

Audio

Configure audio policies, as shown in Table 2.
Table 2 Audio policies

Type

Parameter

Description

Example Value

Audio Redirection

Audio redirection switch

Applications on user desktops can use audio devices on terminals to record and play audio.

Playback Redirection

Playback redirection switch

This parameter takes effect only after audio redirection is enabled. The playback switch is controlled separately.

  • : Playback redirection is enabled so that end users can play audios.
  • : Playback redirection is disabled so that end users cannot play audios.

Playback Scenario

  • Lossless: The voice quality is better, but the bandwidth usage is the highest.
  • Voice call: The best voice call processing capability can be provided and the bandwidth usage is the lowest, but the music processing capability is average.
  • Music playback: The best music processing capability can be provided and the bandwidth usage is medium, but the voice call processing capability is average.
  • Automatic identification: The user's behavior, such as voice call or music playback, can be identified. The accuracy rate exceeds 90%. The system automatically switches to a better algorithm based on user behavior.

Music playback

Recording Redirection

Recording redirection switch

This policy takes effect only after audio redirection is enabled. The recording switch is controlled separately.

  • : Recording redirection is enabled so that end users can record audios.
  • : Recording redirection is disabled so that end users cannot record audios.

Recording Scenario

  • Lossless: The voice quality is better, but the bandwidth usage is the highest. This level is recommended only when the network bandwidth is sufficient and the network is stable and reliable. Generally, this level is not recommended for audio recording.
  • Voice call: The best voice call processing capability can be provided and the bandwidth usage is the lowest, but the music processing capability is average. You are advised to select this level because audio recording is the most common scenario.
  • Music recording: This option is reserved because recording is rarely used for music playback. Therefore, this option is not recommended for audio recording.
  • Automatic Identification: This option is reserved and is equivalent to Voice call.

Voice call

Client

Configure client policies, as shown in Table 3.
Table 3 Client policies

Parameter

Description

Example Value

Auto Reconnection Interval (s)

Specifies the interval at which the client attempts to connect to the server after the client is disconnected abnormally. The value ranges from 0 to 50.

5

Session Persistence Time (s)

Specifies the longest duration allowed for automatic reconnection attempts after the client is disconnected abnormally. The value ranges from 0 to 180.

180

Auto Monitor Shutdown After Screen Locking

  • : After the VM screen is locked, the monitor is automatically shut down if no keyboard or mouse operation is performed on the client after the waiting time.
    NOTE:

    This policy only applies to TCs and does not take effect for nested login.

  • : After the VM screen is locked, the monitor is not automatically shut down.

Auto Monitor Shutdown In (s)

This parameter is valid only when Auto Monitor Shutdown After Screen Locking is enabled. This parameter specifies the waiting time before the local monitor is automatically shut down after the VM screen is locked. The value range is 10–600,000 seconds.

300

Screenshot Prevention Policy

After the policy is enabled, users are prevented from saving and sharing screenshots on Workspace.

  • : This policy is enabled.
  • : This policy is disabled.
NOTE:

Only Windows clients and Linux TCs are supported. After this function is enabled, other terminals cannot access the system.

Display

Configure display policies, as shown in Table 4.
Table 4 Display policies

Type

Parameter

Description

Example Value

Display

Display Policy Level

  • Level 1: applies to network bandwidth lower than 512 Kbit/s. It can be used only for light-load office scenarios, such as browsing text documents. The display quality of this level is low.
  • Level 2: applies to network bandwidth lower than 1 Mbit/s. It can be used only for light-load office scenarios, such as browsing text documents and static images. The display quality of this level is better than that of level 1.
  • Level 3: applies to network bandwidth lower than 4 Mbit/s. It can be used for medium-load office scenarios, such as browsing documents, images, and dynamic web pages.
  • Level 4 (recommended): applies to network bandwidth lower than 20 Mbit/s. It can be used to play standard definition (SD) and high definition (HD) videos. This level ensures the display quality at a proper bandwidth level.
  • Level 5: applies to network bandwidth higher than 20 Mbit/s. This level delivers good video playback.

Level 4 (recommended)

Display Frame Rate (FPS)

Indicates the image refresh rate in non-video scenarios. Increasing this value improves image and operation smoothness but consumes more network bandwidth and VM CPU resources. The value ranges from 1 to 60. The recommended value ranges from 15 to 25.

