Hi SLorraine,
Thanks for reaching out to Microsoft Q&A.
In AVD, monitoring drive redirection activities, especially to see if users are accessing or transferring data through redirected drives, involves checking the logs.
Event Viewer/Local Logs on AVD Session Hosts:
- If auditing is configured, you can check for file access events (ex: eventID 4663, which tracks access to files & folders), could give you insights into when and where files are accessed.
- Application and Services Logs > Microsoft > Windows > TerminalServices-LocalSessionManager: Here you might find events related to session activities, including redirection.
- Application and Services Logs > Microsoft > Windows > RemoteDesktopServices-RdpCoreTS: This log could contain events related to drive redirection when users connect to AVD.
Azure monitor & loganalytics:
- If enabled, diagnostics settings can capture user session events, including drive redirection. The logs can be sent to log analytics, where you can create queries to filter out specific drive redirection activities.
- If native logs are insufficient, custom scripts or policies can be deployed on session hosts to monitor and log drive redirection activities.
Security and auditlogs (If incase yo have this configured):
- Check if there are any specific audit policies set to track drive redirection or file access activities. These logs can then be analyzed using tools like log analytics.
Please 'Upvote'(Thumbs-up) and 'Accept' as an answer if the reply was helpful. This will benefit other community members who face the same issue.