Do not reinitialize a pre-existing roamed user profile when it is loaded on a machine for the first time, Do not show the 'new application installed' notification. set "Use WDDM graphics display driver for Remote Desktop Connections" to disabled Steps: - Disable the policy described above - Restart host computer (one you're remoting into) - re-connect via remote desktop - re-arrange desktop windows - disconnect - re-connect to test and verify nothing has been compacted back to primary monitor. - Use WDDM graphics display driver for Remote Desktop Connections Background: PAM was experiencing slowness in opening RDP session for some Windows target device The issue was solved after turn off this group policy for Windows target device side. Specifically, those with onboard + Nvidia Quadro cards. Ignore the default list of blocked TPM commands, Ignore the local list of blocked TPM commands, Standard User Individual Lockout Threshold, Turn on TPM backup to Active Directory Domain Services, Add the Administrators security group to roaming user profiles, Control slow network connection timeout for user profiles, Delete user profiles older than a specified number of days on system restart, Disable detection of slow network connections, Do not check for user ownership of Roaming Profile Folders, Do not forcefully unload the users registry at user logoff, Do not log users on with temporary profiles, Download roaming profiles on primary computers only, Leave Windows Installer and Group Policy Software Installation Data, Maximum retries to unload and update user profile, Prevent Roaming Profile changes from propagating to the server, Prompt user when a slow network connection is detected, Set maximum wait time for the network if a user has a roaming user profile or remote home directory, Set roaming profile path for all users logging onto this computer, Set the schedule for background upload of a roaming user profile's registry file while user is logged on, User management of sharing user name, account picture, and domain information with apps (not desktop apps), Specify Windows File Protection cache location, Activate Shutdown Event Tracker System State Data feature, Allow Distributed Link Tracking clients to use domain resources, Do not automatically encrypt files moved to encrypted folders, Do not display Manage Your Server page at logon. Prevent users from sharing files within their profile. Prevent users from adding files to the root of their Users Files folder. Begin your Remote Desktop connection, but before you select connect, select Show Options. . start Hyper-V manager go to Hyper-V Settings > Physical GPUs select your GPU check the box Use this GPU with RemoteFX click OK select your virtual machine click Settings click Add Hardware > RemoteFX 3D Video Adapter click Add update RemoteFX settings for your needs click OK That is. Limit Enhanced diagnostic data to the minimum required by Windows Analytics, Allow uploads while the device is on battery while under set Battery level (percentage), Delay Background download Cache Server fallback (in seconds), Delay background download from http (in secs), Delay Foreground download Cache Server fallback (in seconds), Delay Foreground download from http (in secs), Enable Peer Caching while the device connects via VPN, Maximum Background Download Bandwidth (in KB/s), Maximum Background Download Bandwidth (percentage), Maximum Foreground Download Bandwidth (in KB/s), Maximum Foreground Download Bandwidth (percentage), Minimum disk size allowed to use Peer Caching (in GB), Minimum Peer Caching Content File Size (in MB), Minimum RAM capacity (inclusive) required to enable use of Peer Caching (in GB), Select a method to restrict Peer Selection, Set Business Hours to Limit Background Download Bandwidth, Set Business Hours to Limit Foreground Download Bandwidth. Configure the system to use legacy Dictionary Attack Prevention Parameters setting for TPM 2.0. Step-By-Step Guide Step 1. From what I understand, it isn't just the display adapter that causes the issue with affected chipsets, so putting a new video card in the machine or using a generic driver won't help (and it didn't for me). Use WDDM graphics display driver for Remote Desktop Connections -> Disable; Use hardware graphics adapters for all Remote Desktop Services sessions -> Disable; All reactions. Under the Experiences tab, uncheck Persistent bitmap caching and continue connecting. We can disable WDDM graphics on Remote Desktop connection by modifying group policy on the host PC. Step 1: Select an appropriate GPU optimized Azure virtual machine size Spice (1) flag Report. Find your Citrix Admins group, and click OK. Computer Configuration > Policies > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Remote Session Environment > Use WDDM graphics display driver for Remote Desktop Connections | set to "Disabled". set the policy "Use WDDM graphics display driver for Remote Desktop Connections" to DISABLED. - Use WDDM graphics display driver for Remote Desktop Connections Background: PAM was experiencing slowness in opening RDP session for some