Turn off the display of thumbnails and only display icons on network folders, Turn off Windows Libraries features that rely on indexed file data, Allow Windows Runtime apps to revoke enterprise data, Configure Traditional Chinese IME version, Do not include Non-Publishing Standard Glyph in the candidate list, Restrict character code range of conversion, Turn on misconversion logging for misconversion report, Custom Instant Search Internet search provider, File menu: Disable closing the browser and Explorer windows, File menu: Disable Save As menu option, File menu: Disable Save As Web Page Complete, Help menu: Remove 'For Netscape Users' menu option, Help menu: Remove 'Send Feedback' menu option, Help menu: Remove 'Tip of the Day' menu option, Tools menu: Disable Internet Options menu option, View menu: Disable Full Screen menu option, Hide the button (next to the New Tab button) that opens Microsoft Edge, Turn off details in messages about Internet connection problems, Start the Internet Connection Wizard automatically, Allow the display of image download placeholders, Turn on printing of background colors and images, Turn off inline AutoComplete in File Explorer, Prevent specifying the color of links that have already been clicked, Prevent specifying the color of links that have not yet been clicked, Disable adding schedules for offline pages, Disable channel user interface completely, Disable downloading of site subscription content, Disable editing and creating of schedule groups, Disable editing schedules for offline pages, Disable removing schedules for offline pages, File size limits for Restricted Sites zone, Turn off automatic download of the ActiveX VersionList, Disable customizing browser toolbar buttons, Disable changing Calendar and Contact settings, Disable changing Profile Assistant settings, Disable changing Temporary Internet files settings, Disable external branding of Internet Explorer, Display error message on proxy script download failure, Identity Manager: Prevent users from using Identities, Notify users if Internet Explorer is not the default web browser, Position the menu bar above the navigation bar, Search: Disable Find Files via F3 within the browser, Turn on the auto-complete feature for user names and passwords on forms, Use Automatic Detection for dial-up connections, Permit use of Applications preference extension, Permit use of Control Panel Settings (Computers), Permit use of Control Panel Settings (Users), Permit use of Data Sources preference extension, Permit use of Devices preference extension, Permit use of Drive Maps preference extension, Permit use of Environment preference extension, Permit use of Folder Options preference extension, Permit use of Folders preference extension, Permit use of Ini Files preference extension, Permit use of Internet Settings preference extension, Permit use of Local Users and Groups preference extension, Permit use of Network Options preference extension, Permit use of Network Shares preference extension, Permit use of Power Options preference extension, Permit use of Printers preference extension, Permit use of Regional Options preference extension, Permit use of Registry preference extension, Permit use of Scheduled Tasks preference extension, Permit use of Services preference extension, Permit use of Shortcuts preference extension, Permit use of Start Menu preference extension, Group Policy tab for Active Directory Tools, Restrict the user from entering author mode, Restrict users to the explicitly permitted list of snap-ins, Configure the inclusion of Microsoft Edge tabs into Alt-Tab, Prevent Application Sharing in true color, Prevent changing DirectSound Audio setting, Allow persisting automatic acceptance of Calls. Worked for me on three machines. set "Use WDDM graphics display driver for Remote Desktop Connections" to disabled Steps: - Disable the policy described above - Restart host computer (one you're remoting into) - re-connect via remote desktop - re-arrange desktop windows - disconnect - re-connect to test and verify nothing has been compacted back to primary monitor. . Right-click on the adapter and select " Update Driver ". For PDF files that have both landscape and portrait pages, print each in its own orientation. - go to Computer Configuration > Policies >Windows Settings >Administrative Templates >Windows Components >Remote Desktop Services >Remote Desktop Session Host >Remote Session Environment], - set the Policy [Use WDDM graphics display driver for Remote Desktop Connections] to Disabled. Five Key Steps to Take with Your Golden Images to Get Optimal Remote Configure the system to use legacy Dictionary Attack Prevention Parameters setting for TPM 2.0. * Right-click the current Graphics item in Device manager, and select "Update driver". Define security intelligence location for VDI clients. If you have Windows 10 Pro, run gpedit.msc and