Skip to content

Commit a617afa

Browse files
Merge pull request #2273 from YongRhee-MSFT/docs-editor/configure-endpoints-vdi-1735251816
Update configure-endpoints-vdi.md
2 parents ce522e9 + 8692f16 commit a617afa

File tree

1 file changed

+53
-118
lines changed

1 file changed

+53
-118
lines changed

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 53 additions & 118 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Onboard non-persistent virtual desktop infrastructure (VDI) devices
3-
description: Deploy the configuration package on virtual desktop infrastructure (VDI) device so that they are onboarded to Microsoft Defender for Endpoint service.
3+
description: Deploy the configuration package on virtual desktop infrastructure (VDI) device so that they're onboarded to Microsoft Defender for Endpoint service.
44
search.appverid: met150
55
ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
8-
ms.reviewer: pahuijbr
8+
ms.reviewer: pahuijbr; yonghree
99
ms.localizationpriority: medium
1010
manager: deniseb
1111
audience: ITPro
@@ -14,19 +14,12 @@ ms.collection:
1414
- tier2
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
17-
ms.date: 09/21/2023
17+
ms.date: 12/30/2024
1818
ms.subservice: onboard
1919
---
2020

2121
# Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR
2222

23-
Virtual desktop infrastructure (VDI) is an IT infrastructure concept that lets end users access enterprise virtual desktops instances from almost any device (such as your personal computer, smartphone, or tablet), eliminating the need for organization to provide users with physical machines. Using VDI devices reduce cost as IT departments are no longer responsible for managing, repairing, and replacing physical endpoints. Authorized users can access the same company servers, files, apps, and services from any approved device through a secure desktop client or browser.
24-
25-
Like any other system in an IT environment, these too should have an Endpoint Detection and Response (EDR) and Antivirus solution to protect against advanced threats and attacks.
26-
27-
28-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
29-
3023
**Applies to:**
3124

3225
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
@@ -38,26 +31,26 @@ Like any other system in an IT environment, these too should have an Endpoint De
3831

3932
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configvdi-abovefoldlink)
4033
41-
> [!NOTE]
42-
> **Persistent VDI's** - Onboarding a persistent VDI machine into Microsoft Defender for Endpoint is handled the same way you would onboard a physical machine, such as a desktop or laptop. Group policy, Microsoft Configuration Manager, and other methods can be used to onboard a persistent machine. In the Microsoft Defender portal, (https://security.microsoft.com) under onboarding, select your preferred onboarding method, and follow the instructions for that type. For more information see [Onboarding Windows client](onboard-windows-client.md).
34+
Virtual desktop infrastructure (VDI) is an IT infrastructure concept that lets end users access enterprise virtual desktops instances from almost any device (such as your personal computer, smartphone, or tablet), eliminating the need for organization to provide users with physical machines. Using VDI devices reduces costs, as IT departments are no longer responsible for managing, repairing, and replacing physical endpoints. Authorized users can access the same company servers, files, apps, and services from any approved device through a secure desktop client or browser.
35+
36+
Like any other system in an IT environment, VDI devices should have an endpoint detection and response (EDR) and antivirus solution to protect against advanced threats and attacks.
37+
38+
> [!NOTE]
39+
> **Persistent VDI's** - Onboarding a persistent VDI machine into Microsoft Defender for Endpoint is handled the same way you would onboard a physical machine, such as a desktop or laptop. Group policy, Microsoft Configuration Manager, and other methods can be used to onboard a persistent machine. In the Microsoft Defender portal, (https://security.microsoft.com) under onboarding, select your preferred onboarding method, and follow the instructions for that type. For more information, see [Onboarding Windows client](onboard-windows-client.md).
4340
4441
## Onboarding non-persistent virtual desktop infrastructure (VDI) devices
4542

46-
Defender for Endpoint supports non-persistent VDI session onboarding.
43+
Defender for Endpoint supports non-persistent VDI session onboarding. There might be associated challenges when onboarding VDI instances. The following are typical challenges for this scenario:
4744

48-
There might be associated challenges when onboarding VDI instances. The following are typical challenges for this scenario:
45+
- Instant early onboarding of a short-lived session, which must be onboarded to Defender for Endpoint before actual provisioning.
4946

50-
- Instant early onboarding of a short-lived session, which must be onboarded to Defender for Endpoint prior to the actual provisioning.
5147
- The device name is typically reused for new sessions.
5248

53-
In a VDI environment, VDI instances can have short lifespans. VDI devices can appear in the Microsoft Defender portal as either single entries for each VDI instance or multiple entries for each device.
54-
55-
- Single entry for each VDI instance. If the VDI instance was already onboarded to Microsoft Defender for Endpoint, and at some point deleted, and then recreated with the same host name, a new object representing this VDI instance is NOT be created in the portal.
49+
- In a VDI environment, VDI instances can have short lifespans. VDI devices can appear in the Microsoft Defender portal as either single entries for each VDI instance or multiple entries for each device.
5650

