Resolving DPI Scaling Issues in Windows Server 2022 via RDP & Horizon

  • Thread Author

A man is focused on reading dense text displayed on a large computer monitor.
Windows Server 2022 DPI Scaling Issues via RDP & Horizon​

Windows Server 2022 users have recently encountered a perplexing issue: display scaling anomalies occur whether you’re connecting via RDP or through VMware Horizon (now Omnissa). The anomaly—where visual elements appear either oversized or undersized—has been traced to unusual DPI settings applied by Windows, and it’s disrupting a critical Remote Desktop Services (RDS) environment. Let’s break down the problem, the evidence gathered, and possible approaches to troubleshoot and ultimately resolve these scaling glitches.

Understanding the Environment and the Issue​

The problem surfaced in an environment running:
  • VMware Horizon 8 (latest version, now rebranded as Omnissa)
  • Windows Server 2022 Datacenter with all current updates
In this setup, users observed that upon connecting, either via standard RDP sessions or through Horizon, the scaling was not consistent. Depending on the resolution of the connecting client, everything on the server could appear unnaturally large or unusually small—a behavior symptomatic of an incorrect DPI setting.

Key Observations:​

  • Incorrect DPI Values: A look in the registry under HKCU\Control Panel\Desktop\WindowMetrics revealed that on the problematic server, the key AppliedDPI was set to 0x00000078 (120), which corresponds to a 125% scaling setting. Conversely, on a working version of the server, this value was 0x00000060 (96), the standard value for 100% scaling.
  • Temporary Resolution: Restoring the affected server from backup seemed to temporarily fix the scaling. However, after a few days, the problem reappeared.
  • User Specific Impact: When access was limited solely to the IT department, the scaling issue did not reoccur. This points to a possibility that a specific user (or user action) might be inadvertently triggering the change in scaling configuration.
  • Client-Side Requests Ignored: Despite logs from Horizon showing that the client correctly requested the appropriate scaling factor, Windows appears to override those settings, leaving the display improperly scaled even at the ESXi console’s lock screen.

Investigating the Root Causes​

When faced with DPI scaling issues in a Windows Server 2022 RDS environment, several factors can contribute to the discrepancies:

1. DPI Settings and Registry Tweaks​

Windows manages DPI settings not only through display settings but also via registry keys. In our case, the key under HKCU\Control Panel\Desktop\WindowMetrics is crucial. The expected standard is an AppliedDPI value of 96 (100%), but the problematic system was using a value of 120 (125%). This deviation suggests:
  • User-Initiated Changes: The fact that scaling remains correct when only IT users log in hints that one or more user profiles could be applying custom scaling settings, altering the registry.
  • Persistence and Reversion: The temporary fix provided by the backup restoration further indicates that the default state (with the correct DPI setting) is being modified over time—perhaps following a user session where certain display settings are adjusted, either intentionally or inadvertently.

2. RDP and Horizon Agent Behavior​

Remote Desktop Protocol and VMware Horizon agents are known to handle DPI scaling in slightly different ways compared to local console sessions. Some important factors include:
  • Client vs. Server Scaling Negotiation: In optimal setups, the client’s scaling request should be honored by the server, but the logs indicate that while the correct scaling is requested, Windows ends up applying a different setting.
  • Agent Versions: The Horizon Agent was reinstalled in an attempt to resolve this, but no change was noted. This could mean that the issue is less about the agent and more about how Windows Server 2022 processes DPI adjustments for remote sessions.

3. Potential Software Bugs or Update-Induced Changes​

Given that Windows Server 2022 is continuously updated, it’s not out of the realm of possibility that a recent security patch or feature update might have inadvertently affected how DPI scaling metrics are calculated or applied. A known bug or a regression in recent updates could override client-specific settings with an incorrect default value.

Strategies to Diagnose and Resolve the Issue​

For IT professionals and system administrators grappling with this puzzle, here are several steps and recommendations that merge both standard troubleshooting methods and insights based on community feedback:

A. Registry and Profile Checks​

  • Inspect User Profiles: Verify which user profiles are in use, and compare their registry settings under HKCU\Control Panel\Desktop\WindowMetrics. It may be that a particular user account—once logged in—introduces a DPI override.
  • Baseline Comparison: Since restoring the server from backup temporarily fixes the problem, document the baseline registry settings. You might consider scripting a routine to check or even enforce the correct AppliedDPI value upon user login.