navigate to the following: Local Computer Policy > Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Remote Session Environment Set the Use WDDM graphics display driver for Remote Desktop Connections policy to Disabled Turn off storage and display of search history, Prevent removable media source for any installation, Specify the order in which Windows Installer searches for installation files, Set action to take when logon hours expire, Prevent CD and DVD Media Information Retrieval, Prevent Music File Media Information Retrieval, Enables the use of Token Broker for AD FS authentication, SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services. Which version of WDDM your GPU driver uses my system? By typing gpedit.msc in the Start menu or Run box (Win+R) Browse to: Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Remote Session Environment Find the item "Use WDDM graphics display driver for Remote Desktop Connections" and disable it. But give thanks to Carlieo. Computer Configuration > Administrative Templates >Windows Components > Remote Desktop Service Host > Remote Session Environment . Begin your Remote Desktop connection, but before you select connect, select Show Options. blank windows. "Use WDDM graphics display driver for Remote Desktop . Do not reinitialize a pre-existing roamed user profile when it is loaded on a machine for the first time, Do not show the 'new application installed' notification. Use hardware graphics adapters for all Remote Desktop Services sessions set the policy "Use WDDM graphics display driver for Remote Desktop Connections" to DISABLED. Configure telemetry opt-in setting user interface. Share Improve this answer Follow answered Oct 4, 2019 at 16:32 Go to Use WDDM graphics display driver for Remote Desktop Connections, double-click it and choose Disabled . Configure additional sources for untrusted files in Windows Defender Application Guard. Use WDDM graphics display driver for Remote Desktop Connections (Disabled) I have also ran the NVIDIA OpenGL RDP enabler tool so I can run applications that use OpenGL through RDP, but I removed the NVIDIA driver database where this setting is stored to disable it and determined that the problem is not related to OpenGL support state. Allow or Disallow use of encryption to protect the RPC protocol messages between File Share Shadow Copy Provider running on application server and File Share Shadow Copy Agent running on the file servers. OpenCL/ADL get stuck with Windows 10 Remote Desktop (RDP) The WDDM graphics display driver for Remote Desktop Connection which is enabled by default in Windows 10 v2004 and above needs to be disabled as it is not supported by the Citrix VDA. A lot of people preferred using XDDM drivers in these scenarios as it let you squeeze out every last drop of performance. Define the number of days after which a catch-up security intelligence update is required, Define the number of days before spyware security intelligence is considered out of date, Define the number of days before virus security intelligence is considered out of date, Define the order of sources for downloading security intelligence updates, Initiate security intelligence update on startup, Specify the day of the week to check for security intelligence updates, Specify the interval to check for security intelligence updates, Specify the time to check for security intelligence updates, Turn on scan after security intelligence update, Specify threat alert levels at which default action should not be taken when detected, Specify threats upon which default action should not be taken when detected, Allow antimalware service to remain running always, Allow antimalware service to startup with normal priority, Configure detection for potentially unwanted applications, Configure local administrator merge behavior for lists, Define proxy auto-config (.pac) for connecting to the network, Define proxy server for connecting to the network, Allow auditing events in Microsoft Defender Application Guard, Allow camera and microphone access in Microsoft Defender Application Guard, Allow data persistence for Microsoft Defender Application Guard, Allow files to download and save to the host operating system from Microsoft Defender Application Guard, Allow hardware-accelerated rendering for Microsoft Defender Application Guard, Allow Microsoft Defender Application Guard to use Root Certificate Authorities from the user's device, Allow users to trust files that open in Windows Defender Application Guard. Workaround: Set "Use WDDM graphics display driver for Remote Desktop Connections" to Disabled in group policy. Remove Default Programs link from the Start menu. Windows 10 v21H1 and RDP WDDM Bug - The Spiceworks Community Turn on dynamic Content URI Rules for Windows store apps, Prevent backing up to optical media (CD/DVD), Prevent the user from running the Backup Status and Configuration