You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/security-guide.md
+24-20Lines changed: 24 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ Requiring multi-factor authentication for all users and admins in Windows Virtua
67
67
68
68
### Enable Conditional Access
69
69
70
-
Enabling [Conditional Access](../active-directory/conditional-access/best-practices.md)helps you manage risks before you grant users access to your Windows Virtual Desktop environment. When deciding which users to allow access, we recommend you also consider who the user is, which sign-in method they're using, and which device they're using.
70
+
Enabling [Conditional Access](../active-directory/conditional-access/best-practices.md)lets you manage risks before you grant users access to your Windows Virtual Desktop environment. When deciding which users to grant access to, we recommend you also consider who the user is, how they sign in, and which device they're using.
71
71
72
72
### Collect audit logs
73
73
@@ -82,63 +82,67 @@ Enabling audit log collection lets you view user and admin activity related to W
82
82
83
83
### Use RemoteApps
84
84
85
-
When choosing a deployment model, you have the choice to provide remote users access to desktops or applications. Remote applicationsprovide a more seamless experience with other applications a user may be interacting with and reduces risk, since the user is only interacting with a subset of the remote machine that is exposed by the application.
85
+
When choosing a deployment model, you can either provide remote users access to entire virtual desktops or only select applications. Remote applications, or RemoteApps, provide a more seamless experience with other applications the user interacts with and reduces risk, since the user is only interacting with a subset of the remote machine exposed by the application.
86
86
87
87
### Monitor usage with Azure Monitor
88
88
89
-
Ensure that the Windows Virtual Desktop service is monitored using [Azure Monitor](https://azure.microsoft.com/en-us/services/monitor/) for usage and availability. Consider creating [service health alerts](../service-health/alerts-activity-log-service-notifications.md) for the Windows Virtual Desktop service to receive notification in the event of a service impacting event.
89
+
Monitor your Windows Virtual Desktop service's usage and availability with [Azure Monitor](https://azure.microsoft.com/services/monitor/). Consider creating [service health alerts](../service-health/alerts-activity-log-service-notifications.md) for the Windows Virtual Desktop service to receive notifications whenever there's a service impacting event.
90
90
91
91
## Session host security best practices
92
92
93
+
This section describes best practices for session host security.
94
+
93
95
### Enable endpoint protection
94
96
95
-
To prevent against known malicious software, we recommend enabling endpoint protection on all session hosts. You may choose to use either Windows Defender Antivirus or a third-party program. To optimize for a VDI environment, follow the recommendations outlined [here](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus). Additionally, for profile solutions like FSLogix or others that mount VHD files, we recommend excluding VHD file extensions.
97
+
To protect your deployment from known malicious software, we recommend enabling endpoint protection on all session hosts. You can use either Windows Defender Antivirus or a third-party program. Learn how to set up Windows Defender for a VDI environment, at [Deployment guide for Windows Defender Antivirus in a virtual desktop infrastructure (VDI) environment](/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus).
98
+
99
+
For profile solutions like FSLogix or other solutions that mount VHD files, we recommend excluding VHD file extensions.
96
100
97
-
### Install an endpoint detection and response (EDR) product
101
+
### Install an endpoint detection and response product
98
102
99
-
To provide advanced detection and response capabilities, we recommend that you install an EDR product. For server operating systems that have [Azure Security Center](https://docs.microsoft.com/en-us/azure/security-center/security-center-services?tabs=features-windows) enabled, this will deploy Defender ATP. For client operating systems, you can deploy [Defender ATP](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/onboarding) or a thirdparty product to those endpoints.
103
+
We recommend you install an endpoint detection and response (EDR) product to provide advanced detection and response capabilities. For server operating systems with [Azure Security Center](../security-center/security-center-services?tabs=features-windows.md) enabled, this will deploy Defender ATP. For client operating systems, you can deploy [Defender ATP](/windows/security/threat-protection/microsoft-defender-atp/onboarding) or a third-party product to those endpoints.
100
104
101
105
### Enable threat and vulnerability management assessments
102
106
103
-
Identifying software vulnerabilities that exist in operating systems and applications is critical to keeping your environment secure. Azure Security Center can fulfill this need, as it includes vulnerability assessments for server operating systems. You can also use Defender ATP, which provides threat and vulnerability management for desktop operating systems, or even leverage a third party to address this best practice.
107
+
Identifying software vulnerabilities that exist in operating systems and applications is critical to keeping your environment secure. Azure Security Center can help you identify problem spots through vulnerability assessments for server operating systems. You can also use Defender ATP, which provides threat and vulnerability management for desktop operating systems.
104
108
105
109
### Patch software vulnerabilities in your environment
106
110
107
-
Identifying a software vulnerability won’t do you any good unless you follow up by patching it, which is why we recommend vulnerability identification and patching go hand in hand. This extends to virtual environments as well which includes the running operating systems, applications deployed inside of them, and the images that new machines are created from. Follow your vendor patch notification communications and apply patches in a timely manner. We recommend patching your base images monthly to ensure that newlydeployed machines address the most recent set of security vulnerabilities.
111
+
Once you identify a vulnerability, you must patch it. This applies to virtual environments as well which includes the running operating systems, applications deployed inside of them, and the images that new machines are created from. Follow your vendor patch notification communications and apply patches in a timely manner. We recommend patching your base images monthly to ensure that newly-deployed machines are as secure as possible.