B. RDP and Horizon Configuration Adjustments​

  • Override Client Scaling Settings: In RDP’s advanced options, there is a setting to override client scaling rules on high-DPI displays. Experiment with these settings to see if they enforce the desired DPI.
  • Agent Updates: Even though reinstalling the Horizon Agent did not help this time, remain vigilant for updated versions or patches from VMware/Omnissa that might specifically address DPI handling.
  • Session Policies: Consider implementing Group Policy settings that lock out users from altering display scaling properties, thereby maintaining consistent behavior across sessions.

C. Engage Vendor and Community Support​

  • Microsoft and VMware Support: Because this behavior is observed on the latest versions of Windows Server 2022 and VMware Horizon, raising a support ticket with both vendors could shed light on whether this is a known issue or requires a deeper fix.
  • User Community Input: As demonstrated in the Spiceworks community thread, peer insights can be invaluable. Other IT professionals might have identified workarounds or diagnostic techniques that worked in similar environments.

D. Monitor and Document​

  • Logging and Analysis: Increase logging for sessions where the DPI setting is overridden. Check Windows Event Logs for any entries around display settings modifications.
  • Pattern Recognition: Identify if there’s a common factor when the settings revert (for instance, after a specific user logs in or after certain system events). This pattern could help isolate the cause.

Broader Implications for Windows RDS and Remote Display Technologies​

The challenges posed by DPI scaling in remote environments are not entirely new. As remote work and virtualized environments become the norm, ensuring a consistent and user-friendly display experience across different devices and network conditions is critical. Issues such as this underscore the importance of:
  • User Profile Management: Regularly cleaning and standardizing user profiles to prevent unwanted customizations that can affect system behavior.
  • Consistent Patch Management: Testing operating system updates in a controlled environment to ensure that changes in DPI or remote connectivity settings do not disrupt production environments.
  • Vendor Collaboration: Leveraging vendor support channels and community forums to quickly disseminate information about known issues and potential fixes.

Practical Workaround: A Step-by-Step Guide​

Here’s a quick guide that might help administrators temporarily mitigate the issue while a permanent fix is being explored:
  • Backup Registry Settings:
  • Before making any changes, export the current settings from HKCU\Control Panel\Desktop\WindowMetrics.
  • Modify the AppliedDPI Value:
  • Set the AppliedDPI registry value manually to 96. This can often be done through a login script if the issue seems to recur with particular user profiles.
  • Implement a Group Policy:
  • If feasible, create a policy that prevents changes to display scaling settings. This may involve locking down parts of the registry or using system configuration policies.
  • Test on a Controlled User Account:
  • Create a new user account and enforce the correct DPI setting. Monitor the behavior over a few days to see if the issue reappears.
  • Revisit RDP and Horizon Settings:
  • Check the remote desktop connection settings. Ensure that the "Use all my monitors" and "Optimize for best appearance" options are correctly configured for high-DPI displays.
  • Document and Report:
  • Keep a log of changes and behaviors. Reporting this systematic diagnostic process to vendors can help expedite a permanent resolution.

Conclusion​

The DPI scaling puzzle in Windows Server 2022 via RDP and VMware Horizon illustrates the potential complexities encountered in modern remote desktop environments. With the scaling discrepancy clearly tied to an abnormal registry setting (AppliedDPI shifting from 96 to 120), it’s likely that either localized user configuration changes or overarching system updates are at play.
While temporary measures like restoring the server or enforcing IT-only access have shown temporary relief, longer-term resolutions will likely require a concerted effort between system administrators, Microsoft support, and VMware/Omnissa. Continued vigilance on updates and community collaboration remain key.
For Windows professionals facing similar issues, consider a methodical approach: monitor registry settings, evaluate user profile behavior, and fine-tune both RDP and Horizon configurations. And remember—the devil is often in the details, especially when dealing with remote display scaling. By staying informed and methodical, you can keep your Windows Server environments running smoothly even in the face of tricky scaling bugs.
Happy troubleshooting, and may your DPI always be in the right place!