program, Turn off the ability to back up data files, Turn off the ability to create a system image, Disallow locally attached storage as backup target, Allow domain users to log on using biometrics, Specify timeout for fast user switching events, Allow access to BitLocker-protected fixed data drives from earlier versions of Windows, Choose how BitLocker-protected fixed drives can be recovered, Configure use of hardware-based encryption for fixed data drives, Configure use of passwords for fixed data drives, Configure use of smart cards on fixed data drives, Deny write access to fixed drives not protected by BitLocker, Enforce drive encryption type on fixed data drives. Step 1: Select an appropriate GPU optimized Azure virtual machine size . If you enable or do not configure this policy setting, Remote Desktop Connections will use WDDM graphics display driver. Remove Boot / Shutdown / Logon / Logoff status messages, Restrict potentially unsafe HTML Help functions to specified folders, Restrict these programs from being launched from Help, Specify settings for optional component installation and component repair, Specify Windows installation file location, Specify Windows Service Pack installation file location, Turn off Data Execution Prevention for HTML Help Executible, ActiveX installation policy for sites in Trusted zones, Approved Installation Sites for ActiveX Controls, Remove Program Compatibility Property Page, Turn off Application Compatibility Engine, Allow a Windows app to share application data between users, Allow deployment operations in special profiles, Allows development of Windows Store apps and installing them from an integrated development environment (IDE), Disable installing Windows apps on non-system volumes, Prevent non-admin users from installing packaged Windows apps, Prevent users' app data from being stored on non-system volumes, Let Windows apps access account information, Let Windows apps access an eye tracker device, Let Windows apps access diagnostic information about other apps, Let Windows apps access user movements while running in the background, Let Windows apps activate with voice while the system is locked, Let Windows apps communicate with unpaired devices. Frequently Asked Questions for Intel Graphics and Windows Vista* To solve "Your Remote Desktop Service session has ended. Remote Desktop connection failing outside of LAN - The Spiceworks Community You are right - when I set the GPO "Use WDDM graphics display driver for Remote Desktop Connections -> Disable" it does fix the CPU issue and the freezing issue. How to use Windows 10 RemoteFX with GPU acceleration and - NetOSec Step by step instructions to deploy the high GPU VM's in AVD (Azure Prioritize H.264/AVC 444 Graphics mode for Remote Desktop connections. On Windows 10 Start the Group Policy Editor by clicking the Windows button and typing gpedit.msc then under Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Remote Session Environment : 1. Restrict unpacking and installation of gadgets that are not digitally signed. Click Apply, OK and close the Local Group Policy Editor. use wddm graphics display driver for remote desktop connections Specify contact email address or Email ID, Hide the Firewall and network protection area, Hide the Virus and threat protection area, Select when Preview Builds and Feature Updates are received, Allow Automatic Updates immediate installation, Allow non-administrators to receive update notifications, Allow signed updates from an intranet Microsoft update service location, Allow updates to be downloaded automatically over metered connections, Always automatically restart at the scheduled time, Configure auto-restart reminder notifications for updates, Configure auto-restart required notification for updates, Configure auto-restart warning notifications schedule for updates, Delay Restart for scheduled installations, Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box, Do not allow update deferral policies to cause scans against Windows Update, Do not connect to any Windows Update Internet locations, Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box, Do not include drivers with Windows Updates, Enabling Windows Update Power Management to automatically wake up the system to install scheduled updates, No auto-restart with logged on users for scheduled automatic updates installations, Re-prompt for restart with scheduled installations, Remove access to use all Windows Update features, Reschedule Automatic Updates scheduled installations, Specify active hours range for auto-restarts, Specify deadline before auto-restart for update installation, Specify deadlines for automatic updates and restarts, Specify Engaged restart transition and notification schedule for updates, Specify intranet Microsoft update service location, Specify source service for specific classes of Windows Updates, Turn off auto-restart for updates during active hours, Turn off auto-restart notifications for update installations, Turn on recommended updates via Automatic Updates, User State Management Client Side Extension, Hide the "Add a program from CD-ROM or floppy disk" option, Hide the "Add programs from Microsoft" option, Hide the "Add programs from your network" option, Hide the Set Program Access and Defaults page, Specify default category for Add New Programs, Force a specific visual style file or force Windows Classic, Prevent changing visual style for windows and buttons, Prohibit selection of visual style font size, Browse a common web site to find printers, Default Active Directory path when searching for printers, Turn off Windows default printer management, Hide "Set Program Access and Computer Defaults" page, Hide Regional and Language Options administrative options, Hide user locale selection and customization options, Restrict selection of Windows menus and dialogs language, Restricts the UI languages Windows should use for the selected user, Turn off insert a space after selecting a text prediction, Turn off offer text predictions as I type, Always open All Control Panel Items when opening Control Panel, Prohibit access to Control Panel and PC settings, Maximum size of Active Directory searches, Do not add shares of recently opened documents to Network Locations, Hide and disable all items on the desktop, Prevent adding, dragging, dropping and closing the Taskbar's toolbars, Prohibit User from manually redirecting Profile Folders, Remove Properties from the Computer icon context menu, Remove Properties from the Documents icon context menu, Remove Properties from the Recycle Bin context menu, Turn off Aero Shake window minimizing mouse gesture, Ability to change properties of an all user remote access connection, Ability to delete all user remote access connections, Ability to Enable/Disable a LAN connection, Ability to rename all user remote access connections, Ability to rename LAN connections or remote access connections available to all users, Enable Windows 2000 Network Connections settings for Administrators, Prohibit access to properties of a LAN connection, Prohibit access to properties of components of a LAN connection, Prohibit access to properties of components of a remote access connection, Prohibit access to the Advanced Settings item on the Advanced menu, Prohibit access to the New Connection Wizard, Prohibit access to the Remote Access Preferences item on the Advanced menu, Prohibit adding and removing components for a LAN or remote access connection, Prohibit changing properties of a private remote access connection, Prohibit connecting and disconnecting a remote access connection, Prohibit deletion of remote access connections, Prohibit Enabling/Disabling components of a LAN connection, Prohibit renaming private remote access connections, Prohibit viewing of status for an active connection, Turn off notifications when a connection has only limited or no connectivity, Turn off toast notifications on the lock screen, Add "Run in Separate Memory Space" check box to Run dialog box, Clear history of recently opened documents on exit, Clear the recent programs list for new users. Use WDDM graphics display driver for Remote Desktop Connections This policy setting lets you enable WDDM graphics display driver for Remote Desktop Connections. Register domain joined computers as devices, Configure the server address, refresh interval, and issuer certificate authority of a target Subscription Manager, Control Event Log behavior when the log file reaches its maximum size, Events.asp program command line parameters, Hide previous versions list for local files, Hide previous versions list for remote files, Hide previous versions of files on backup location, Prevent restoring local previous versions, Prevent restoring previous versions from backups, Prevent restoring remote previous versions, Allow the use of remote paths in file shortcut icons. You must restart the VM after enabling the WDDM graphics display driver for the changes to take effect. set the policy "Use WDDM graphics display driver for Remote Desktop Connections" to DISABLED. For this change to take effect, you must restart Windows. Spice (1) flag Report. Configure the system to clear the TPM if it is not in a ready state. In the Use WDDM graphics display driver for Remote Desktop Connections dialog, select Disabled. Have a question about this project? To do it, open the Local Group Policy Editor (gpedit.msc) and set Use WDDM graphics display driver for Remote Desktop Connections = Disabled in Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Remote Session Environment (or the same in the registry: reg add . When using Windows Remote Desktop Connection, some users may have encountered an issue where Vic-3D 9 has a program failure when importing or viewing images in a