25

Video Frame Rate (FPS)

Indicates the image refresh rate of video. Increasing this value improves video playback smoothness but consumes more network bandwidth and VM CPU resources.

NOTE:

This parameter is unavailable after Rendering acceleration is enabled.

-

Bandwidth (kbit/s)

Limits the peak bandwidth of a user. The value ranges from 256 to 25,000.

20000

Image Compression Parameters

Min. Capacity for Image Cache (MB)

The minimum capacity for image cache, expressed in MB. Increasing this value reduces bandwidth usage but consumes more client memory resources. If the parameter is set to a value smaller than 50, the cache function is disabled. The value ranges from 0 to 300.

200

Lossy Compression Recognition Threshold

The threshold for recognizing image complexity. Decreasing this value increases image quality but consumes more network bandwidth resources. The value ranges from 0 to 255.

60

Lossless compression

Specifies the image compression algorithm. You can select Basic compression or Deep compression. When you compress the same picture, the compression ratio and CPU usage of basic compression are lower than those of deep compression.

Basic compression

Deep Compression Level

This parameter takes effect after Deep compression is selected. A higher compression level means a higher compression ratio and CPU usage but lower bandwidth usage. Level 0 indicates a copy operation and no compression is involved. This level consumes the fewest CPU resources but the most bandwidth resources.

Level 0

Lossy Compression Quality

This parameter is used to set the image quality after lossy compression. Increasing this value improves image quality. The value ranges from 20 to 100.

85

Color Enhancement for Office Work

This parameter is used for color enhancement in office scenarios.

  • : Color enhancement for office work is enabled.
  • : Color enhancement for office work is disabled.

Video Compression Parameters

Quality/Bandwidth First

  • Quality First: If this option is selected, video images are compressed at a fixed quality. Average Video Bitrate (Kbit/s) takes effect only after Rendering acceleration is enabled.
  • Bandwidth First: If this option is selected, video images are compressed at a fixed bitrate.

    Average Video Quality, Lowest Video Quality, and Highest Video Quality take effect only after Rendering acceleration is enabled.

Quality

Average Video Bitrate (Kbit/s)

Video compression algorithm parameter. In the Bandwidth First mode, increasing this value improves video quality. The value ranges from 256 to 100,000.

18,000

Peak Video Bitrate (Kbit/s)

Video compression algorithm parameter. Increasing this value improves display quality. The value ranges from 256 to 100,000.

18,000

Average Video Quality

Average quality coefficient of video. In the Quality First mode, increasing this value compromises video quality. The value ranges from 5 to 59.

15

Lowest Video Quality

Lower limit of video quality. In the Quality First mode, increasing this value compromises video quality. The value ranges from 5 to 69.

25

Highest Video Quality

Upper limit of video quality. In the Quality First mode, increasing this value compromises video quality. The value ranges from 1 to 59.

7

GOP Size

Video compression algorithm parameter. Decreasing this value improves video quality but consumes more bandwidth resources. It is recommended that this value be 1 to 2 times the video frame rate. The value ranges from 0 to 65,535.

100

Encoding Preset

Video compression algorithm parameter. Decreasing this value means faster encoding and better smoothness but lower image quality and higher bandwidth usage.

Preset 1

Rendering Acceleration

Rendering Acceleration

  • : Rendering acceleration is enabled to improve smoothness.
  • : Rendering acceleration is disabled.

Video Acceleration Enhancement

  • : Video acceleration enhancement is enabled.
  • : Video acceleration enhancement is disabled.

Video Optimization

  • : Video optimization is enabled to improve smoothness.
  • : Video optimization is disabled.

Disabled

GPU Color Optimization

  • : GPU color optimization is enabled to improve color reproduction in video/office hybrid scenarios.
  • : GPU color optimization is disabled.
NOTE:

This parameter applies only to GPU desktops.

Video Recognition Threshold

Number of frames required when you open or exit a video. It is easier to open or exit a video as the value increases. The value ranges from 0 to 500.

10

Frame Rate Statistical Length

Number of statistical frames during video detection. It is easier to open a video as the value decreases. The value ranges from 2 to 100.

4

Image Quality Threshold

It is easier to open a video as the value decreases. The value ranges from 0 to 100.

0

Refresh Frequency Threshold

It is easier to open a video as the value decreases. The value ranges from 1 to 100.

