Then click on Browse my computer for driver software > Let me pick from a list of device drivers > Microsoft Basic Display Adapter, and click OK button." Share Improve this answer Follow answered Jun 12, 2019 at 22:39 BadKitty 1 Add a comment Step 1: Select an appropriate GPU optimized Azure virtual machine size Allow or Disallow use of encryption to protect the RPC protocol messages between File Share Shadow Copy Provider running on application server and File Share Shadow Copy Agent running on the file servers. Restrict unpacking and installation of gadgets that are not digitally signed. Disable showing balloon notifications as toasts. Configure Applications preference extension policy processing, Configure Data Sources preference extension policy processing, Configure Devices preference extension policy processing, Configure Direct Access connections as a fast network connection, Configure Drive Maps preference extension policy processing, Configure Environment preference extension policy processing, Configure Files preference extension policy processing, Configure Folder Options preference extension policy processing, Configure folder redirection policy processing, Configure Folders preference extension policy processing, Configure Group Policy slow link detection, Configure Ini Files preference extension policy processing, Configure Internet Explorer Maintenance policy processing, Configure Internet Settings preference extension policy processing, Configure Local Users and Groups preference extension policy processing, Configure Network Options preference extension policy processing, Configure Network Shares preference extension policy processing, Configure Power Options preference extension policy processing, Configure Printers preference extension policy processing, Configure Regional Options preference extension policy processing, Configure Registry preference extension policy processing, Configure Scheduled Tasks preference extension policy processing, Configure Services preference extension policy processing, Configure Shortcuts preference extension policy processing, Configure software Installation policy processing, Configure Start Menu preference extension policy processing, Configure user Group Policy loopback processing mode, Configure web-to-app linking with app URI handlers, Determine if interactive users can generate Resultant Set of Policy data, Enable AD/DFS domain controller synchronization during policy refresh, Remove users' ability to invoke machine policy refresh, Set Group Policy refresh interval for computers, Set Group Policy refresh interval for domain controllers, Specify startup policy processing wait time, Specify workplace connectivity wait time for policy processing, Turn off background refresh of Group Policy, Turn off Group Policy Client Service AOAC optimization, Turn off Local Group Policy Objects processing, Turn off access to all Windows Update features, Turn off Automatic Root Certificates Update, Turn off downloading of print drivers over HTTP, Turn off handwriting personalization data sharing, Turn off handwriting recognition error reporting, Turn off Help and Support Center "Did you know?" If you enable or do not configure this policy setting, Remote Desktop Connections will use WDDM graphics display driver. In Group Policy Editor under Remote Desktop Session Host -> Remote Session Environment . As the VDA cannot load the display driver, it would not be able to remote using HDX. Use WDDM graphics display driver for Remote Desktop Connections This policy setting lets you enable WDDM graphics display driver for Remote Desktop Connections. set "Use WDDM graphics display driver for Remote Desktop Connections" to disabled Steps: - Disable the policy described above - Restart host computer (one you're remoting into) - re-connect via remote desktop - re-arrange desktop windows - disconnect - re-connect to test and verify nothing has been compacted back to primary monitor. Block launching Universal Windows apps with Windows Runtime API access from hosted content. Use WDDM graphics display driver for Remote Desktop Connections This policy setting lets you enable WDDM graphics display driver for Remote Desktop Connections. We can disable WDDM graphics on Remote Desktop connection by modifying group policy on the host PC. But give thanks to Carlieo. This is a known Vista/Windows 7 limitation. Remove "Map Network Drive" and "Disconnect Network Drive", Remove File Explorer's default context menu, Remove the Search the Internet "Search again" link, Remove UI to change keyboard navigation indicator setting, Remove UI to change menu animation setting, Request credentials for network installations, Turn off common control and window animations, Turn off display of recent search entries in the File Explorer search box, Turn off the caching of thumbnails in hidden thumbs.db files, Turn off the display of snippets in Content view mode. Configure additional sources for untrusted files in Windows Defender Application Guard. Use WDDM graphics display driver for Remote Desktop