Skip to main content

How to Redirect USB Devices in XenDesktop 5


This document describes how to map certain USB devices which might be blocked by default.


The endpoint client device must recognize the USB device to have it mapped to the session. If the device requires a special driver, the driver must be installed on the Virtual Desktop Agent (VDA). The device can be still be mapped without the driver as long as the endpoint recognizes it, but it does not function properly.


Certain USB classes are blocked by default because they are used mainly only on local workstations. Smartcard readers are an example.


Caution! This fix requires you to edit the registry. Using Registry Editor incorrectly can cause serious problems that might require you to reinstall your operating system. Citrix cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. Be sure to back up the registry before you edit it.

Find the Class ID and Hardware ID of your device. Follow the steps below:

  1. Open Computer Manager on your endpoint client computer, you should see something like the screen shot below for your USB device (HID compliant devices are blocked by default).
  1. Click Properties and, on the details pane, check the Hardware ID and the Class ID.
  1. In Desktop Studio > HDX policy > User Policies, go to the Desktop Delivery Controller (DDC) and enable Client USB devices redirection.
  2. Go to Client USB devices redirection rules > Edit.
    Set to new and for the above Hardware ID’s Allow: VID=0911 PID=1844.
    Apply the rule. It should create a registry key on the VDI at HKLM\Software\*Policies\*Citrix\ICA_Client\USB and this should include the Allow: VID= PID= #device. If not, you might need to manually create that later.
  3. On your endpoint device, check HKLM\Software\Citrix\Ica Client\GenericUSB\  and the wow6432 node respectively. If you have a 64-bit system, set in the devicerules key allow: VID=0911 PID=1844.

    If you prefer to enable everything for this class, you could also remove the deny class rule. However, the preferred way is to add an allowhardware ID rule. Make sure the allow rule is on the top of the list.

The USB devices should be visible in Desktop Viewer.

  1. If clicking on the device does not map it to the session, consider manually creating the key on the VDA.
    HKLM\Software\Policies\Citrix\ICA_Client\USB\DeviceRules with the allow tags

More Information

The default values are stored on the VDA in HKLM\SOFTWARE\Citrix\PortICA\GenericUSB Type=String Name=”DeviceRules”, however, it is advised not to edit the key because when the VDA checks, it first looks at HKLM\Software\Policies\Citrix\ICA_Client\USB\DeviceRules and thereafter only checks the default location. Therefore, the preferred way is to edit the policies through Group Policy Object (GPO) templates.
You do need to edit the registry on the endpoint to allow the client to offer the USB class.

See also:


Leave a Reply

Your email address will not be published. Required fields are marked *

Turn on pictures to see the captcha *