108
112
109
113
### Establish maximum inactive time and disconnection policies
110
114
111
-
Logging users off when they are inactive is a best practice. This helps preserve resources and prevent unintentional access. We recommend that timeouts balance user productivity as well as resource usage. For users that interact with stateless applications, consider more aggressive policies which lets machines to be turned off and resources to be preserved. Be aware, however, disconnecting long running applications which continue to run a user is idle, such as a simulation or CAD rendering, are disconnected, may interrupt their work and require it to be restarted.
115
+
Signing users out when they're inactive preserves resources and prevents access by unauthorized users. We recommend that timeouts balance user productivity as well as resource usage. For users that interact with stateless applications, consider more aggressive policies that turn off machines and preserve resources. Be aware that disconnecting long running applications that continue to run if a user is idle, such as a simulation or CAD rendering, can interrupt the user's work and may even require restarting the computer.
112
116
113
117
### Set up screen locks for idle sessions
114
118
115
-
Setting virtual desktop to lock a machine's screen during idle time and requiring authentication to unlock helps to prevent against unwanted system access.
119
+
You can prevent unwanted system access by configuring Windows Virtual Desktop to lock a machine's screen during idle time and requiring authentication to unlock it.
116
120
117
121
### Establish tiered admin access
118
122
119
-
As a best practice, we recommend users not be granted admin access to virtual desktops. If software packages are needed, we recommend they be made available through configuration management utilities like Microsoft Endpoint Manager. In a multisession environment it is strongly recommended that users are not allowed to install software directly.
123
+
We recommend you don't grant your users admin access to virtual desktops. If you need software packages, we recommend you make them available available through configuration management utilities like Microsoft Endpoint Manager. In a multi-session environment, we recommend you don't let users install software directly.
120
124
121
-
### Consider what resources should be accessible to which users
125
+
### Consider which users should access which resources
122
126
123
-
Consider session hosts as an extension of your existing desktop deployment. We recommend ensuring that you are controlling access to network resources in the same way that you do for other desktops in your environment, including using network segmentation and filtering. By default, Session Hosts will have the ability to connect to any resource on the internet. There are several ways to limit traffic including using Azure Firewall, Network Virtual Appliances or Proxies. If limiting traffic is needed, ensure that the proper rules are added to allow Windows Virtual Desktop to operate properly.
127
+
Consider session hosts as an extension of your existing desktop deployment. We recommend you control access to network resources the same way you would for other desktops in your environment, such as using network segmentation and filtering. By default, session hosts can connect to any resource on the internet. There are several ways you can limit traffic, including using Azure Firewall, Network Virtual Appliances, or proxies. If you need to limit traffic, make sure you add the proper rules so that Windows Virtual Desktop can work properly.
124
128
125
129
### Manage Office Pro Plus security
126
130
127
-
In addition to adopting practices to secure session hosts, it is important to consider the security of applications running inside of them. Office Pro Plus is one of the most common applications that is deployed. To improve the security for Office deployments, Microsoft recommends using the [Security Policy Advisor](/DeployOffice/overview-of-security-policy-advisor) for Microsoft 365 Apps for Enterprise. This tool will help to identify policies that can be applied to improve security and provide recommendations to help assess the impact on both security and productivity.
131
+
In addition to securing your session hosts, it's important to also secure the applications running inside of them. Office Pro Plus is one of the most common applications deployed in session hosts. To improve the Office deployment security, we recommend you use the [Security Policy Advisor](/DeployOffice/overview-of-security-policy-advisor) for Microsoft 365 Apps for Enterprise. This tool identifies policies that can you can apply to your deployment for more security, and also gives recommendations that assess the impact of these policies on both security and productivity.
128
132
129
133
### Other security tips for session hosts
130
134
131
-
By restricting operating system capabilities, you can strengthen the security of your session hosts. Here are a few examples of how to do this:
135
+
By restricting operating system capabilities, you can strengthen the security of your session hosts. Here are a few things you can do:
132
136
133
-
-**Control device redirection**: In a remote desktop session, drives, printers, and USB devices can be redirected to a user’s local device. We recommend that you evaluate your security requirements and check if these features ought to be disabled or not.
137
+
- Control device redirection by redirecting drives, printers, and USB devices to a user's local device in a remote desktop session. We recommend that you evaluate your security requirements and check if these features ought to be disabled or not.
134
138
135
-
-**Restrict Windows Explorer Access**: Consider hiding local and remote drive mappings. This prevents users from discovering unwanted information about system configuration and users.
139
+
- Restrict Windows Explorer access by hiding local and remote drive mappings. This prevents users from discovering unwanted information about system configuration and users.
136
140
137
-
-**Avoid direct RDP to session hosts:** Do not allow direct RDP access to session hosts in your environment. If this is needed for administration or troubleshooting, enable [just-in-time](http://go.microsoft.com/fwlink/?LinkId=2004425) access to limit the attack surface on a session host.
141
+
- Avoid direct RDP access to session hosts in your environment. If you need direct RDP access for administration or troubleshooting, enable [just-in-time](../security-center/security-center-just-in-time.md) access to limit the potential attack surface on a session host.
138
142
139
-
-**Grant users limited permissions:** Ensure that your local and remote file systems use access control lists with least privilege, so that users only have access to what they need and cannot change or delete critical resources.
143
+
- Grant users limited permissions when they access local and remote file systems. You can restrict permissions by making sure your local and remote file systems use access control lists with least privilege. This way, users can only access what they need and can't change or delete critical resources.
140
144
141
-
-**Prevent unwanted software from running on session hosts:** Enable App Locker for additional security on Session Hosts. App Locker lets hosts to be locked down so that only approved applications will be allowed to run.
145
+
- Prevent unwanted software from running on session hosts. You can enable App Locker for additional security on session hosts, ensuring that only the apps you allow can run on the host.
0 commit comments