Connections (Disabled) I have also ran the NVIDIA OpenGL RDP enabler tool so I can run applications that use OpenGL through RDP, but I removed the NVIDIA driver database where this setting is stored to disable it and determined that the problem is not related to OpenGL support state. - Use WDDM graphics display driver for Remote Desktop Connections Background: PAM was experiencing slowness in opening RDP session for some Windows target device The issue was solved after turn off this group policy for Windows target device side. Do not allow compression on all NTFS volumes, Do not allow encryption on all NTFS volumes, Disable delete notifications on all volumes, Selectively allow the evaluation of a symbolic link, Redirect folders on primary computers only, Use localized subfolder names when redirecting Start Menu and My Documents, Configure Applications preference logging and tracing, Configure Data Sources preference logging and tracing, Configure Devices preference logging and tracing, Configure Drive Maps preference logging and tracing, Configure Environment preference logging and tracing, Configure Files preference logging and tracing, Configure Folder Options preference logging and tracing, Configure Folders preference logging and tracing, Configure Ini Files preference logging and tracing, Configure Internet Settings preference logging and tracing, Configure Local Users and Groups preference logging and tracing, Configure Network Options preference logging and tracing, Configure Network Shares preference logging and tracing, Configure Power Options preference logging and tracing, Configure Printers preference logging and tracing, Configure Regional Options preference logging and tracing, Configure Registry preference logging and tracing, Configure Scheduled Tasks preference logging and tracing, Configure Services preference logging and tracing, Configure Shortcuts preference logging and tracing, Configure Start Menu preference logging and tracing, Allow asynchronous user Group Policy processing when logging on through Remote Desktop Services, Allow cross-forest user policy and roaming user profiles, Always use local ADM files for Group Policy Object Editor. When the Optiplex is the client in a remote desktop session and the host executes a restart, after . Save or just connect, but now you should utilize all your monitors. * Right-click the current Graphics item in Device manager, and select "Update driver". Turn off the display of thumbnails and only display icons. Specify contact email address or Email ID, Hide the Firewall and network protection area, Hide the Virus and threat protection area, Select when Preview Builds and Feature Updates are received, Allow Automatic Updates immediate installation, Allow non-administrators to receive update notifications, Allow signed updates from an intranet Microsoft update service location, Allow updates to be downloaded automatically over metered connections, Always automatically restart at the scheduled time, Configure auto-restart reminder notifications for updates, Configure auto-restart required notification for updates, Configure auto-restart warning notifications schedule for updates, Delay Restart for scheduled installations, Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box, Do not allow update deferral policies to cause scans against Windows Update, Do not connect to any Windows Update Internet locations, Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box, Do not include drivers with Windows Updates, Enabling Windows Update Power Management to automatically wake up the system to install scheduled updates, No auto-restart with logged on users for scheduled automatic updates installations, Re-prompt for restart with scheduled installations, Remove access to use all Windows Update features, Reschedule Automatic Updates scheduled installations, Specify active hours range for auto-restarts, Specify deadline before auto-restart for update installation, Specify deadlines for automatic updates and restarts, Specify Engaged restart transition and notification schedule for updates, Specify intranet Microsoft update service location, Specify source service for specific classes of Windows Updates, Turn off auto-restart for updates during active hours, Turn off auto-restart notifications for update installations, Turn on recommended updates via Automatic Updates, User State Management Client Side Extension, Hide the "Add a program from CD-ROM or floppy disk" option, Hide the "Add programs from Microsoft" option, Hide the "Add programs from your network" option, Hide the Set Program Access and Defaults page, Specify default category for Add New Programs, Force a specific visual style file or force Windows Classic, Prevent changing visual style for windows and buttons, Prohibit selection of visual style font size, Browse a common web site to find printers, Default Active Directory path when searching for printers, Turn off Windows default printer management, Hide "Set Program Access and Computer Defaults" page, Hide Regional and Language Options