Event details
Here is a pre question.
In Windows 365, enabling printer or drive mapping provides limited control over how these mappings are managed. For example, Citrix allows restricting redirection to the local (non-network) installed default printer from the client. While Windows 365 can use Group Policy\registry to redirect only the default printer, this setting will also include any network printers selected as the default from the client device, which is not be desirable. Similarly, with drive mapping, Citrix offers granular control to redirect only local drives—such as USB connected or internal SSDs from the local client—whereas Windows 365 will redirect all drives from the client, including network drives, into the cloud PC. Competitors also can allow or deny these mappings on IP range and other factors. Is there a way in 365 to limit network printer and drive mappings into the 365 desktops while allowing local printer and local drives from the device to be mapped? Mapping network printer and drives from the client's device into 365 creates double the traffic by going back and forth from azure to office then back to azure. Thank you
- tylderlurdenDec 03, 2025Brass Contributor
Christian_Montoya I think you missed my question. Mind taking a look.
- Jordan_MarcheseDec 04, 2025
Microsoft
Christian and others brought this to my attention and would love to help out. As of now, there is not a way to provide finer grain controls of redirecting drives and/or printers. As of now, they are either all on or all off. We have heard this feedback previously and are investigating options though we do not have any timelines to share.
I am curious to hear what configuration options would be best for you (allow/deny lists, IP ranges, Defender Purview, etc.)?
- Christian_MontoyaDec 03, 2025
Microsoft
tylderlurden - I'm currently checking around internally, and either I or the corresponding PM will respond back when we have an answer. Thanks!