project file. Environment Release : 3.3 Component : PRIVILEGED ACCESS MANAGEMENT Resolution There is no impact.. Background Intelligent Transfer Service (BITS), Microsoft Peer-to-Peer Networking Services, Windows Resource Exhaustion Detection and Resolution, Windows Standby/Resume Performance Diagnostics, Windows System Responsiveness Performance Diagnostics, Periodic check for updates to Internet Explorer and Internet Tools, Microsoft Secondary Authentication Factor, Windows Customer Experience Improvement Program, Resultant Set of Policy snap-in extensions, Search in Group Policy Administrative Templates, Force a specific background and accent color, Force a specific default lock screen and logon image, Prevent changing lock screen and logon image, Allow users to enable online speech recognition services, Force selected system UI language to overwrite the user UI language, Restricts the UI language Windows uses for all logged users, Apply the default user logon picture to all users, Do not allow the BITS client to use Windows Branch Cache, Do not allow the computer to act as a BITS Peercaching client, Do not allow the computer to act as a BITS Peercaching server, Limit the age of files in the BITS Peercache, Limit the maximum network bandwidth for BITS background transfers, Limit the maximum network bandwidth used for Peercaching, Limit the maximum number of BITS jobs for each user, Limit the maximum number of BITS jobs for this computer, Limit the maximum number of files allowed in a BITS job, Limit the maximum number of ranges that can be added to the file in a BITS job, Set default download behavior for BITS jobs on costed networks, Set up a maintenance schedule to limit the maximum network bandwidth used for BITS background transfers, Set up a work schedule to limit the maximum network bandwidth used for BITS background transfers, Configure Client BranchCache Version Support, Enable Automatic Hosted Cache Discovery by Service Connection Point, Set percentage of disk space used for client computer cache, Allow DNS suffix appending to unqualified multi-label name queries, Allow NetBT queries for fully qualified domain names, Prefer link local responses over DNS when received over a network with higher precedence, Register DNS records with connection-specific DNS suffix, Turn off smart multi-homed name resolution, Handle Caching on Continuous Availability Shares, Offline Files Availability on Continuous Availability Shares, Disable password strength validation for Peer Grouping, Turn off Microsoft Peer-to-Peer Networking Services, Windows Defender Firewall: Allow ICMP exceptions, Windows Defender Firewall: Allow inbound file and printer sharing exception, Windows Defender Firewall: Allow inbound remote administration exception, Windows Defender Firewall: Allow inbound Remote Desktop exceptions, Windows Defender Firewall: Allow inbound UPnP framework exceptions, Windows Defender Firewall: Allow local port exceptions, Windows Defender Firewall: Allow local program exceptions, Windows Defender Firewall: Define inbound port exceptions, Windows Defender Firewall: Define inbound program exceptions, Windows Defender Firewall: Do not allow exceptions, Windows Defender Firewall: Prohibit notifications, Windows Defender Firewall: Prohibit unicast response to multicast or broadcast requests, Windows Defender Firewall: Protect all network connections, Windows Defender Firewall: Allow authenticated IPsec bypass, Do not show the "local access only" network icon, Prohibit installation and configuration of Network Bridge on your DNS domain network, Prohibit use of Internet Connection Firewall on your DNS domain network, Prohibit use of Internet Connection Sharing on your DNS domain network, Require domain users to elevate when setting a network's location, Route all traffic through the internal network, Specify domain location determination URL, Domains categorized as both work and personal, Enterprise resource domains hosted in the cloud, Allow or Disallow use of the Offline Files feature, At logoff, delete local copy of user's offline files, Enable file synchronization on costed networks, Prohibit user configuration of Offline Files, Remove "Make Available Offline" for these files and folders, Specify administratively assigned Offline Files, Synchronize all offline files before logging off, Synchronize all offline files when logging on, Turn on economical application of administratively assigned Offline Files, Set IP Stateless Autoconfiguration Limits State, Disable power management in connected standby mode, Enable Windows to soft-disconnect a computer from a network, Minimize the number of simultaneous connections to the Internet or a Windows Domain, Prohibit connection to non-domain networks when connected to domain authenticated network, Prohibit connection to roaming Mobile Broadband networks, Configuration of wireless settings using Windows