Source: Spiceworks Windows Server 2022 – DPI / Scaling broken via RDP & VMware Horizon
 

Last edited:
Windows Server 2022 users managing Remote Desktop Services (RDS) environments have recently encountered a perplexing and disruptive issue involving DPI scaling when connecting via Remote Desktop Protocol (RDP) or VMware Horizon (recently rebranded as Omnissa). In certain scenarios, screens on Windows Server 2022 display incorrectly scaled user interface elements — either appearing excessively large or distinctly too small — severely impacting usability and productivity in virtual desktops and remote sessions.
This article delves into the specifics of the problem, the environmental context, investigative findings, and practical troubleshooting insights, alongside an exploration of broader implications for Windows RDS and remote display technologies in modern IT settings.

A man intently monitors cybersecurity data on a computer in a high-tech server room.
The Environment and Symptoms​

The issue emerged in environments running VMware Horizon 8 (now Omnissa) alongside Windows Server 2022 Datacenter edition with all the latest updates installed. Administrators noted that display scaling began malfunctioning unexpectedly a few weeks after deployment, with connections over both VMware Horizon and regular RDP affected. Depending on the client resolution, the entire remote desktop session would depict elements either way too large or too small, suggestive of Windows applying an incorrect DPI (Dots Per Inch) setting.
Key symptoms observed included:
  • Incorrect scaling independent of connection method (Horizon or RDP).
  • Overly large or small UI elements depending on resolution.
  • Windows apparently ignoring the DPI scaling requested by the client device.
  • The lock screen on the ESXi console showing incorrect scaling.
  • Scaling incorrectness persisting despite reinstalling VMware Horizon Agent.
  • Temporary resolution upon server restoration from backup, with scaling correct initially but deteriorating after days.
  • Scaling stability when access limited exclusively to IT users, hinting that particular user behavior triggers the DPI override.
A registry comparison under HKCU\Control Panel\Desktop\WindowMetrics exposed a crucial clue: the problematic user profiles showed AppliedDPI set to 0x00000078 (120), implying 125% scaling, whereas correctly functioning profiles had AppliedDPI at 0x00000060 (96), which is 100% scaling. Attempts to delete local user profiles or reconfigure the Horizon Agent had no discernible impact. UI scaling settings in Windows did not report abnormalities, complicating diagnosis.

Investigative Insights​

This issue appears rooted in the Windows Registry setting for DPI rather than a Horizon client-side misconfiguration, as client logs confirmed the correct DPI request was sent but ignored. Windows Server 2022 seems to override the expected DPI value, defaulting instead to an unwanted 125% scaling (120 DPI) at the user profile level.
Two prominent factors contribute to this problem:
  • User-Specific Registry Changes Affecting DPI
    The fact that limiting access to IT personnel prevents the issue strongly suggests that a specific user account or an inadvertent user action is modifying the AppliedDPI registry value. It might be due to profile corruption, a rogue script, or user settings saved unintentionally. These user-specific overrides gradually revert the registry setting from the working default (100%, 96 DPI) to 125% (120 DPI) scaling.
  • Windows Server 2022 DPI Handling in Remote Sessions
    DPI scaling under RDP and VMware Horizon often behaves differently than local console sessions. Windows manages DPI through multiple layers—system settings, per-user registry keys, and remote session protocols. Recent updates or subtle bugs in Windows Server 2022 may cause the server to ignore the remotely requested DPI, applying its local default instead. Reinstalling the Horizon Agent did not fix the issue, which points to Windows internal DPI processing rather than the agent software itself being at fault.
Additionally, peculiarities arise because display scaling changes at the locked ESXi console also manifest, which normally shouldn’t be affected by user DPI settings. Once a user logs in interactively, the display scaling normalizes, reinforcing the notion that user session context governs these discrepancies.

Diagnostic and Troubleshooting Recommendations​

Given the complex interplay of remote desktop protocols, Windows DPI registry settings, and user profiles, a methodical approach is key:

Registry and User Profile Inspection​

  • Regularly inspect or export the registry key HKCU\Control Panel\Desktop\WindowMetrics\AppliedDPI across all user profiles.
  • Implement a logon script to enforce the AppliedDPI value at 96, effectively locking the scaling to 100% on login.
  • Monitor user-specific registry changes to identify when and by whom the DPI value switches.
  • Clear obsolete local profiles or recreate problematic user accounts to rule out profile corruption.