Windows target device The issue was solved after turn off this group policy for Windows target device side. For this, double the option, select ' Disable '. The Primary Machine is a Windows PC, laptop or Surface Pro tablet. Change Group Policy processing to run asynchronously when a slow network connection is detected. To create these display drivers, perform the following steps: Step 1: Learn about Windows architecture and drivers. Click Display Make sure "Use all my monitory for the remote session" is checked. Keep favorites in sync between Internet Explorer and Microsoft Edge, Prevent access to the about:flags page in Microsoft Edge, Prevent bypassing Windows Defender SmartScreen prompts for files, Prevent bypassing Windows Defender SmartScreen prompts for sites, Prevent changes to Favorites on Microsoft Edge, Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start, Prevent Microsoft Edge from starting and loading the Start and New Tab page at Windows startup and each time Microsoft Edge is closed, Prevent the First Run webpage from opening on Microsoft Edge, Prevent using Localhost IP address for WebRTC, Send all intranet sites to Internet Explorer 11, Show message when opening sites in Internet Explorer, Suppress the display of Edge Deprecation Notification, Allow companion device for secondary authentication, Microsoft Office 365 SharePoint Designer 2013, Ping the settings storage location before sync, Sync settings over metered connections even when roaming, Use User Experience Virtualization (UE-V), Prevent OneDrive files from syncing over metered connections, Prevent OneDrive from generating network traffic until the user signs in to OneDrive, Prevent the usage of OneDrive for file storage, Prevent the usage of OneDrive for file storage on Windows 8.1, Don't launch privacy settings experience on user logon, Make Parental Controls control panel visible on a Domain, Allow hibernate (S4) when starting from a Windows To Go workspace, Disallow standby sleep states (S1-S3) when starting from a Windows to Go workspace, Allow RDP redirection of other supported RemoteFX USB devices from this computer, Allow .rdp files from valid publishers and user's default .rdp settings, Configure server authentication for client, Do not allow hardware accelerated decoding, Prompt for credentials on the client computer, Specify SHA1 thumbprints of certificates representing trusted .rdp publishers, Do not use Remote Desktop Session Host server IP address when virtual IP address is not available, Select the network adapter to be used for Remote Desktop IP Virtualization, Turn off Windows Installer RDS Compatibility, Allow users to connect remotely by using Remote Desktop Services, Deny logoff of an administrator logged in to the console session, Restrict Remote Desktop Services users to a single Remote Desktop Services session, Set rules for remote control of Remote Desktop Services user sessions, Suspend user sign-in to complete app registration, Allow audio and video playback redirection, Do not allow smart card device redirection, Do not allow supported Plug and Play device redirection, Hide notifications about RD Licensing problems that affect the RD Session Host server, Use the specified Remote Desktop license servers, Do not set default client printer to be default printer in a session, Specify RD Session Host server fallback printer driver behavior, Use Remote Desktop Easy Print printer driver first, Limit the size of the entire roaming user profile cache, Set path for Remote Desktop Services Roaming User Profile, Set Remote Desktop Services User Home Directory, Use mandatory profiles on the RD Session Host server, Configure RD Connection Broker server name, Optimize visual experience for Remote Desktop Service Sessions, Optimize visual experience when using RemoteFX, Allow desktop composition for remote desktop sessions, Configure H.264/AVC hardware encoding for Remote Desktop Connections, Configure image quality for RemoteFX Adaptive Graphics, Enable RemoteFX encoding for RemoteFX clients designed for Windows Server 2008 R2 SP1, Enforce Removal of Remote Desktop Wallpaper, Prioritize H.264/AVC 444 graphics mode for Remote Desktop Connections, Remove "Disconnect" option from Shut Down dialog, Remove Windows Security item from Start menu, Use advanced RemoteFX graphics for RemoteApp, Use hardware graphics adapters for all Remote Desktop Services sessions, Use the hardware default graphics adapter for all Remote Desktop Services sessions, Use WDDM graphics display driver for Remote Desktop Connections, Always prompt for password upon connection, Do not allow local administrators to customize permissions, Require use of specific security layer for remote (RDP) connections, Require user authentication for remote connections by using Network Level Authentication, Server authentication certificate template, Set time limit for active but idle Remote Desktop Services sessions, Set time limit for active Remote Desktop Services sessions, Set time limit for logoff of RemoteApp sessions, Prevent automatic discovery of feeds and Web Slices, Prevent subscribing to or deleting a feed or a Web Slice, Turn off background synchronization for feeds and Web Slices, Turn on Basic feed authentication over HTTP, Force TIFF IFilter to perform OCR for every page in a TIFF document, Allow Cortana Page in OOBE on an AAD account, Always use automatic language detection when indexing content and properties, Don't search the web or display web results in Search, Don't search the web or display web results in Search over metered connections, Do not allow locations on removable drives to be added to libraries, Enable indexing of online delegate mailboxes, Enable indexing uncached Exchange folders, Enable throttling for online mail indexing, Prevent adding UNC locations to index from Control Panel, Prevent adding user-specified locations to the All Locations menu, Prevent automatically adding shared folders to the Windows Search index, Prevent clients from querying the index remotely, Prevent customization of indexed locations in Control Panel, Prevent indexing files in offline files cache, Prevent indexing Microsoft Office Outlook, Prevent indexing when running on battery power to conserve energy, Prevent the display of advanced indexing options for Windows Search in the Control Panel, Prevent unwanted iFilters and protocol handlers, Set large or small icon view in desktop search results, Stop indexing in the event of limited hard drive space, Turn on Security Center (Domain PCs only), Timeout for hung logon sessions during shutdown, Turn off legacy remote shutdown interface, Allow certificates with no extended key usage certificate attribute, Allow ECC certificates to be used for logon and authentication, Allow Integrated Unblock screen to be displayed at the time of logon, Display string when smart card is blocked, Force the reading of all certificates from the smart card, Notify user of successful smart card driver installation, Prevent plaintext PINs from being returned by Credential Manager, Reverse the subject name stored in a certificate when displaying, Turn on certificate propagation from smart card, Turn on root certificate propagation from smart card, Control Device Reactivation for Retail devices, Turn off KMS Client Online AVS Validation, Only display the private store within the Microsoft Store, Turn off Automatic Download and Install of updates, Turn off Automatic Download of updates on Win8 machines, Turn off the offer to update to the latest version of Windows, Do not allow printing to Journal Note Writer, For tablet pen input, don't show the Input Panel icon, For touch input, don't show the Input Panel icon, Include rarely used Chinese, Kanji, or Hanja characters, Turn off AutoComplete integration with Input Panel, Turn off password security in Input Panel, Turn off tolerant and Z-shaped scratch-out gestures, Hide Advanced Properties Checkbox in Add Scheduled Task Wizard, Allow uninstallation of language features when a language is uninstalled, Prohibit installing or uninstalling color profiles, Allow Corporate redirection of Customer Experience Improvement uploads, Tag Windows Customer Experience Improvement data with Study Identifier, Configure Corporate Windows Error Reporting, List of applications to always report errors for, List of applications to never report errors for, Automatically send memory dumps for OS-generated error reports, Prevent display of the user interface for critical errors, Send additional data when on battery power, Send data when on connected to a restricted/costed network, Enables or disables Windows Game Recording and Broadcasting, Allow enumeration of emulated smart card for all users, Use certificate for on-premises authentication, Use cloud trust for on-premises authentication, Use Windows Hello for Business certificates as smart card certificates, Allow suggested apps in Windows Ink Workspace, Allow users to browse for source while elevated, Allow users to use media source while elevated, Control maximum size of baseline file cache, Prevent Internet Explorer security prompt for Windows Installer scripts, Prevent users from using Windows Installer to install updates and upgrades, Prohibit non-administrators from applying vendor signed updates, Save copies of transform files in a secure location on workstation, Specify the types of events Windows Installer records in its transaction log, Turn off creation of System Restore checkpoints, Configure the mode of automatically signing in and locking last interactive user after a restart or cold boot, Disable or enable software Secure Attention Sequence, Display information about previous logons during user logon, Report when logon server was not available during user logon, Sign-in and lock last interactive user automatically after a restart, Prevent Windows Media DRM Internet Access, Prevent Quick Launch Toolbar Shortcut Creation, Do not automatically start Windows Messenger initially, Set the default source path for Update-Help, Allow remote server management through WinRM, Disallow WinRM from storing RunAs credentials, Specify channel binding token hardening level, Specify maximum amount of memory in MB per Shell, Specify maximum number of processes per Shell, Specify maximum number of remote shells per user, Hide the Device performance and health area, Hide the Security processor (TPM) troubleshooter page. content, Turn off Help and Support Center Microsoft Knowledge Base search, Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com, Turn off Internet download for Web publishing and online ordering wizards, Turn off Internet File Association service, Turn off Registration if URL connection is referring to Microsoft.com, Turn off Search Companion content file updates, Turn off the "Publish to Web" task for files and folders, Turn off the Windows Messenger Customer Experience Improvement Program, Turn off Windows Customer Experience Improvement Program, Turn off Windows Network Connectivity Status Indicator active tests, Turn off Windows Update device driver searching, Do not allow changes to initiator iqn name, Do not allow changes to initiator CHAP secret, Do not allow sessions without mutual CHAP, Do not allow sessions without one way CHAP, Do not allow adding new targets via manual configuration, Do not allow manual configuration of discovered targets, Do not allow manual configuration of iSNS servers, Do not allow manual configuration of target portals, KDC support for claims, compound authentication and Kerberos armoring, KDC support for PKInit Freshness Extension, Provide information about previous logons to client computers, Allow retrieving the cloud kerberos ticket during the logon, Always send compound authentication first, Define host name-to-Kerberos realm mappings, Define interoperable Kerberos V5 realm settings, Disable revocation checking for the SSL certificate of KDC proxy servers, Fail authentication requests when Kerberos armoring is not available, Kerberos client support for claims, compound authentication and Kerberos armoring, Require strict target SPN match on remote procedure calls, Set maximum Kerberos SSPI context token buffer size, Specify KDC proxy servers for Kerberos clients, Support device authentication using certificate, Enumeration policy for external devices incompatible with Kernel DMA Protection, Disallow copying of user input methods to the system account for sign-in, Disallow user override of locale settings, Allow users to select when a password is required when resuming from connected standby, Always wait for the network at computer startup and logon, Block user from showing account details on sign-in, Do not display the Getting Started welcome screen at logon, Do not enumerate connected users on domain-joined computers, Enumerate local users on domain-joined computers, Hide entry points for Fast User Switching, Turn off app notifications on the lock screen, Do not process incoming mailslot messages used for domain controller location based on NetBIOS domain names, Do not use NetBIOS-based discovery for domain controller location when DNS-based discovery fails, Set Priority in the DC Locator DNS SRV records, Set Weight in the DC Locator DNS SRV records, Specify address lookup behavior for DC locator ping, Specify DC Locator DNS records not registered by the DCs, Specify dynamic registration of the DC Locator DNS Records, Specify Refresh Interval of the DC Locator DNS records, Specify sites covered by the application directory partition DC Locator DNS SRV records, Specify sites covered by the DC Locator DNS SRV records, Specify sites covered by the GC Locator DNS SRV Records, Use automated site coverage by the DC Locator DNS SRV Records. Turn on dynamic Content URI Rules for Windows store apps, Prevent backing up to optical media (CD/DVD), Prevent the user from running the Backup Status and Configuration program, Turn off the ability to back up data files, Turn off the ability to create a system image, Disallow locally attached storage as backup target, Allow domain users to log on using biometrics, Specify timeout for fast user switching events, Allow access to BitLocker-protected fixed data drives from earlier versions of Windows, Choose how BitLocker-protected fixed drives can be recovered, Configure use of hardware-based encryption for fixed data drives, Configure use of passwords for fixed data drives, Configure use of smart cards on fixed data drives, Deny write access to fixed drives not protected by BitLocker, Enforce drive encryption type on fixed data drives. When the Optiplex is the client in a remote desktop session and the host executes a restart, after . Disable binding directly to IPropertySetStorage without intermediate layers. Environment Release : 3.3 Component : PRIVILEGED ACCESS MANAGEMENT Resolution There is no impact.. Worked for me on three machines. To do it, open the Local Group Policy Editor (gpedit.msc) and set Use WDDM graphics display driver for Remote Desktop Connections = Disabled in Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Remote Session Environment (or the same in the registry: reg add . Allow or Disallow use of encryption to protect the RPC protocol messages between File Share Shadow Copy Provider running on application server and File Share Shadow Copy