Connect Now, Prohibit access of the Windows Connect Now wizards, Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services, Set Per-App Cellular Access UI Visibility, Sets how often a DFS Client discovers DC's, Add Printer wizard - Network scan page (Managed network), Add Printer wizard - Network scan page (Unmanaged network), Allow Print Spooler to accept client connections, Always rasterize content to be printed using a software rasterizer, Automatically publish new printers in Active Directory, Change Microsoft XPS Document Writer (MXDW) default output format to the legacy Microsoft XPS format (*.xps), Custom support URL in the Printers folder's left pane, Disallow installation of printers using kernel-mode drivers, Do not allow v4 printer drivers to show printer extensions, Enable Device Control Printing Restrictions, Execute print drivers in isolated processes, Extend Point and Print connection to search Windows Update, Limits print driver installation to Administrators, List of Approved USB-connected print devices, Override print driver execution compatibility setting reported by print driver, Package Point and print - Approved servers, Pre-populate printer search location text, Prune printers that are not automatically republished, Remove "Recently added" list from Start Menu, Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commands, Customize message for Access Denied errors, Enable access-denied assistance on client for all file types, Microsoft Customer Experience Improvement Program (CEIP), Enable automatic cleanup of unused appv packages, Enable background sync to server when on battery power, Allow First Time Application Launches if on a High Cost Windows 8 Metered Connection, Specify what to load in background (aka AutoLoad), Include command line in process creation events, Allow delegating default credentials with NTLM-only server authentication, Allow delegating fresh credentials with NTLM-only server authentication, Allow delegating saved credentials with NTLM-only server authentication, Remote host allows delegation of non-exportable credentials, Restrict delegation of credentials to remote servers, Deploy Windows Defender Application Control, Enable Device Health Attestation Monitoring and Reporting, Allow administrators to override Device Installation Restriction policies, Allow installation of devices that match any of these device IDs, Allow installation of devices that match any of these device instance IDs, Allow installation of devices using drivers that match these device setup classes, Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria, Display a custom message title when device installation is prevented by a policy setting, Display a custom message when installation is prevented by a policy setting, Prevent installation of devices not described by other policy settings, Prevent installation of devices that match any of these device IDs, Prevent installation of devices that match any of these device instance IDs, Prevent installation of devices using drivers that match these device setup classes, Prevent installation of removable devices, Time (in seconds) to force reboot when required for policy changes to take effect, Allow remote access to the Plug and Play interface, Do not send a Windows error report when a generic driver is installed on a device, Prevent creation of a system restore point during device activity that would normally prompt creation of a restore point, Prevent device metadata retrieval from the Internet, Prevent Windows from sending an error report when a device driver requests additional software during installation, Prioritize all digitally signed drivers equally during the driver ranking and selection process, Specify search order for device driver source locations, Specify the search server for device driver updates, Turn off "Found New Hardware" balloons during device installation, Prevent redirection of devices that match any of these device Ids, Log event when quota warning level exceeded, Configure Per-Process System DPI settings, Allow local activation security check exemptions, Define Activation Security Check exemptions, Allow non-administrators to install drivers for these device setup classes, Turn off Windows Update device driver search prompt, Allow only USB root hub connected Enhanced Storage devices, Configure list of Enhanced Storage devices usable on your computer, Configure list of IEEE 1667 silos usable on your computer, Do not allow non-Enhanced Storage removable devices, Do not allow password authentication of Enhanced Storage devices, Do not allow Windows to activate Enhanced Storage devices, Lock Enhanced Storage when the computer is locked, File Classification Infrastructure: Display Classification tab in File Explorer, File Classification Infrastructure: Specify classification properties list, Configure maximum age of file server shadow copies.