3

Threshold of Exiting Video Area

It is easier to exit a video as the value decreases. The value ranges from 0 to 100.

8

Min Video Width

It is easier to open a video as the value decreases. The value ranges from 0 to 1,280.

191

Min Video Height

It is easier to open a video as the value decreases. The value ranges from 0 to 1,280.

191

Proportion Threshold of Single-Frame Natural Image Block

It is easier to open a video as the value decreases. The value ranges from 0.000001 to 1.

0.3

Number of Cyclical Natural Images

It is easier to open a video as the value decreases. The value ranges from 0 to 100.

2

Threshold of the Non-Natural Image Area Percentage

It is harder to exit a video as the value increases. The value ranges from 0.000001 to 1.

0.85

Number of Non-Natural Images

It is harder to exit a video as the value increases. The value ranges from 0 to 100.

25

Other Parameters

Graphics Card Memory (MB)

Device memory capacity. The value ranges from 0 to 64. This parameter affects the bandwidth in some scenarios. Increasing this value reduces the bandwidth usage.

64

Driver Delegation Mode

  • : The driver delegation mode is enabled.
  • : The driver delegation mode is disabled.

Driver Delegation Latency (*30ms)

The value ranges from 1 to 100.

80

Video Latency (*30ms)

The value ranges from 1 to 100.

80

Change Resolution in Computer

  • : After the computer resolution change policy is enabled, end users can change the desktop resolution in system settings on Workspace.
  • : After the computer resolution change policy is disabled, end users cannot change the desktop resolution in system settings.

Application Recognition

Configure display policies for specific applications. (Provided by Huawei engineers)

-

File & Clipboard

Configure file & clipboard policies, as shown in Table 5.
Table 5 File & Clipboard policies

Type

Parameter

Description

Example Value

File Redirection

File redirection switch

  • Read-only: Files in drivers and storage devices can only be pre-viewed.
  • Read/write: Files in drivers and storage devices can be modified.

Users can use drivers in file redirection mode on cloud desktops.

Read-only

Client Fixed Driver

  • : Users can use fixed drivers, such as local disks, on Workspace in the file redirection mode.
  • : Users cannot use fixed drivers, such as local disks, on Workspace in the file redirection mode.
NOTE:

When file redirection is disabled, this function is disabled.

Client Removable Driver

  • : Users can use removable drivers, such as USB flash drives, on Workspace in the file redirection mode.
  • : Users cannot use removable drivers, such as USB flash drives, on Workspace in the file redirection mode.
NOTE:

When file redirection is disabled, this function is disabled.

Client Disc Driver

  • : Users can use CD-ROM drivers on Workspace in the file redirection mode.
  • : Users cannot use CD-ROM drivers on Workspace in the file redirection mode.

Client Network Driver

  • : Users can use network drivers on Workspace in the file redirection mode.
  • : Users cannot use network drivers on Workspace in the file redirection mode.

Traffic Control

  • : Traffic control is enabled.
  • : Traffic control is disabled.

Good Network Latency Threshold (ms)

Latency threshold of good network. The value ranges from 1 to 1000.

30

Normal Network Latency Threshold (ms)

Latency threshold of normal network. The value ranges from 1 to 1000.

70

Poor Network Latency Threshold (ms)

Latency threshold of poor network. The value ranges from 1 to 1000.

100

Reducing Step (KB)

Step of reducing the transmission speed. The value ranges from 1 to 100.

20

Slow Increasing Step (KB)

Slow step of increasing the transmission speed. The value ranges from 1 to 100.

10

Quick Increasing Step (KB)

Quick step of increasing the transmission speed. The value ranges from 1 to 100.

20

Start Speed (KB/s)

Initial transmission speed. The value ranges from 1 to 10,240.

1024

Test Block Size (KB)

Block size of speed testing. The value ranges from 64 to 1024.

64

Test Time Gap (ms)

Gap of testing. The value ranges from 1,000 to 100,000.

10,000

Compression

  • : Compression is enabled.
  • : Compression is disabled.

Compression Threshold (Byte)

The value ranges from 0 to 10,240.

512

Min Compression Rate

The value ranges from 0 to 1,000.

900

File Size Supported by Linux

  • : File size can be set on Linux.
  • : File size cannot be set on Linux.

File Size Threshold for Linux (MB)

The value ranges from 0 to 4,096.