Agent running on the file servers. Define security intelligence location for VDI clients. Way 1. Disable the built-in graphics card will force the system to use a single card. Use WDDM graphics display driver for Remote Desktop Connections to DISABLED This forces RDP to use the old (and now deprecated XDDM drivers) After rebooting, behaviour returns to normal and after disconnecting from an RDP session the RDP host (target machine) no longer shows DWM.EXE consuming CPU. Disable showing balloon notifications as toasts. Background Intelligent Transfer Service (BITS), Microsoft Peer-to-Peer Networking Services, Windows Resource Exhaustion Detection and Resolution, Windows Standby/Resume Performance Diagnostics, Windows System Responsiveness Performance Diagnostics, Periodic check for updates to Internet Explorer and Internet Tools, Microsoft Secondary Authentication Factor, Windows Customer Experience Improvement Program, Resultant Set of Policy snap-in extensions, Search in Group Policy Administrative Templates, Force a specific background and accent color, Force a specific default lock screen and logon image, Prevent changing lock screen and logon image, Allow users to enable online speech recognition services, Force selected system UI language to overwrite the user UI language, Restricts the UI language Windows uses for all logged users, Apply the default user logon picture to all users, Do not allow the BITS client to use Windows Branch Cache, Do not allow the computer to act as a BITS Peercaching client, Do not allow the computer to act as a BITS Peercaching server, Limit the age of files in the BITS Peercache, Limit the maximum network bandwidth for BITS background transfers, Limit the maximum network bandwidth used for Peercaching, Limit the maximum number of BITS jobs for each user, Limit the maximum number of BITS jobs for this computer, Limit the maximum number of files allowed in a BITS job, Limit the maximum number of ranges that can be added to the file in a BITS job, Set default download behavior for BITS jobs on costed networks, Set up a maintenance schedule to limit the maximum network bandwidth used for BITS background transfers, Set up a work schedule to limit the maximum network bandwidth used for BITS background transfers, Configure Client BranchCache Version Support, Enable Automatic Hosted Cache Discovery by Service Connection Point, Set percentage of disk space used for client computer cache, Allow DNS suffix appending to unqualified multi-label name queries, Allow NetBT queries for fully qualified domain names, Prefer link local responses over DNS when received over a network with higher precedence, Register DNS records with connection-specific DNS suffix, Turn off smart multi-homed name resolution, Handle Caching on Continuous Availability Shares, Offline Files Availability on Continuous Availability Shares, Disable password strength validation for Peer Grouping, Turn off Microsoft Peer-to-Peer Networking Services, Windows Defender Firewall: Allow ICMP exceptions, Windows Defender Firewall: Allow inbound file and printer sharing exception, Windows Defender Firewall: Allow inbound remote administration exception, Windows Defender Firewall: Allow inbound Remote Desktop exceptions, Windows Defender Firewall: Allow inbound UPnP framework exceptions, Windows Defender Firewall: Allow local port exceptions, Windows Defender Firewall: Allow local program exceptions, Windows Defender Firewall: Define inbound port exceptions, Windows Defender Firewall: Define inbound program exceptions, Windows Defender Firewall: Do not allow exceptions, Windows Defender Firewall: Prohibit notifications, Windows Defender Firewall: Prohibit unicast response to multicast or broadcast requests, Windows Defender Firewall: Protect all network connections, Windows Defender Firewall: Allow authenticated IPsec bypass, Do not show the "local access only" network icon, Prohibit installation and configuration of Network Bridge on your DNS domain network, Prohibit use of Internet Connection Firewall on your DNS domain network, Prohibit use of Internet Connection Sharing on your DNS domain network, Require domain users to elevate when setting a network's location, Route all traffic through the internal network, Specify domain location determination URL, Domains categorized as both work and personal, Enterprise resource domains hosted in the cloud, Allow or Disallow use of the Offline Files feature, At logoff, delete local copy of user's offline files, Enable file synchronization on costed networks, Prohibit user configuration of Offline Files, Remove "Make Available Offline" for these files and folders, Specify administratively assigned Offline Files, Synchronize all offline files before logging off, Synchronize all offline files when logging on, Turn on economical application of administratively assigned Offline Files, Set IP Stateless Autoconfiguration Limits State, Disable power management in connected standby mode, Enable Windows to soft-disconnect a computer from a network, Minimize the number of simultaneous connections to the Internet or a