administrative options, Hide user locale selection and customization options, Restrict selection of Windows menus and dialogs language, Restricts the UI languages Windows should use for the selected user, Turn off insert a space after selecting a text prediction, Turn off offer text predictions as I type, Always open All Control Panel Items when opening Control Panel, Prohibit access to Control Panel and PC settings, Maximum size of Active Directory searches, Do not add shares of recently opened documents to Network Locations, Hide and disable all items on the desktop, Prevent adding, dragging, dropping and closing the Taskbar's toolbars, Prohibit User from manually redirecting Profile Folders, Remove Properties from the Computer icon context menu, Remove Properties from the Documents icon context menu, Remove Properties from the Recycle Bin context menu, Turn off Aero Shake window minimizing mouse gesture, Ability to change properties of an all user remote access connection, Ability to delete all user remote access connections, Ability to Enable/Disable a LAN connection, Ability to rename all user remote access connections, Ability to rename LAN connections or remote access connections available to all users, Enable Windows 2000 Network Connections settings for Administrators, Prohibit access to properties of a LAN connection, Prohibit access to properties of components of a LAN connection, Prohibit access to properties of components of a remote access connection, Prohibit access to the Advanced Settings item on the Advanced menu, Prohibit access to the New Connection Wizard, Prohibit access to the Remote Access Preferences item on the Advanced menu, Prohibit adding and removing components for a LAN or remote access connection, Prohibit changing properties of a private remote access connection, Prohibit connecting and disconnecting a remote access connection, Prohibit deletion of remote access connections, Prohibit Enabling/Disabling components of a LAN connection, Prohibit renaming private remote access connections, Prohibit viewing of status for an active connection, Turn off notifications when a connection has only limited or no connectivity, Turn off toast notifications on the lock screen, Add "Run in Separate Memory Space" check box to Run dialog box, Clear history of recently opened documents on exit, Clear the recent programs list for new users. In the Windows search box, type gpedit.msc, and press Enter. Allow Secure Boot for integrity validation, Choose how BitLocker-protected operating system drives can be recovered, Configure pre-boot recovery message and URL, Configure TPM platform validation profile (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2), Configure TPM platform validation profile for BIOS-based firmware configurations, Configure TPM platform validation profile for native UEFI firmware configurations, Configure use of hardware-based encryption for operating system drives, Configure use of passwords for operating system drives, Disallow standard users from changing the PIN or password, Enable use of BitLocker authentication requiring preboot keyboard input on slates, Enforce drive encryption type on operating system drives, Require additional authentication at startup (Windows Server 2008 and Windows Vista), Require additional authentication at startup, Reset platform validation data after BitLocker recovery, Use enhanced Boot Configuration Data validation profile, Allow access to BitLocker-protected removable data drives from earlier versions of Windows, Choose how BitLocker-protected removable drives can be recovered, Configure use of hardware-based encryption for removable data drives, Configure use of passwords for removable data drives, Configure use of smart cards on removable data drives, Control use of BitLocker on removable drives, Deny write access to removable drives not protected by BitLocker, Enforce drive encryption type on removable data drives, Choose default folder for recovery password, Choose drive encryption method and cipher strength (Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10 [Version 1507]), Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later), Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2), Choose how users can recover BitLocker-protected drives (Windows Server 2008 and Windows Vista), Disable new DMA devices when this computer is locked, Provide the unique identifiers for your organization, Store BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista), Validate smart card certificate usage rule compliance, Do not display the password reveal button, Enumerate administrator accounts on elevation, Prevent the use of security questions for local accounts, Require trusted path for credential entry, Allow device name to be sent in Windows diagnostic data, Configure Authenticated Proxy usage for the Connected User Experience and Telemetry service, Configure collection of browsing data for Desktop Analytics, Configure Connected User Experiences and Telemetry, Configure diagnostic data upload endpoint for Desktop Analytics.