100

Mobile Client Redirection

  • : Mobile client redirection is enabled.
  • : Mobile client redirection is disabled.

Linux Root Directory Mounting

  • : Root directory mounting is enabled on Linux.
  • : Root directory mounting is disabled on Linux.

Linux Root Directory Mounting Path

If root directory mounting is enabled on Linux, you need to configure the mounting path. The value contains a maximum of 256 characters in UTF-8 format.

\var\log

Linux File System Mounting Path

The value contains a maximum of 256 characters in UTF-8 format.

\media|\Volumes|\swdb\mnt|\home|\storage|\tmp|\run\media

Linux Fixed Driver File System Format

The value contains a maximum of 256 characters in UTF-8 format.

-

Linux Removable Driver File System Format

The value contains a maximum of 256 characters in UTF-8 format.

vfat|ntfs|msdos|fuseblk|sdcardfs|exfat|fuse.fdredir

Linux CD-ROM Driver File System Format

The value contains a maximum of 256 characters in UTF-8 format.

cd9660|iso9660|udf

Linux Network Driver File System Format

The value contains a maximum of 256 characters in UTF-8 format.

smbfs|afpfs|cifs

Path Separator

A single ASCII character

|

Read/Write Speed (Kbit/s)

This option is disabled when File Redirection and Send File From VM to Client are disabled.

The value 0 indicates that the read/write speed is not limited. Other values indicate the configured read/write speed. The default minimum speed is 32 kbit/s. If the minimum speed is lower than 32 kbit/s, 32 kbit/s is used by default.

0

Send File

Send File from VM to Client

  • : Files on a VM can be sent to the client.
  • : Files on a VM cannot be sent to the client.

Clipboard Redirection

Clipboard Redirection

  • Bidirectional: End users can copy data on client cloud desktops and paste the data on on-premises desktops, or copy data on on-premises desktops and paste the data on client cloud desktops.
  • Server to client: After this function is enabled, end users can only copy data on client cloud desktops and paste the data on on-premises desktops.
  • Client to server: After this function is enabled, end users can only copy data on on-premises desktops and paste the data on client cloud desktops.
NOTE:
  • Rich text copy and file copy are supported only when both the client (TC/SC) and desktop run Windows. A maximum of 500 files can be copied at a time.
  • If the OS of a client (TC/SC or mobile client) or desktop is not Windows, only text can be copied.

Bidirectional

Clipboard Rich Text Redirection

  • : Clipboard rich text redirection is enabled.
  • : Clipboard rich text redirection is disabled.

Clipboard File Redirection

  • : Clipboard file redirection is enabled.
  • : Clipboard file redirection is disabled.

Session

Configure session policies, as shown in Table 6.
Table 6 Session policies

Parameter

Description

Recommended Value

Automatic Screen Lock

  • : Automatic screen lock is enabled. When a desktop is connected, if there is no keyboard or mouse device on the client and no application on the desktop is set to the in-use status after the screen lock waiting time, the desktop screen will be automatically locked.
  • : Automatic screen lock is disabled.
    NOTE:

    For a Windows desktop of HDA 23.8.2 or later, when applications (such as video players and meeting software) on the desktop are set to the in-use status, the desktop is identified as being in use and does not trigger the corresponding automatic policy.

Disabled

Screen Lock In (Minute)

Specifies the waiting time before the desktop screen is automatically locked. The value ranges from 3 to 86,400.

10

Automatic Disconnection/Logout/Restart/Shutdown/Hibernation After Screen Lock

  • Disconnect: Automatic Screen Lock is enabled and Disconnect is selected. If automatic screen lock is triggered and no keyboard or mouse device is available on the client and no application on the desktop is set to the in-use status after the waiting time, the VM is automatically disconnected.
  • Log out: Automatic Screen Lock is enabled and Log out is selected. If automatic screen lock is triggered and no keyboard or mouse device is available on the client and no application on the desktop is set to the in-use status after the waiting time, the VM is automatically logged out of.
  • Restart: Automatic Screen Lock is enabled and Restart is selected. If automatic screen lock is triggered and no keyboard or mouse device is available on the client and no application on the desktop is set to the in-use status after the waiting time, the VM is automatically restarted.
  • Shut down: Automatic Screen Lock is enabled and Shut down is selected. If automatic screen lock is triggered and no keyboard or mouse device is available on the client and no application on the desktop is set to the in-use status after the waiting time, the VM is automatically shut down.
  • Hibernate: Automatic Screen Lock is enabled and Hibernate is selected. If automatic screen lock is triggered and no keyboard or mouse device is available on the client and no application on the desktop is set to the in-use status after the waiting time, the VM is automatically hibernated.
  • Disabled: This parameter is disabled.