Windows Domain, Prohibit connection to non-domain networks when connected to domain authenticated network, Prohibit connection to roaming Mobile Broadband networks, Configuration of wireless settings using Windows Connect Now, Prohibit access of the Windows Connect Now wizards, Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services, Set Per-App Cellular Access UI Visibility, Sets how often a DFS Client discovers DC's, Add Printer wizard - Network scan page (Managed network), Add Printer wizard - Network scan page (Unmanaged network), Allow Print Spooler to accept client connections, Always rasterize content to be printed using a software rasterizer, Automatically publish new printers in Active Directory, Change Microsoft XPS Document Writer (MXDW) default output format to the legacy Microsoft XPS format (*.xps), Custom support URL in the Printers folder's left pane, Disallow installation of printers using kernel-mode drivers, Do not allow v4 printer drivers to show printer extensions, Enable Device Control Printing Restrictions, Execute print drivers in isolated processes, Extend Point and Print connection to search Windows Update, Limits print driver installation to Administrators, List of Approved USB-connected print devices, Override print driver execution compatibility setting reported by print driver, Package Point and print - Approved servers, Pre-populate printer search location text, Prune printers that are not automatically republished, Remove "Recently added" list from Start Menu, Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commands, Customize message for Access Denied errors, Enable access-denied assistance on client for all file types, Microsoft Customer Experience Improvement Program (CEIP), Enable automatic cleanup of unused appv packages, Enable background sync to server when on battery power, Allow First Time Application Launches if on a High Cost Windows 8 Metered Connection, Specify what to load in background (aka AutoLoad), Include command line in process creation events, Allow delegating default credentials with NTLM-only server authentication, Allow delegating fresh credentials with NTLM-only server authentication, Allow delegating saved credentials with NTLM-only server authentication, Remote host allows delegation of non-exportable credentials, Restrict delegation of credentials to remote servers, Deploy Windows Defender Application Control, Enable Device Health Attestation Monitoring and Reporting, Allow administrators to override Device Installation Restriction policies, Allow installation of devices that match any of these device IDs, Allow installation of devices that match any of these device instance IDs, Allow installation of devices using drivers that match these device setup classes, Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria, Display a custom message title when device installation is prevented by a policy setting, Display a custom message when installation is prevented by a policy setting, Prevent installation of devices not described by other policy settings, Prevent installation of devices that match any of these device IDs, Prevent installation of devices that match any of these device instance IDs, Prevent installation of devices using drivers that match these device setup classes, Prevent installation of removable devices, Time (in seconds) to force reboot when required for policy changes to take effect, Allow remote access to the Plug and Play interface, Do not send a Windows error report when a generic driver is installed on a device, Prevent creation of a system restore point during device activity that would normally prompt creation of a restore point, Prevent device metadata retrieval from the Internet, Prevent Windows from sending an error report when a device driver requests additional software during installation, Prioritize all digitally signed drivers equally during the driver ranking and selection process, Specify search order for device driver source locations, Specify the search server for device driver updates, Turn off "Found New Hardware" balloons during device installation, Prevent redirection of devices that match any of these device Ids, Log event when quota warning level exceeded, Configure Per-Process System DPI settings, Allow local activation security check exemptions, Define Activation Security Check exemptions, Allow non-administrators to install drivers for these device setup classes, Turn off Windows Update device driver search prompt, Allow only USB root hub connected Enhanced Storage devices, Configure list of Enhanced Storage devices usable on your computer, Configure list of IEEE 1667 silos usable on your computer, Do not allow non-Enhanced Storage removable devices, Do not allow password authentication of Enhanced Storage devices, Do not allow Windows to activate Enhanced Storage devices, Lock Enhanced Storage when the computer is locked, File Classification Infrastructure: Display Classification tab in File Explorer, File Classification Infrastructure: Specify classification properties list, Configure maximum age of file server shadow copies.