How to Configure Anti-keylogging and Anti-screen Capture in Virtual Desktop

  • 11 Viewed
  • Updated on May 19, 2026
  • 4 Min Read
     
    Toc Icon

    Table of contents Toc Icon

      Data theft and credential abuse continue to rise as attackers use phishing, malware, and keylogging techniques to steal sensitive information in remote access environments. The 2025 DBIR reinforces this risk, showing that credential abuse drives most attacks across major vectors.

      Verizon has reported that the exploitation of vulnerabilities continues to grow as an initial access vector for breaches, reaching 20%. This figure is close to that of credential abuse, which remains the most common vector.

      Citrix Virtual Apps and Desktops helps reduce these risks with built-in anti-keylogging and anti-screen-capture controls. Anti-keylogging blocks tools that capture keystrokes and steal credentials, while anti-screen capture prevents screenshots or recording of sensitive on-screen activity during virtual sessions. Together, these features strengthen session-level security and limit data exposure.

      Organizations use these protections to secure remote and hybrid work environments where users regularly access sensitive applications and data. This guide explains the step-by-step process for configuring anti-keylogging and anti-screen-capture in Citrix Virtual Desktop.

      Ways to Configure Anti-keylogging and Anti-screen Capture in Virtual Desktop

      Method 1: Using Web Studio

      To configure Anti-keylogging and Anti-screen capture through Web Studio, follow these steps:

      Step 1: Enable XML Trust

      1. Sign in to your Citrix DaaS™ account.
      2. Navigate to Manage > Settings > Enable XML trust.
        Enable XML trust
      3. Turn on the Enable XML trust toggle.

      Step 2: Configure Delivery Group Settings

      1. Go to Manage > Delivery Groups in Citrix DaaS.
      2. Select the required delivery group.
      3. Click Edit from the action bar.
        Edit the delivery group
      4. Select App Protection.
      5. Check Anti-keylogging and Anti-screen capturing.
        Check Anti-keylogging and Anti-screen capturing
      6. Click Save to apply the changes.

      Method 2: Using PowerShell

      Note: In a Citrix DaaS environment, run these commands using the Citrix Virtual Apps and Desktops Remote PowerShell SDK on any machine except Citrix Cloud Connector machines.

      Step 1: Set Delivery Group Protection Policies

      1. Open PowerShell on a Delivery Controller machine or a system with Studio installed and FMA PowerShell snap-ins.
      2. Run the following configuration for the required Delivery Group:
        1. AppProtectionKeyLoggingRequired: True
        2. AppProtectionScreenCaptureRequired: True

      Pro Tip: Users can apply these policies separately for each Delivery Group. For example, enable only keylogging protection for DG1, only screen capture protection for DG2, or enable both protections together for DG3.

      Step 2: Example Configuration

      To enable both protections for a Delivery Group named DG3, run:

      PowerShell
      
      PS> Set-BrokerDesktopGroup -Name DG3 -AppProtectionKeyLoggingRequired $true -AppProtectionScreenCaptureRequired $true
        

      Step 3: Verify Configuration

      Run the following command to validate settings:

      PowerShell
      
      PS> Get-BrokerDesktopGroup -Property Name, AppProtectionKeyLoggingRequired, AppProtectionScreenCaptureRequired | Format-Table –AutoSize
        

      Step 4: Enable XML Trust

      Run the following command to enable XML trust:

      PowerShell
      
      PS> Set-BrokerSite -TrustRequestsSentToTheXmlServicePort $true
        

      Important: Ensure the network between StoreFront and the Broker is properly secured.

      Final Thoughts

      You can configure anti-keylogging and anti-screen capture in Citrix VDI to strengthen protection against credential theft and unauthorized data exposure across virtual sessions. These controls help organizations block malicious keystroke capture attempts and restrict screen recording or screenshots, ensuring sensitive information stays protected throughout user activity. This adds a critical layer of defense in remote and hybrid work environments where users access business-critical apps and data from multiple endpoints.

      Ace Cloud Hosting offers fully managed Citrix Virtual Desktops with enterprise-grade security, built-in protection controls, and 24/7 expert support, so you can focus on operations without handling complex configuration or maintenance. Start your free Desktop as a Service trial today to experience a secure virtual desktop environment within minutes.

      FAQ

      Can I enable these protections during authentication and self-service plug-in usage?

      Yes, you can configure anti-keylogging and anti-screen capture for authentication workflows and the self-service plug-in to protect credentials during login, password entry, and account-related actions. Check the full procedure here.

      Can these security settings be applied to web and SaaS applications?

      Yes, you can extend these protections to web and SaaS apps to prevent sensitive data exposure during browser-based sessions and cloud application usage.

      Do I need separate policies for different Citrix components?

      Yes, Citrix requires separate policy configurations depending on the use case. You must define settings individually for virtual desktops, authentication processes, and web or SaaS application access.

      Do these settings apply automatically across all Citrix environments?

      No, you must enable and configure them separately based on the environment.

      Do these features affect user experience or performance?

      No, these controls run at the security policy level and do not significantly impact performance or the user experience in virtual sessions.

      Are these features enough to fully secure a Citrix environment?

      No, they are part of a layered security approach and should be used along with access control, MFA, encryption, and monitoring policies.

      Can I use different policies for different user groups?

      Yes, Citrix allows policy-based configuration, so you can apply different security levels based on user roles, departments, or access requirements.

      Still Need Help? We’re Here For You!

      Our experts are ready to assist with setup, troubleshooting, or any product issue. Get in touch now!

      About Ace Cloud Hosting

      Ace Cloud Hosting's profile picture

      Ace Cloud Hosting is a trusted cloud solutions provider with 15+ years of experience serving accountants, CPAs, SMBs, and enterprise businesses. We specialize in delivering application hosting, virtual desktops, managed IT, and cybersecurity solutions. With US-based data centers, 99.99% uptime, and 24×7 expert support, Ace Cloud Hosting helps businesses access the high-performance and secure solutions they need.

      Find Ace Cloud Hosting on:

      Leave a Reply

      Your email address will not be published. Required fields are marked *