RDP and Horizon Settings Adjustments​

  • Examine RDP connection properties, especially options related to DPI scaling. For example, the RDP setting "Override high DPI scaling behavior" can affect client scaling enforcement.
  • Verify that Horizon client and agent versions are fully updated, since vendors continue to patch DPI-related bugs.
  • Consider disabling DPI scaling override policies at the session level through Group Policy or local security policy settings.
  • Experiment with Horizon’s DPI scaling compatibility settings, if available, to improve fidelity.

Group Policy and Session Policies​

  • Deploy Group Policy Objects that prevent users from modifying display scaling settings.
  • Lock down the relevant registry keys using security permissions or system configurations to prevent unauthorized changes.
  • Test these policies with controlled user accounts before wide implementation.

Vendor Collaboration and Community Input​

  • Engage VMware/Omnissa and Microsoft support to report logs and detailed findings. Since both the RDP client and Horizon agent report correct DPI requests, the issue is likely on Windows Server’s internal DPI handling.
  • Leverage community feedback from forums such as Spiceworks, where other IT professionals may have developed workarounds or identified patch-related causes.
  • Monitor Microsoft Windows Release Health Dashboards and VMware support bulletins for related patch announcements or documented bugs.

Log and Analyze System Events​

  • Increase logging for remote desktop sessions to capture DPI-related settings adjustment events.
  • Scrutinize Windows Event Viewer for display or user profile registry modification logs during affected session times.
  • Identify patterns related to specific users, login times, or session types triggering the DPI reversion.

Broader Implications and Context​

DPI scaling fidelity remains a long-standing challenge in Windows remote desktop services. As organizations rely increasingly on virtual desktop infrastructure (VDI), blended environments involving VMware Horizon and native Windows RDP sessions face pressure for consistent UI scaling.
Windows desktop application developers have struggled historically with DPI-awareness, requiring API features such as EnableNonClientDpiScaling and mixed-mode DPI awareness contexts to handle per-monitor scaling gracefully. Server-side scaling anomalies add layers of complexity. Windows Server 2022, with its updated Remote Desktop infrastructure, appears susceptible to certain DPI override regressive behaviors—possibly introduced in recent feature or security updates.
Ensuring consistent DPI scaling across multi-user remote sessions also highlights the importance of robust user profile management. Profiles inadvertently saving inappropriate DPI settings affect all subsequent logins, and such details can silently propagate through system restorations or backups.
The ongoing resolution of such issues requires coordination between system administrators, application developers, and platform vendors. It also stresses the need for thorough update testing in controlled environments before deploying patches or features to live critical server infrastructures.

Temporary Workarounds​

While a permanent fix from Microsoft or VMware may be pending, administrators can employ these immediate measures:
  • Restore affected servers from clean backups and restrict access until the root cause user or action is isolated.
  • Enforce the AppliedDPI registry key’s value explicitly at user login through scripting.
  • Lock down the display scaling options via Group Policies to prevent user-level overrides.
  • Use controlled test user accounts to monitor behavior and identify triggers.
  • Regularly audit and document DPI registry settings and Horizon/RDP logs to catch reversion patterns early.

Conclusion​

The Windows Server 2022 DPI scaling anomaly via RDP and VMware Horizon embodies the nuanced challenges IT professionals face managing modern remote desktop environments. A seemingly small registry key — AppliedDPI — holds disproportionate sway over user experience quality in RDS sessions. Its unanticipated alteration, possibly tied to user profiles or subtle Windows DPI processing bugs, wreaks havoc in robust server-hosted virtualization setups.
Administrators encountering this issue should adopt a systematic approach: analyze registry states, restrict user capability around DPI settings, scrutinize remote session configurations, and collaborate proactively with vendor support. The problem’s persistence despite conventional remedies like Horizon Agent reinstallations signals a deeper Windows DPI scaling intricacy that may necessitate future patches or architectural refinements.
For professionals entrusted with the reliability of enterprise Windows Server environments, understanding and managing DPI scaling intricacies is crucial. Balancing between user convenience, security, and technological constraints in remote desktop scenarios demands vigilance, tested workflows, and adaptive policies. And with the rapid evolution of remote work infrastructure, these scaling nuances will remain a field to watch closely.
By staying informed, methodical, and engaged with vendor and community developments, IT teams can navigate these DPI scaling “gotchas” effectively, preserving seamless user experiences in the ever-complex RDS landscape.

This analysis draws upon detailed community reports and expert insights documented in the Spiceworks forum thread titled "Windows Server 2022 DPI scaling broken via RDP & VMware Horizon" and supplemented with technical evaluation from Windows DPI handling documentation and related community troubleshooting guides .

Source: Windows Server 2022 – DPI / Scaling broken via RDP & VMware Horizon
 

Windows Server 2022 users running Remote Desktop Services (RDS) in virtualized environments such as VMware Horizon are encountering a perplexing issue related to DPI (dots per inch) display scaling. This widespread problem causes user interfaces to appear improperly sized—either excessively large or too small—when connecting remotely via RDP clients or VMware Horizon sessions. Consequently, this disrupts user experience significantly, as visual elements are either unusably magnified or diminished, complicating routine administrative and end-user tasks.

A Windows Server screen on a monitor surrounded by floating digital icons and a magnifying glass.
Nature of the DPI Scaling Issue in Windows Server 2022 RDS​

The issue manifests as inconsistent and incorrect DPI scaling behavior across sessions. Users connecting with either VMware Horizon (now rebranded as Omnissa) or standard Remote Desktop Protocol (RDP) clients find that display scaling no longer aligns with expectations based on their client devices’ native resolution and DPI settings. Instead of scaling being client-driven or adaptive, Windows Server 2022 appears to override the requested DPI settings and applies an incorrect scaling value.
In real-world scenarios, users have reported that after logging in, the session’s UI elements look either “way too large” or “way too small,” negatively impacting usability and productivity. This erratic scaling is not constant but tends to appear after a few days of operation, disappearing temporarily only when the server is restored from backup, suggesting some transient or user-triggered configuration changes affecting the DPI settings.

Investigation and Key Observations​

The critical clue lies within the Windows registry, specifically under the key:
HKCU\Control Panel\Desktop\WindowMetrics
On affected systems, the registry value AppliedDPI is often found set to 0x00000078 (decimal 120), equating to 125% scaling, whereas a properly functioning system uses the standard DPI value of 0x00000060 (decimal 96) for 100% scaling.
Efforts to isolate and resolve the problem have shown that:
  • Restoring the system from backup resets the DPI scaling to the correct AppliedDPI = 96 setting temporarily.
  • Restricting access to only IT department users prevents the issue from reoccurring, pointing to a user or group of users potentially triggering a scaling override.
  • VMware Horizon logs indicate the client correctly requests the appropriate scaling factor, but the Windows server disregards this and applies its own DPI setting.
  • Deleting all local user profiles does not solve the problem.
  • Reinstalling the VMware Horizon Agent also yields no change.
  • Even on the direct ESXi console (outside of any remote display session), the login lock screen appears overly scaled, but once logged in locally, the scaling is correct.
  • Adjusting VM configuration such as vRAM does not impact this issue.
  • Windows display settings themselves do not reveal unusual or altered scaling configurations.
This points to a complex interplay between user-specific settings, Windows DPI management in RDS environments, and possibly specific user actions or software interactions that alter the registry DPI values.

Understanding DPI and Registry Impact on Remote Sessions​

Windows manages DPI scaling information both globally and per-user, wherein the DPI value impacts the size of UI elements. In RDS and virtualization contexts, this is even more critical because sessions must adapt dynamically to the client's display scale factors to provide an optimal experience.
The DPI setting under HKCU\Control Panel\Desktop\WindowMetrics reflects the user’s applied DPI overrides. A systemic override at this level overrides client scaling preferences during remote sessions.
Several hypotheses arise from the data:
  • User-Initiated Changes: Since limiting users avoids recurrence, it suggests that certain users unintentionally modify DPI settings during their sessions, affecting the registry values persistently.
  • Windows or Application Bugs: Given Windows Server 2022’s continuous updates, a recent security patch or update could have introduced a regression impacting DPI scaling behavior in RDP and VMware Horizon sessions.
  • Agent and Client Mismatch: The fact that reinstallation of the Horizon Agent does not fix the issue and yet client logs reflect correct scaling requests indicates the DPI enforcement may be happening on the Windows side, not the virtualization agent.

