Skip to content

Commit 18b306f

Browse files
committed
Updated based on acrolinx and fixed broken links.
1 parent 096ca66 commit 18b306f

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/virtual-desktop/security-guide.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@ Windows Virtual Desktop is a managed virtual desktop service that includes many
1616

1717
This article describes additional steps you can take as an admin to keep your customers' Windows Virtual Desktop deployments secure.
1818

19-
# Security responsibilities
19+
## Security responsibilities
2020

2121
Many cloud services share certain security responsibilities. When you use Windows Virtual Desktop, it’s important to understand that while some components come already secured for your environment, you'll need to configure other areas yourself to fit your organization’s security needs.
2222

2323
The following table shows which security needs users are responsible for. Anything that the customer isn't responsible for is handled by Microsoft.
2424

25-
| Security need | Customer responsibility in on-premises VDI | Customer responsibility in Windows Virtual Desktop |
25+
| Security need | On-premises virtual desktop infrastructure | Windows Virtual Desktop |
2626
|---------------|:-----------------:|:-------------------------:|
2727
|Identity|✔|✔|
2828
|User devices (mobile and PC)|✔|✔|
@@ -76,13 +76,13 @@ Enabling audit log collection lets you view user and admin activity related to W
7676
- [Azure Activity Log](../azure-monitor/platform/activity-log-collect.md)
7777
- [Azure Active Directory Activity Log](../active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md)
7878
- [Azure Active Directory](../active-directory/fundamentals/active-directory-whatis.md)
79-
- [Session hosts](../azure-monitor/platform/agent-windows,md)
79+
- [Session hosts](../azure-monitor/platform/agent-windows.md)
8080
- [Windows Virtual Desktop Diagnostic Log](../virtual-desktop/diagnostics-log-analytics.md)
8181
- [Key Vault logs](../key-vault/general/logging.md)
8282

8383
### Use RemoteApps
8484

85-
When choosing a deployment model, you can either provide remote users access to entire virtual desktops or only select applications. Remote applications, or RemoteApps, provide a more seamless experience with other applications the user interacts with and reduces risk, since the user is only interacting with a subset of the remote machine exposed by the application.
85+
When choosing a deployment model, you can either provide remote users access to entire virtual desktops or only select applications. Remote applications, or RemoteApps, provide a seamless experience as the user works with apps on their virtual desktop. RemoteApps reduce risk by only letting the user work with with a subset of the remote machine exposed by the application.
8686

8787
### Monitor usage with Azure Monitor
8888

@@ -94,21 +94,21 @@ This section describes best practices for session host security.
9494

9595
### Enable endpoint protection
9696

97-
To protect your deployment from known malicious software, we recommend enabling endpoint protection on all session hosts. You can use either Windows Defender Antivirus or a third-party program. Learn how to set up Windows Defender for a VDI environment, at [Deployment guide for Windows Defender Antivirus in a virtual desktop infrastructure (VDI) environment](/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus).
97+
To protect your deployment from known malicious software, we recommend enabling endpoint protection on all session hosts. You can use either Windows Defender Antivirus or a third-party program. To learn more, see [Deployment guide for Windows Defender Antivirus in a VDI environment](/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus).
9898

9999
For profile solutions like FSLogix or other solutions that mount VHD files, we recommend excluding VHD file extensions.
100100

101101
### Install an endpoint detection and response product
102102

103-
We recommend you install an endpoint detection and response (EDR) product to provide advanced detection and response capabilities. For server operating systems with [Azure Security Center](../security-center/security-center-services?tabs=features-windows.md) enabled, installing an EDR product will deploy Defender ATP. For client operating systems, you can deploy [Defender ATP](/windows/security/threat-protection/microsoft-defender-atp/onboarding) or a third-party product to those endpoints.
103+
We recommend you install an endpoint detection and response (EDR) product to provide advanced detection and response capabilities. For server operating systems with [Azure Security Center](../security-center/security-center-services.md) enabled, installing an EDR product will deploy Defender ATP. For client operating systems, you can deploy [Defender ATP](/windows/security/threat-protection/microsoft-defender-atp/onboarding) or a third-party product to those endpoints.
104104

105105
### Enable threat and vulnerability management assessments
106106

107107
Identifying software vulnerabilities that exist in operating systems and applications is critical to keeping your environment secure. Azure Security Center can help you identify problem spots through vulnerability assessments for server operating systems. You can also use Defender ATP, which provides threat and vulnerability management for desktop operating systems. You can also use third-party products if you're so inclined, although we recommend using Azure Security Center and Defender ATP.
108108

109109
### Patch software vulnerabilities in your environment
110110

111-
Once you identify a vulnerability, you must patch it. This applies to virtual environments as well, which includes the running operating systems, applications deployed inside of them, and the images you create new machines from. Follow your vendor patch notification communications and apply patches in a timely manner. We recommend patching your base images monthly to ensure that newly deployed machines are as secure as possible.
111+
Once you identify a vulnerability, you must patch it. This applies to virtual environments as well, which includes the running operating systems, the applications that are deployed inside of them, and the images you create new machines from. Follow your vendor patch notification communications and apply patches in a timely manner. We recommend patching your base images monthly to ensure that newly deployed machines are as secure as possible.
112112

113113
### Establish maximum inactive time and disconnection policies
114114

@@ -128,7 +128,7 @@ Consider session hosts as an extension of your existing desktop deployment. We r
128128

129129
### Manage Office Pro Plus security
130130

131-
In addition to securing your session hosts, it's important to also secure the applications running inside of them. Office Pro Plus is one of the most common applications deployed in session hosts. To improve the Office deployment security, we recommend you use the [Security Policy Advisor](/DeployOffice/overview-of-security-policy-advisor) for Microsoft 365 Apps for Enterprise. This tool identifies policies that can you can apply to your deployment for more security, and also gives recommendations that assess the impact of these policies on both security and productivity.
131+
In addition to securing your session hosts, it's important to also secure the applications running inside of them. Office Pro Plus is one of the most common applications deployed in session hosts. To improve the Office deployment security, we recommend you use the [Security Policy Advisor](/DeployOffice/overview-of-security-policy-advisor) for Microsoft 365 Apps for Enterprise. This tool identifies policies that can you can apply to your deployment for more security. Security Policy Advisor also recommends policies based on their impact to your security and productivity.
132132

133133
### Other security tips for session hosts
134134

0 commit comments

Comments
 (0)