惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
G
GRAHAM CLULEY
P
Privacy & Cybersecurity Law Blog
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
宝玉的分享
宝玉的分享
P
Proofpoint News Feed
H
Help Net Security
V
Visual Studio Blog
阮一峰的网络日志
阮一峰的网络日志
C
Cisco Blogs
人人都是产品经理
人人都是产品经理
Know Your Adversary
Know Your Adversary
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
Recorded Future
Recorded Future
I
Intezer
罗磊的独立博客
T
The Exploit Database - CXSecurity.com
Blog — PlanetScale
Blog — PlanetScale
Malwarebytes
Malwarebytes
Spread Privacy
Spread Privacy
T
Tor Project blog
V
Vulnerabilities – Threatpost
云风的 BLOG
云风的 BLOG
腾讯CDC
B
Blog RSS Feed
Stack Overflow Blog
Stack Overflow Blog
F
Future of Privacy Forum
MyScale Blog
MyScale Blog
Latest news
Latest news
IT之家
IT之家
MongoDB | Blog
MongoDB | Blog
The Hacker News
The Hacker News
S
Securelist
博客园 - 【当耐特】
C
CXSECURITY Database RSS Feed - CXSecurity.com
T
Threat Research - Cisco Blogs
Jina AI
Jina AI
Cisco Talos Blog
Cisco Talos Blog
B
Blog
博客园 - 三生石上(FineUI控件)
Last Week in AI
Last Week in AI
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
M
MIT News - Artificial intelligence
V
V2EX
D
Darknet – Hacking Tools, Hacker News & Cyber Security
The Cloudflare Blog
The GitHub Blog
The GitHub Blog
博客园 - 聂微东
F
Full Disclosure
C
CERT Recently Published Vulnerability Notes

WhatIs

How to prevent employee burnout: The essentials 8 AI costs leaders don't always budget for but should SAN security best practices IT automation benefits: A strategic guide for IT leaders Configuring folder redirection works with roaming profiles How to build a business impact analysis checklist AI scribe note quality under question as adoption grows 5 steps of an ERP implementation communication plan What is a roaming profile, and how does it work? Turn data exhaust into business direction Choosing an IT process automation platform for 2026 Mitigating shadow AI use among clinicians as demand grows Using a citizen developer program to boost AI deployments Pennsylvania vs. Character.AI: What the lawsuit signals for the AI legal landscape How cohort analysis improves marketing decisions AI is fundamentally transforming organizations The impact of emerging technologies on SANs 6 ways to improve the CIO-CISO relationship in 2026 Cisco Live 2026 conference coverage and analysis | TechTarget What is a SAN? Ultimate storage area network guide How to plan business continuity activities, with a template Dell Technologies World 2026 news and conference coverage | TechTarget 4 common video conferencing problems and how to solve them Who owns software adoption after launch? Software change stalls when adoption begins AI assistants for IT ops: Select and govern operational bots Attackers targeting storage infrastructure for remote work Top 10 vector database use cases across industries Telehealth playbook aims to bolster rural hospitals amid funding crisis AI existential risk: Is AI a threat to humanity? Facing financial headwinds, health systems prioritize patient loyalty Georgia Tech builds network sandbox to test hospital cyber defenses 10 AI-driven network management tasks Data governance metrics: Measure success, identify issues Explore UCaaS architecture options and when to choose them ERP API integrations: Top challenges and tips for success 8 AI use cases in manufacturing Enterprises are making an AI native transformation Generative AI ethics: 16 biggest concerns and risks Zero trust in the IT ops stack: Securing hybrid workloads How algorithmic value sets enhance clinical decision-making Top methods for collecting customer feedback Understand greenhouse gas emissions vs. carbon emissions Build a data governance team that delivers results How to calculate the total cost of ownership of ERP software Communities call for transparency in AI data center deals Scalable IT infrastructure: Balancing speed with stability How health systems are tackling 'Kill the Clipboard' obstacles Understanding the science behind AI-based hiring assessments Tape's strategic role in modern data protection How to choose an HR software system in 2026: A complete guide The UC stack gets the policy job Strategic IT outlook: Tech conferences and events calendar Top zero-trust use cases in the enterprise 13 top IT infrastructure conferences in 2026 SNMP vs. CMIP: What's the difference? 3 essential network analytics use cases AI Security Risks Force CIOs to Rethink Strategy Red Hat Summit 2026 news and conference guide | TechTarget What is HR technology (human resources tech)? Understand, optimize and track customer journey touchpoints What are the most common authentication methods? Should IT use Apple Business Manager without MDM? Build and organize an effective machine learning team The storage modernization imperative in a fast-changing IT landscape Procurement automation use cases for CSCOs to consider 3 steps for health system leaders to drive patient safety culture What is DevOps? Meaning, methodology and guide Enterprises Face New Storage Bottlenecks as AI Grows A guide to Intune Suite licensing for endpoint management Epic controls 42% of the US EHR market. Does that help or hurt interoperability? SAP Sapphire 2026 news, trends and analysis | TechTarget How to develop a data governance strategy: 7 key steps 12 generative AI tools for marketing and sales teams Top 9 smart contract platforms to consider in 2026 Top 8 e-signature software providers for 2026 Rise with SAP vs. S/4HANA Cloud: What are the differences? How businesses use KPIs to measure AI's performance 5 clues your network has shadow AI How do digital signatures work? Collaboration security and governance must be proactive Compare SAP greenfield vs. brownfield approach for S/4HANA Merck, Home Depot tap Gemini Enterprise for AI agent development Rural challenges may dampen digital healthcare's potential Build an ethical AI framework: 12 top resources The great workload reshuffle: Choices for AI and analytics How to remove a device from Intune enrollment Cisco unveils quantum network advancements 3 BYOD security risks and how to prevent them 10 of the top carbon accounting software 8 trends powering machine learning's dynamic new roles Network engineers must take the lead to push DDI to the cloud How does Microsoft 365 Copilot pricing and licensing work? ONC highlights behavioral health EHR adoption trends, data exchange barriers LLMs struggle with clinical reasoning, study finds Democratizing AI in business: The good, bad and ugly What can organizations do to address BYOD privacy concerns? Fix the service path before you optimize it with AI How AI reshapes upselling in customer experience platforms When collaboration starts becoming operational drag
How to address roaming profiles with GPOs
2026-05-20 · via WhatIs