Troubleshooting and Mitigation Strategies​

Affected IT shops can follow a sequence of investigative and remedial actions:
  • Registry Baseline Enforcement: Because restoring backups resets DPI values, administrators can export the correct registry settings and deploy login scripts or Group Policies to enforce AppliedDPI = 96 at user login, overriding any problematic changes.
  • User Profile Audits: Identify and monitor users with recurring DPI setting changes by comparing their registry hives before and after login sessions.
  • Group Policy Lockdown: Use Group Policies to restrict the ability of standard users to modify display scaling settings, potentially locking down visual registry keys to prevent corruption or unwanted changes.
  • RDP Client and Horizon Settings Review: Adjust connection parameters such as “Override high DPI scaling behavior” in remote desktop clients. Though client requests appear correct, experimenting with these settings can sometimes force Windows to adhere to the client’s DPI preferences.
  • Maintain Horizon Agent Updates: Keep Horizon agents up to date and coordinate with VMware/Omnissa support. Though immediate reinstallation didn’t help, future patches may address DPI handling nuances.
  • Enhanced Logging and Auditing: Enable verbose logs and Windows Event Log auditing around display settings changes to detect triggers, accompanied by monitoring system and user event correlations.
  • Testing Isolated User Accounts: Create controlled test accounts with enforced DPI settings to evaluate whether the problem persists under controlled conditions.

Broader Context: DPI Scaling Challenges in Remote Desktop Environments​

This issue is not isolated to this environment or Windows Server 2022. DPI scaling in RDS and virtualization often presents challenges, especially with mixed DPI settings across multiple client devices. Windows’ internal DPI awareness—introduced to accommodate modern high-resolution screens—can conflict with legacy apps or session management.
The DPI discrepancy can sometimes lead to distorted UI components, misaligned fonts, and windows of odd size, complicating usability.
Developers and administrators alike know that DPI settings are managed across a mix of capabilities:
  • User-level DPI awareness manifests through registry keys.
  • Application-level awareness (high DPI support flags, manifest files).
  • System-level overrides applied transiently.
  • Remote Desktop scaling negotiation protocols that exchange DPI scaling factors.
Windows Server’s handling of DPI scaling in virtualized RDS sessions occasionally diverges from local sessions, creating unpredictable behavior if registry values or policy enforcement diverge.

Implications and Operational Impact​

Such DPI scaling failures have measurable consequences:
  • Productivity Loss: Overly large or small UI elements frustrate users, making it difficult to use business-critical applications.
  • Support Burden: IT teams must spend time diagnosing elusive display issues, often involving complicated workarounds.
  • Security Risks: User workarounds or policy relaxations to fix DPI issues might weaken security postures if unrestricted permissions are granted to end users.
  • Vendor Dependencies: Reliance on virtualization vendors (like VMware Horizon/Omnissa) to patch or support DPI scaling behavior increases complexity.

Forward-Looking Perspectives​

Ongoing collaboration between Microsoft, VMware/Omnissa, and IT communities is essential to root cause and resolve DPI scaling inconsistencies. IT professionals are encouraged to:
  • Participate actively in vendor support channels to escalate the issue.
  • Share diagnostic data and environment details to accelerate awareness.
  • Stay current on Windows Server 2022 cumulative updates, as future patches might fix underlying DPI scaling regressions.
  • Monitor Windows and VMware forums for emerging best practices or official fixes.
  • Consider leveraging newer features in Windows Server for per-monitor DPI awareness or alternate remote display protocols.

Conclusion​

The DPI scaling issues experienced in Windows Server 2022 Remote Desktop environments via VMware Horizon and RDP illustrate the complexities involved in delivering a seamless remote UI experience. The underlying problem links strongly to unexpected changes in user registry DPI settings (AppliedDPI) that override client scaling requests, causing inconsistent display sizes in sessions. While temporary restores and access restrictions offer short-term relief, administrators must develop systematic approaches involving registry monitoring, Group Policy enforcement, and collaboration with vendors for lasting remediation.
Given the critical role of remote desktop protocols in modern IT operations, resolving such display issues is paramount to maintaining productivity and user satisfaction in virtualized Windows server environments. Until vendors release permanent fixes, diligent monitoring, configuration lockdowns, and user education remain the best means to manage this vexing DPI scaling challenge.

