Skip to content

Policy Group Management

Before starting specific operations, it is recommended to first read the System Console -> Policy Group Management section. This section details the default policy group templates maintained by system administrators, which serve as the foundation for tenant-specific configurations.

Tenant administrators can browse these system default templates in the tenant console, but cannot directly edit the template content. Tenant administrators need to first copy a policy group from a policy group template, and then perform fine-grained policy editing and adjustments based on specific scenarios (such as office, R&D, outsourcing, etc.).

Create Policy Group

Policy Group Overview


1. Data Loss Prevention (DLP) Policies

To strictly control cloud desktop data leakage, closed-loop prohibition must be implemented for all data transfer channels. It is recommended to configure item by item according to the following matrix to ensure data security:

Dimension Key Configuration Item Strict Control Recommended Setting
Protocol Redirection Printer Prohibit
Protocol Redirection Clipboard Redirection Bi-directional prohibit (or allow only copying from terminal to desktop)
Protocol Redirection Shared Folder Close (or Read-only)
Peripheral Redirection Global Switch Close (or close printer and storage devices)
Peripheral Redirection Printer Close
Peripheral Redirection Storage Device Close
Data Transfer Policy Screenshot Prohibit
Data Transfer Policy Screen Watermark Enable

Strict Data Leakage Prevention Settings

Prohibit Peripheral Access Settings

Dynamic Watermark Settings


2. Client Interaction and Redirection Logic

Some policies are directly displayed on the client interface, allowing users to clearly understand their current permission status and avoid confusion due to unavailability.

2.1 Desktop Toolbar and Peripheral Status

In the top floating toolbar of a connected desktop, users can view peripheral status through the "Device Management" interface:

  • Policy Hint: If a peripheral device is prohibited from performing "device redirection" or "port redirection" due to policy control, this interface will clearly provide a hint.
  • Transparent Management: Through this immediate feedback, users can quickly understand that the peripheral is restricted by administrator-set policies, thereby avoiding confusion due to inability to connect.

Client Data Transfer Settings

2.2 Clipboard and Watermark

  • Interactive Awareness: Clipboard policies will be displayed on the client, allowing end-users to understand their current copy-paste permissions.
  • Security Traceability: Once enabled, the watermark will directly overlay the desktop image, used to prevent illegal screen capture or photography.

Client Dynamic Watermark Display

2.3 Shared Folder Mapping

  • Client Support: End-users (excluding thin client users) can manually add local client directories.
  • Read/Write Permissions: If the policy is set to "read-only", users can only read local data into the desktop, but cannot write data back from the desktop, ensuring data security.

Client Shared Folder Mapping


3. Thin Client USB Storage Logic

In a thin client environment, USB drive redirection behavior varies depending on the USB drive's formatting status:

  • USB Data Directory (Shared Folder Method):
    • Trigger Condition: The USB drive is formatted with a file system recognizable by local Linux and automatically mounted.
    • Advantage: Appears as a network shared folder within the desktop, with better read/write performance. Recommended for priority use.
  • Raw USB Device (Port Redirection Method):
    • Trigger Condition: The USB drive is not formatted or formatted with a file system not recognizable by Linux, and cannot be locally recognized and mounted.
    • Behavior: Can only be mapped to the desktop via port redirection.

4. Access Control Policies

The system automatically determines the user's access environment based on the address used by the client to access the management component:

  • Internal Network Access: The client uses the internal network address of the master management node to access.
  • Public Network Access: The client uses the public network mapped address of the master management node to access, even if the client is actually on the internal network.
  • Admission Restrictions: If the current access time period, access location, or client IP range requirements are not met, the system will refuse to return desktop connection information, and the client will be denied connection.

Client Access Denied - Time

Client Access Denied - Location

Client Access Denied - IP Address


5. Compute Resource Scheduling

The "Release Compute Resources After Shutdown" policy is primarily used to manage resource occupation on different underlying cloud platforms:

  • OpenStack Platform: If checked, when the desktop shuts down, CPU, memory, and GPU resources will be released through archiving and shelving, preventing idle resources from being occupied.
  • ZStack Platform: The underlying platform natively supports automatic release capabilities, so no duplicate configuration is required here.
  • Other Platforms: Depends on the cloud platform's own capabilities.

Note: After modifying a policy group, users usually need to log out from the client and reconnect to the desktop session for the changes to fully take effect. ```