Article 2 of 3

Part of: Basics of roaming profiles in the enterprise

Roaming profiles can personalize nonpersistent virtual desktops, but IT should plan GPOs, folder redirection, profile versions and FSLogix alternatives.

Jo Harder

By

Published: 20 May 2026

When organizations deploy a new virtual desktop environment, user profiles can significantly affect the user experience.

It is easy for IT administrators -- especially newer admins -- to focus on the virtual desktop image, applications and access policies while overlooking profile strategy. But profile management determines whether users keep the settings, files and personalization they need from one session to the next.

Roaming profiles remain one way to handle that need in nonpersistent virtual desktop environments, but they should not be treated as the default choice for every deployment. IT teams should understand how roaming profiles work, how Group Policy Objects apply them and when newer profile-management options such as FSLogix profile containers might be a better fit.

Note: The following guidance applies mainly to nonpersistent virtual desktops, because persistent virtual desktops already retain more user customization between sessions.

What is a user profile?

User profiles include the option to modify settings such as the start menu and taskbar appearance, background and colors within a virtual desktop. For example, a left-handed user would be frustrated if their virtual desktop presented a right-handed mouse. Being able to designate the left or right mouse setting is not only important for user productivity, but it may also be a legal requirement.

When users request a nonpersistent virtual desktop, they generally just access the base OS. The user profile strategy determines which settings the user can access and how the virtual desktop applies these settings.

3 user profile options

There are three types of basic user profiles.

  • Local. Temporary settings that the user makes on the virtual desktop but are not permanent are considered local profiles. The virtual desktop platform creates a local profile at logon based on a copy of the default profile. Users may become frustrated with local profiles because they require them to adjust the same settings at the start of each session. For example, left-handed mouse users will need to modify the left/right mouse setting at each logon. While local profiles are the default setting, they're often not optimal, and IT administrators should avoid them.
  • Mandatory. When the environment forces a profile upon users and users cannot permanently modify it, this is a mandatory profile. For example, a call center may deploy a mandatory profile for all agents that provides the corporate colors, streamlined presentation of application icons, and more. That left-handed user can modify the left/right mouse setting, but the virtual desktop will not write this into the mandatory profile. While these profiles are easy for IT admins to install and manage, mandatory profiles often frustrate users because they cannot customize the virtual desktops.
  • Roaming. This type of profile enables users to modify and customize settings. When the left-handed user changes the left/right mouse setting, the desktop writes it to the roaming user profile, and the virtual desktop saves it. Therefore, the left-handed mouse setting is in effect at the next virtual desktop session, and the user doesn't need to modify the setting again. From an administrative standpoint, roaming profiles have higher overhead and require more storage, but the UX is optimized and users are generally happier.