This analysis synthesizes user-reported evidence from Spiceworks community discussions and registry findings, augmented by common expert recommendations for RDS DPI issues in Windows Server 2022 and VMware Horizon environments.

Source: Windows Server 2022 – DPI / Scaling broken via RDP & VMware Horizon
 

Windows Server 2022 has emerged as a robust platform for enterprise Remote Desktop Services (RDS) and virtual desktop infrastructure (VDI), especially when integrated with VMware Horizon (recently rebranded as Omnissa). However, a perplexing and disruptive issue has surfaced in some deployments related to DPI (dots per inch) scaling when using remote desktop connections. This technical quirk manifests as abnormal display scaling, where the graphical interface appears either excessively large or minuscule, undermining user experience and workflow on remote sessions.

A dark server room with multiple floating digital screens displaying code and data.
The DPI Scaling Challenge in Windows Server 2022 RDS Environments​

The core symptom reported in affected environments is inconsistent and incorrect DPI scaling during remote connections—via both VMware Horizon and native Microsoft RDP clients. In practice, users notice that interface elements, icons, and text render at inappropriate sizes. Sometimes, the screen looks zoomed in excessively (e.g., scaled to 125%), while at other times, the scaling is too small (e.g., 100%). This fluctuation is not random but highly dependent on the resolution and DPI requested by the client device.
Central to the problem is Windows Server 2022's handling of DPI scaling parameters in remote sessions. Investigations have pinpointed an unusual override of the DPI scaling registry key:
HKCU\Control Panel\Desktop\WindowMetrics\AppliedDPI
In unaffected settings, this registry value is set to 0x00000060 (decimal 96), representing 100% scaling. However, problematic servers show a value of 0x00000078 (decimal 120), indicating 125% scaling. This value appears to be forcefully applied despite client requests to use different DPI settings, causing the display elements to render incorrectly.

Environment and Troubleshooting Steps​

The affected environments typically feature the latest versions of VMware Horizon (Omnissa) with Windows Server 2022 Datacenter hosts fully patched. The issue notably appears regardless of whether users connect via Horizon or traditional RDP, suggesting the root cause lies primarily in Windows rather than the connection brokers.
Administrators have attempted various remedial measures, including:
  • Restoring servers from a known good backup, which temporarily resolves the scaling but with the issue recurring after some time.
  • Limiting user access: When access is restricted exclusively to IT staff, the problem does not reappear, implying that particular user profiles or actions may trigger registry DPI overrides.
  • Deleting local user profiles: This fails to correct the problem, indicating that DPI settings might be altered somewhere beyond immediate profile data.
  • Reinstalling the VMware Horizon Agent: Removes the agent as a cause, reinforcing suspicion on Windows OS DPI processing.
  • Modifying VM resources (e.g., vRAM): Shows no impact on DPI behavior.
An intriguing observation is that even the ESXi console lock screen displays excessive scaling, implying the glitch manifests at a system level, not just within user sessions.

Understanding the DPI Mechanism and Remote Desktop Impact​

Windows handles DPI scaling through a combination of client-side requests and server-side registry and session settings. In ideal conditions, the DPI scale factor requested by the client device (based on resolution and physical display size) should be honored by the server. However, with Windows Server 2022, there appears to be an override mechanism that enforces a fixed DPI scaling (125% in many scenarios), regardless of the client’s actual DPI request.
The challenge is compounded in RDS/VDI environments because the user interface must adapt seamlessly to diverse client devices connecting with various screen resolutions and DPI capabilities. Legacy DPI awareness models in Windows were insufficient for handling multiple clients with differing display characteristics.
With the introduction of per-monitor DPI awareness in Windows 8.1 and further refinements in Windows 10 and 11, Microsoft aimed to empower applications and system frameworks to dynamically adjust scaling per display. However, in server-based remote desktop contexts, some applications and the system default scaling settings do not fully support this flexibility, resulting in abrupt and incorrect DPI overrides.

