Setting up and managing device configurations using Intune
For enterprise-managed Windows 11 devices, screenshots and screen recording permissions for Windows apps using Windows.Graphics.Capture are controlled by the App Privacy policy “Let Windows apps take screenshots of various windows or displays.” This is exposed via Group Policy and MDM (Policy CSP – Privacy) and works per Package Family Name (PFN).
Answers aligned to the questions:
- Manifest declaration / capability
The provided context does not define a special MSIX capability such as
screenRecordingor adesktop6extension that would automatically register the app with a default “On” state in the “Screenshots and screen recording” privacy page. Control is instead exposed via policy:
- Policy name:
LetAppsAccessGraphicsCaptureProgrammatic - Friendly name: Let Windows apps take screenshots of various windows or displays
- Group Policy path:
Computer Configuration > Windows Components > App Privacy - Registry key:
Software\Policies\Microsoft\Windows\AppPrivacy
- Enterprise management (GPO / CSP) for a specific PFN For enterprise environments (Intune/MDM or on-prem GPO), use the Privacy CSP nodes that map to this policy and accept PFNs as values:
- Default / user-control behavior:
-
./Device/Vendor/MSFT/Policy/Config/Privacy/LetAppsAccessGraphicsCaptureProgrammatic_UserInControlOfTheseApps - Behavior: “User is in control” – users can manage the toggle in Settings > Privacy.
-
- Force allow specific apps (whitelist by PFN):
-
./Device/Vendor/MSFT/Policy/Config/Privacy/LetAppsAccessGraphicsCaptureProgrammatic_ForceAllowTheseApps - Behavior: Apps listed (by PFN) are always allowed to take screenshots of windows or displays; users cannot change this.
-
- Force deny specific apps:
-
./Device/Vendor/MSFT/Policy/Config/Privacy/LetAppsAccessGraphicsCaptureProgrammatic_ForceDenyTheseApps - Behavior: Apps listed (by PFN) are always blocked; users cannot change this.
-
All three nodes:
- Scope: Device
- Editions: Pro, Enterprise, Education, IoT Enterprise / IoT Enterprise LTSC
- OS: Windows 11, version 21H2 [10.0.22000] and later
- Format:
chr(string), Allowed values: list (delimiter;)
To whitelist a specific app via Intune/MDM, configure LetAppsAccessGraphicsCaptureProgrammatic_ForceAllowTheseApps with a semicolon-separated list of PFNs (for example, YourCompany.YourApp_1234567890abc;AnotherApp_PFN...). A per-app setting here overrides the default.
If the app is open when the policy is applied, the app (or device) must be restarted for the policy to take effect.
- Persistence of user consent across updates
The context describes the policy behavior but does not document the internal behavior of
ConsentStoreorCapabilityAccessManageracross MSIX version increments. What is documented is that policy-based configuration is authoritative and overrides user choice:
- If “Force Allow” or “Force Deny” is configured for a PFN, the user cannot change it in Settings.
- If the policy is disabled or not configured, users control the setting via Settings > Privacy.
For reliable persistence in enterprise environments, use the CSP/GPO “Force Allow” list for the PFN instead of relying on user consent alone. This avoids loss of effective permission when Windows or the app is updated.
- Deep linking to the “Screenshots and screen recording” page
The context does not provide a
ms-settings:URI for deep linking directly to the “Screenshots and screen recording” sub-page, so no documented URI can be given here.
Summary for enterprise rollout:
- Use the PFN-based MDM/GPO policy
LetAppsAccessGraphicsCaptureProgrammatic_ForceAllowTheseAppsto guarantee that the app can always use Windows.Graphics.Capture without users needing to toggle anything. - Configure this via Intune (Privacy CSP) or on-prem Group Policy under Computer Configuration > Windows Components > App Privacy.
- Do not rely solely on manifest capabilities or user consent if deterministic behavior is required after OS or app updates.
References: