Announcing public preview for watermarking on Azure Virtual Desktop
We're pleased to announce Watermarking for Azure Virtual Desktop (AVD) is now in public preview. This feature helps prevent sensitive information from being captured on client endpoints by enabling watermarks to appear as part of remote desktops.
What can I do with AVD watermarking?
- Enable QR code watermarks on AVD desktops
- Scan the QR code watermarks to discover the session's connectionID
- Use the session's connectionID to find the session information via AVD Insights or Azure Monitor Log Analytics
Why is this important?
Alongside AVD screen capture protection, watermarking protects content on AVD from being stolen, used, or altered without the owner's permission. QR code watermarks allow you to trace the session's information.
How can I use it?
AVD watermarking is currently available for full desktops and Windows Desktop clients. Learn how to enable watermarking on AVD here.
Published on:
Learn moreRelated posts
Final Days for the MSOnline and AzureAD PowerShell Modules
After many twists and turns since August 2021, the MSOnline module retirement will happen in April 2025. The AzureAD module will then retire i...
Join the Conversation: Call for Proposals for Azure Cosmos DB Conf 2025!
Are you passionate about Azure Cosmos DB? Do you have insights, experiences, or innovations that the developer community would love to hear? N...
High Performance Computing in Azure - with Mark Russinovich
See the latest innovations in silicon design from AMD with new system-on-a-chip high bandwidth memory breakthroughs with up to 7 terabytes of ...
Power Pages | Azure AD B2C | Confirm Email message on Profile
If you are unfamiliar with configuring Azure AD B2C as a Power Pages Identity Provider, refer to this post: Power Pages : Set up Azure AD B2C ...
Building a RAG-Based Smart Memory Application with Azure SQL Database
Project Mission The way people work and manage information is changing rapidly in our digital age. More and more people are struggling to keep...