Diagnosis: Is a User Setting or Windows Feature Responsible?​

Data and diagnostic efforts suggest the overriding AppliedDPI value could be influenced by:
  • A specific user’s profile or session settings that inadvertently or unknowingly changes DPI scaling preferences.
  • Background processes or group policies that enforce a default DPI setting on login.
  • An elusive bug or regression in Windows Server 2022 DPI scaling implementation that misprocesses client DPI requests during session initialization.
Close scrutiny of registry keys across user profiles before and after connections point to persistent changes introduced by some session or user activity. Because restoring from backup temporarily resolves the problem—only for it to reoccur after non-IT users access the system—the issue hints at users altering DPI settings, perhaps unintentionally via display settings adjustments or remote control software.

Potential Solutions and Workarounds​

While a definitive patch or hotfix from Microsoft and VMware remains awaited, practical strategies for administrators include:

Registry Enforcement Scripts​

Creating logon scripts or scheduled tasks to check and reset the registry key AppliedDPI to 96 (100% scaling) can help restore a consistent scaling environment. This is a reactive solution but might standardize the user experience.

Group Policy Lockdowns​

Employing Group Policy Objects (GPOs) to restrict scaling changes at the user or computer level may prevent unauthorized or accidental DPI configuration alterations. Policies can be applied to disable user access to display scaling controls or lock registry settings corresponding to DPI.

RDP and Horizon Client Configuration​

Investigate and adjust the advanced settings in RDP clients and VMware Horizon configurations to:
  • Enable or disable DPI syncing features.
  • Override client DPI settings to enforce server-side scaling preferences.
  • Ensure options like "Use all my monitors" and high-DPI optimization are appropriately set.
Administrators should test various combinations to discover which enforce the desired behavior without introducing additional display problems.

User Profile Hygiene​

Audit user profiles for display settings variations. If a particular user is found to trigger the problem, either retrain the user on correct settings or migrate affected users to a sanitized profile template.

Driver and Agent Updates​

Although reinstalling VMware Horizon Agent alone has shown no benefit, maintaining updated versions is advisable as vendors periodically address DPI compatibility issues and related bugs.

Broader Implications and Industry Insight​

This DPI scaling conundrum underscores key challenges faced in the modern remote desktop era. Remote work and virtualized desktops must cater to users joining from an ever-expanding variety of devices: laptops, tablets, smartphones, and multiple monitors of differing resolutions and DPI densities. The seamlessness of display scaling directly impacts productivity and user satisfaction.
Microsoft’s evolution from system-wide DPI settings to per-monitor DPI and mixed-mode awareness reflects a significant technical progression. However, server environments remain a complex use case, frequently relying on legacy components and processes that complicate full DPI compliance. Moreover, the interplay between client requests, group policies, remote desktop agents, and Windows internals adds layers of complexity.

Summary and Outlook​

Administrators operating Windows Server 2022 in conjunction with VMware Horizon are advised to monitor DPI scaling closely, especially following user logins and system updates. While registry overrides currently serve as both a symptom and a partial culprit, the root cause may lie in user behavior, system design, or a subtle bug in DPI handling during remote sessions.
Engagement with Microsoft and VMware support channels is essential to stay apprised of forthcoming fixes or configuration guidance. Meanwhile, practical mitigation via registry enforcement, GPOs, user training, and connection setting adjustments can maintain a usable remote desktop environment.
The message is clear: managing DPI scaling in virtualized RDS and VDI situations on modern Windows Server platforms is challenging but solvable with awareness, vigilance, and methodical troubleshooting.
By carefully balancing user needs, system controls, and vendor innovations, IT professionals can navigate the evolving landscape of remote desktop DPI scaling—ensuring crisp, clear, and correctly scaled displays in Windows Server 2022 RDS setups with VMware Horizon.

This detailed examination amalgamates community reports, registry investigations, troubleshooting steps, and technical background to equip IT administrators with a comprehensive understanding of Windows Server 2022 DPI scaling issues over RDP and VMware Horizon connections.

Source: Windows Server 2022 – DPI / Scaling broken via RDP & VMware Horizon
 

Back
Top