With both mandatory and roaming profiles, the user profile is applied to the virtual desktop before the user accesses it. As a result, logon time may increase slightly while the environment loads the profile into the session.

In addition to the basic user profile types, numerous third-party user profile management offerings are available. FSLogix profile containers are also a common Microsoft option for virtual desktop and Azure Virtual Desktop environments. IT departments often use these tools when they need faster sign-ins, better support for nonpersistent desktops, Microsoft 365 app data or more advanced profile-management features than traditional roaming profiles provide.

Why use roaming profiles for virtual desktops?

Of the three inherent user profile types, roaming profiles provide the best UX because settings are personalized based on user modifications. Users typically only modify a few settings for their desired level of personalization, and this level of customization is important for usability, accessibility and productivity. 

That benefit still matters, but IT should balance it against the operational cost. Roaming profiles require careful storage planning, profile-size control and attention to sign-in and sign-out performance. In modern virtual desktop environments, especially nonpersistent desktops, profile containers or third-party profile-management tools might provide a better UX with less profile-copying overhead.

Administratively, roaming profiles require more work effort -- mainly configuration and storage. Configuration is via the roaming profile's Group Policy Object (GPO). User profiles can become quite large, thus affecting storage requirements and load times.

A roaming profile can become corrupted, in which case IT will need to restore the profile from storage. One common risk is using the same roaming profile across multiple Windows versions or builds without validating profile-version compatibility. Mixed Windows environments require careful planning because profile formats, Start menu behavior and user customizations might not roam cleanly across every OS scenario.

Organizations often implement roaming profiles with folder redirection to centralize user data and reduce roaming profile size. Folder redirection is especially useful for keeping large user folders, such as Documents and Desktop, outside the roaming profile. IT should configure folder redirection before enabling roaming profiles so user files do not become part of the profile and increase sign-in and sign-out times.

How to deploy roaming profiles via Group Policy Objects

Before configuring roaming profiles through GPOs, IT should confirm that roaming profiles are still the right profile-management option for the environment. For Azure Virtual Desktop, sessions that rely heavily on Microsoft 365 app data or large nonpersistent VDI deployments, FSLogix profile containers or another profile-management tool might be a better fit.

Once the IT department determines that roaming profiles are the best option for the virtual desktop environment, setting them up through the roaming profiles GPO is straightforward. Many organizations enable roaming profiles only for virtual desktops and use a centralized profile-management approach to deliver a more consistent user experience.

Keep in mind there are two possible ways to configure roaming profiles: a roaming profile for all user sessions or a roaming profile that applies only to remote desktop sessions. These instructions apply only to remote desktops. Also, if both a standard roaming profile and a remote desktop roaming profile are in place, the remote desktop roaming profile will apply itself to the remote sessions.

IT administrators should configure GPOs within Active Directory Group Policy Management. The organization unit where the virtual desktops reside should be the basis for the roaming profiles' GPO designation. IT should also assign the appropriate security group or groups. In addition, IT must designate a file share location with ample storage to house the roaming profiles.

IT administrators should enable roaming profiles for virtual desktops as a computer GPO. Specifically, they should configure this within this GPO: Computer Configuration > Policies > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Profiles. 

Then, choose Set path for Remote Desktop Services Roaming User Profile. Within the Profile path box, administrators should designate the storage location. In addition, IT should append %username% to provide a unique profile directory for each user (Figure 1).

Group Policy interface showing the profile path setting for Remote Desktop Services roaming user profiles.
Figure 1. Admins can set the Remote Desktop Services roaming profile path in Group Policy and append %username% to create unique profile folders.

Within many organizations, virtual desktop administrators may not have security clearance to configure roaming profile GPOs. Organizations should ensure that admins have a lab environment to thoroughly test roaming profile GPO settings before creating a change control order for production rollout.

After deployment, IT should monitor profile size, sign-in duration, sign-out duration, storage consumption and profile-corruption incidents. Those metrics can help determine whether roaming profiles are still meeting user needs or whether the environment should move to FSLogix or another profile-management approach.

Editor's note: This article was updated to reflect current Windows profile-management considerations, including Windows 11, profile versioning, folder redirection and FSLogix profile containers.

Next Steps

Dig Deeper on Virtual and remote desktop strategies

Part of: Basics of roaming profiles in the enterprise

Article 2 of 3

Up Next