Keystroke Shield For AVD & Windows 365

Microsoft announced Windows Cloud Keyboard Input Protection in November 2025 to go in Preview on the 25th of November 2025. And now since the 10th of December finally available in public preview. This feature is purpose‑built to protect keystrokes for Azure Virtual Desktop (short AVD) session hosts and Windows 365 (short W365) Cloud PCs. Below I’ll walk through what it does, why it matters, who and what is supported, and exactly what to do to pilot and deploy it.

IMPORTANT: This feature is in PREVIEW. Read the Supplemental terms for Microsoft Azure Previews before you test the feature in a productive environment.

Close The Endpoint Gap With Keystroke Shield

Cloud virtualization transformed how workspaces are delivered today and expanded the attack surface even more to endpoint devices. Endpoint malware (infostealers, keyloggers, screen scrapers) and unmanaged BYOD devices are major risks. The 2025 Verizon DBIR (page 56) notes 46% of compromises involve non‑managed endpoints.

Microsoft now provides a solution for corporate and managed devices, and even BYOD devices (if managed via Intune), with the Windows Cloud Keyboard Input Protection feature. Windows Cloud Keyboard Input Protection installs a kernel‑level driver on supported physical Windows 11 devices, encrypts keystrokes at the endpoint, and routes them directly to the AVD session host or Cloud PC. Those encrypted keystrokes can only be decrypted from the AVD session host or Cloud PC (if the feature is activated). If the Windows Cloud Keyboard Input Protection MSI is not present on the connecting device, the connection is blocked.

That kernel‑level approach closes the gap left by session encryption and MFA, reducing credential theft and data‑exfiltration risk by shifting the trust boundary to endpoint hardware.

How It Works

This is a short overview of how this new feature works:

  • A kernel driver installed by an MSI encrypts keyboard input on the endpoint.
  • Encrypted input is sent to AVD session host or Cloud PC.
  • Only the remote AVD session host or Cloud PC can decrypt the keystrokes.
  • If the MSI is missing or the device is unsupported, the connection is blocked, and an error is shown.

Platform & Prerequisites

Supported endpoints

  • Physical Windows 11 devices (24H2 and above) only.
    • Windows x64 and Windows ARM 64.
  • Device must have TPM 2.0.
  • Windows App must be 2.0.704.0 or later.

Supported AVD session hosts and Cloud PCs

  • Session hosts must run supported Microsoft Windows client OS (Windows 11 24H2 and above) versions for AVD and W365.
  • Environments managed via Group Policies.
    • Workaround for cloud-only environments.

Not supported

  • macOS, iOS, Android, and web clients.
  • Virtual machines (short VMs) and Windows 365 Link devices.
  • Any Windows device that does not have the MSI installed.

Set Up The Windows Cloud IO Protect Feature

Confirm the endpoint is a physical Windows 11 device with TPM 2.0. To install the Windows Cloud IO Protect driver MSI manually, sign in as a Local Administrator. Choose the MSI that matches the device architecture (Windows x64 or Windows ARM 64), run the installer and follow the prompts, then restart the device so the driver loads. Finally, update the Windows App to v2.0.704.0 or later.

You can automate the MSI via Intune or your preferred software distribution tool. Example silent, no‑restart commands:

msiexec.exe /i wcio_protection_driver_installer_x64_0.0.693.msi /q /norestart
msiexec.exe /x {DA3C949B-037E-45EB-AE2D-9057BB3CA75D} /q /norestart

Remember to schedule a restart after deployment, so the driver is loaded.

How To Enable On AVD Session Hosts And Cloud PCs

Out of the box, this feature is supported via Group Policy for hybrid (AD‑joined) environments. To enable it there, add the Azure Virtual Desktop administrative template to your domain, open Group Policy Management, and create or edit a policy that targets the session hosts. Navigate to Computer Configuration → Policies → Administrative Templates → Windows Components → Remote Desktop Services → Remote Desktop Session Host → Azure Virtual Desktop and enable the policy setting “Enable Keyboard Input Protection.” Apply the GPO to the session hosts and restart them for the setting to take effect.

For Entra‑joined customers, the administrative template isn’t available yet. Microsoft documents a supported registry workaround you can use today (and which you can automate with an Intune script). On each session host, open Registry Editor and create the DWORD fWCIOKeyboardInputProtection with a value of 1 at: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services

Then restart the session host. When native Entra policy support becomes available you can replace the registry script with a proper MDM policy.

How This Fits Into Your Security Posture

Windows Cloud Keyboard Input Protection complements Endpoint Detection and Response (short EDR), device compliance, conditional access, and least‑privilege controls. It’s not a replacement for endpoint security. It’s another, powerful layer that protects input confidentiality end‑to‑end. Use it where input confidentiality matters most, for example remote users, BYOD scenarios, regulated workloads, and any “high‑risk users”.

Conclusion

Windows Cloud Keyboard Input Protection shifts input protection closer to the endpoint hardware. By encrypting keystrokes in the kernel and decrypting them only inside the AVD session host or Cloud PC, it blocks a common route attackers use to harvest credentials and sensitive data. It’s still a preview feature, so test carefully in productive environments. When implemented correctly, it significantly strengthens endpoint‑to‑cloud security for AVD and W365 users.

Sources

You might also like