Disabled

Automatic Disconnection/Logout/Restart/Shutdown/Hibernation After Screen Lock In (Minute)

Specifies the waiting time before a desktop is automatically disconnected, logged out of, restarted, shut down, or hibernated. The value ranges from 1 to 86,400.

1440

Automatic Logout/Restart/Shutdown/Hibernation After Disconnection

  • Log out: If the client is disconnected from a VM for a period longer than the waiting time, the VM is automatically logged out of.
  • Restart: If the client is disconnected from a VM for a period longer than the waiting time, the VM is automatically restarted.
  • Shut down: If the client is disconnected from a VM for a period longer than the waiting time, the VM is automatically shut down.
  • Hibernate: If the client is disconnected from a VM for a period longer than the waiting time, the VM is automatically hibernated.
  • Disabled: This parameter is disabled.
    NOTE:
    • Automatic Logout/Restart/Shutdown/Hibernation After Disconnection is available only when Disabled or Disconnect is selected for Automatic Disconnection/Logout/Restart/Shutdown/Hibernation After Screen Lock.
    • If another logout, restart, or shutdown task is performed on the VM within the waiting time, the automatic logout, restart, shutdown, or hibernation operation will not be triggered.

Disabled

Automatic Logout/Restart/Shutdown/Hibernation After Disconnection In (Minute)

Specifies the waiting time before a desktop is automatically logged out of, restarted, shut down, or hibernated after disconnection. The value ranges from 10 to 86,400.

10

Self-help console login preemption

This configuration item is used to determine whether preemption login through the self-help console is allowed when a user desktop has been logged in to. indicates that preemption login is allowed and indicates that preemption login is not allowed. By default, preemption login is enabled. The configuration takes effect only after the cloud desktop is restarted.

Watermark

Configure watermark policies, as shown in Table 7.
Table 7 Watermark policies

Parameter

Description

Example Value

Watermark

  • : After this function is enabled, watermarks are displayed on the screen after users access the cloud desktop.
  • : After this function is disabled, no watermark is displayed on the screen after users access the cloud desktop.
    NOTE:

    Displaying watermarks may compromise video playback on the cloud desktop.

Display Mode

  • Fixed position: The watermark is displayed at a fixed position on the screen.
  • Random motion: The watermark moves randomly on the screen every 2 seconds.

Random motion

Font Size

Watermark font size. The value ranges from 8 to 100.

30

Color

Watermark color

Opacity (%)

The value ranges from 0 to 100. 0% indicates completely transparent, and 100% indicates completely opaque.

12.5

Quantity

Number of watermarks. This parameter is available when Display Mode is set to Fixed position. The value ranges from 1 to 17.

1

Tilt

Specifies the tilt of the watermark displayed on the desktop. The value ranges from –90 to 90.

–45

Custom

The content contains only digits, uppercase letters, lowercase letters, and some special characters, and cannot exceed 45 characters. After you customize the content, the desktop screen displays the watermark in the format of Customized content Login username Time displayed on the desktop. For example, if the customized content is set to CopyRight, the watermark is CopyRight user 2022-01-08 01:01:01.

NOTE:
  • The following special characters are allowed:

    ~!@#$%^&*()-_=+|{};:',<.?

  • If line breaks or other special characters are used, the customized content may not take effect.

-

Audio & Video Bypass

After installing applications and the Huawei Cloud Workspace client on a local terminal running Windows 10, you can configure the audio and video bypass policy to access a cloud desktop from the Huawei Cloud Workspace client and use the applications on the local terminal without installing the applications on the cloud desktop. Table 8 describes the general audio and video bypass policy.

The audio and video bypass function has the following restrictions:

  • This parameter is available only when the local terminal runs Windows 10 and the cloud desktop runs Windows.
  • Non-cloud desktop applications can be mapped to cloud desktops using the general audio and video bypass policy only when these applications work properly on local terminals.
  • Before logging in to a cloud desktop and using an application mapped to the cloud desktop through the audio and video bypass policy, you need to stop the applications that have been started on the local terminal. Otherwise, the application cannot be used on the cloud desktop.
  • Before using applications that are mapped to the cloud desktop through the audio and video bypass policy, ensure that the cloud desktop is in full screen mode.
  • When an application that is mapped to the cloud desktop through the audio and video bypass policy is used on the cloud desktop, other applications on the cloud desktop cannot be used to interact with the application. For example, you cannot use the screenshot software on the cloud desktop to capture the application GUI.
  • The input method used by the application is the terminal-side input method. If you want to switch the input method when using an application that is mapped to the cloud desktop through the audio and video bypass policy on the cloud desktop, you need to switch the input method of the local terminal. For example, an input method is switched by using a keyboard shortcut, or an input method is switched on a local desktop by minimizing a cloud desktop.
  • When an application that is mapped to the cloud desktop through the audio and video bypass policy is used on the cloud desktop, if you press Alt+Tab to switch between windows, the local terminal GUI is displayed.
  • If the Video Device (such as cameras) policy in USB Port Redirection is enabled on the current cloud desktop, the camera on the local terminal cannot be used when you perform video-related operations on the cloud desktop using applications mapped to the cloud desktop through the audio and video bypass policy.
  • If you want to copy text between a cloud desktop and an application mapped to the cloud desktop through the audio and video bypass policy, you need to enable the clipboard redirection policy on the cloud desktop. For details about policy configuration, see How Do I Copy Files Between a Desktop and a Local Storage Device?
  • After a local application is mapped to the cloud desktop through the audio and video bypass policy, you are not advised to use the software package to install the application on the cloud desktop. Otherwise, when you start the application on a web page, the application installed using the software package on the cloud desktop will be started.
Table 8 General audio and video bypass policies

Parameter

Description

Example Value

Enable Audio and Video Bypass

  • : The general audio and video bypass policy is enabled.
  • : The general audio and video bypass policy is disabled. By default, this parameter is disabled.

Software Path

Used to configure the software path and start parameters for the general audio and video bypass policy.

Separate multiple paths with semicolons (;). If an installation path contains spaces, use double quotation marks ("") to quote the path. Example:

C:\Windows\System32\notepad.exe hello.txt;"C:\Program Files (x86)\Notepad++.exe" hello.txt;

NOTE:
  • C:\Windows\System32\notepad.exe is the installation path of the corresponding software on the local PC. You can find the shortcut icon of the installed software on the local PC, right-click the shortcut icon, and choose Properties from the shortcut menu. On the Shortcut tab of the application properties, replace the address with that in Target.
  • hello.txt is the start parameter of the corresponding software on the local PC. You need to configure the start parameters only when the software has start parameters. For example, skip this operation for Huawei Cloud Meeting, which does not have start parameters.

C:\Users\Username\AppData\Roaming\HuaweiMeeting\HuaweiMeeting\HuaweiMeeting.exe

Virtual Channel

The administrator can configure a virtual channel policy so that users can access the cloud desktop through the Huawei Cloud Workspace client and download plug-ins. Table 9 describes virtual channel policies.

Table 9 Virtual channel policies

Parameter

Description

Example Value

Virtual Channel Control

  • : The virtual channel control policy is enabled.
  • : The virtual channel control policy is disabled. By default, this parameter is disabled.

Custom Virtual Channel Registered Name

Contact Huawei technical support to obtain it.

-

Configuration Information

Contact Huawei technical support to obtain it.

-

Third-Party Plug-in Name

Used by clients (Windows clients only) to load third-party plug-ins, for example, LyncVdiPluginLib. Multiple plug-in names can be entered and must be separated by spaces or commas (,).

LyncVdiPluginLib

Keyboard & Mouse

Configure keyboard & mouse policies, as shown in Table 10.
Table 10 Keyboard & mouse policies

Parameter

Description

Recommended Value

Computer Mouse Device Feedback

  • Adaptive
  • Forcible
  • Disabled

Adaptive

Computer Mouse Device Simulation Mode

  • Absolute positioning
  • Relative positioning

Absolute positioning

Self-help Console Login Preemption

This configuration item is used to determine whether preemption login through the self-help console is allowed when a user desktop has been logged in to.

Computer External Cursor Feedback

  • : Computer external cursor feedback is enabled.
  • : Computer external cursor feedback is disabled.