57-
> [!NOTE]
58-
> In this case, the *same* device name must be configured when the session is created, for example using an unattended answer file.
51+
- Single entry for each VDI instance. If the VDI instance was already onboarded to Microsoft Defender for Endpoint, and at some point deleted, and then recreated with the same host name, a new object representing this VDI instance is NOT be created in the portal. In this case, the *same* device name must be configured when the session is created, for example using an unattended answer file.
5952

60-
- Multiple entries for each device - one for each VDI instance.
53+
- Multiple entries for each device - one for each VDI instance.
6154

6255
> [!IMPORTANT]
6356
> If you're deploying non-persistent VDIs through cloning technology, make sure that your internal template VMs are not onboarded to Defender for Endpoint. This recommendation is to avoid cloned VMs from being onboarded with the same senseGuid as your template VMs, which could prevent VMs from showing up as new entries in the Devices list.
@@ -72,24 +65,24 @@ The following steps guide you through onboarding VDI devices and highlight steps
7265
> [!NOTE]
7366
> Windows Server 2016 and Windows Server 2012 R2 must be prepared by applying the installation package first using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2) for this feature to work.
7467
75-
1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>:
68+
1. Open the VDI configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139).
7669

7770
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
7871

7972
2. Select the operating system.
8073

8174
3. In the **Deployment method** field, select **VDI onboarding scripts for non-persistent endpoints**.
8275

83-
4. Click **Download package** and save the .zip file.
76+
4. Select **Download package** and save the file.
8477

85-
2. Copy the files from the WindowsDefenderATPOnboardingPackage folder extracted from the .zip file into the golden/primary image under the path `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup`.
78+
2. Copy the files from the `WindowsDefenderATPOnboardingPackage` folder extracted from the zipped folder into the golden/primary image under the path `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup`.
8679

87-
1. If you are implementing multiple entries for each device - one for each session, copy WindowsDefenderATPOnboardingScript.cmd.
80+
- If you're implementing multiple entries for each device - one for each session, copy `WindowsDefenderATPOnboardingScript.cmd`.
8881

89-
2. If you're implementing a single entry for each device, copy both Onboard-NonPersistentMachine.ps1 and WindowsDefenderATPOnboardingScript.cmd.
82+
- If you're implementing a single entry for each device, copy both `Onboard-NonPersistentMachine.ps1` and `WindowsDefenderATPOnboardingScript.cmd`.
9083

91-
> [!NOTE]
92-
> If you don't see the `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup` folder, it might be hidden. You'll need to choose the **Show hidden files and folders** option from File Explorer.
84+
> [!NOTE]
85+
> If you don't see the `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup` folder, it might be hidden. You'll need to choose the **Show hidden files and folders** option from File Explorer.
9386
9487
3. Open a Local Group Policy Editor window and navigate to **Computer Configuration** \> **Windows Settings** \> **Scripts** \> **Startup**.
9588

@@ -98,30 +91,27 @@ The following steps guide you through onboarding VDI devices and highlight steps
9891
9992
4. Depending on the method you'd like to implement, follow the appropriate steps:
10093

101-
- For single entry for each device:
102-
103-
Select the **PowerShell Scripts** tab, then select **Add** (Windows Explorer opens directly in the path where you copied the onboarding script earlier). Navigate to onboarding PowerShell script `Onboard-NonPersistentMachine.ps1`. There's no need to specify the other file, as it is triggered automatically.
104-
105-
- For multiple entries for each device:
106-
107-
Select the **Scripts** tab, then click **Add** (Windows Explorer opens directly in the path where you copied the onboarding script earlier). Navigate to the onboarding bash script `WindowsDefenderATPOnboardingScript.cmd`.
94+
| Method | Steps |
95+
|---|---|
96+
| Single entry for each device | 1. Select the **PowerShell Scripts** tab, then select **Add** (Windows Explorer opens directly in the path where you copied the onboarding script earlier). <br/>2. Navigate to onboarding PowerShell script `Onboard-NonPersistentMachine.ps1`. There's no need to specify the other file, as it's triggered automatically. |
97+
| Multiple entries for each device | 1. Select the **Scripts** tab, then select **Add** (Windows Explorer opens directly in the path where you copied the onboarding script earlier). <br/>2. Navigate to the onboarding bash script `WindowsDefenderATPOnboardingScript.cmd`. |
10898

109-
5. Test your solution:
99+
5. Test your solution by following these steps:
110100

111101
1. Create a pool with one device.
112102

113-
2. Log on to device.
103+
2. Sign into device.
114104

115-
3. Log off from device.
105+
3. Sign out on the device.
116106

117-
4. Log on to device with another user.
107+
4. Sign into the device using another account.
118108

119109
5. Depending on the method you'd like to implement, follow the appropriate steps:
120110

121-
- For single entry for each device: Check only one entry in Microsoft Defender portal.
122-
- For multiple entries for each device: Check multiple entries in Microsoft Defender portal.
111+
- For single entry for each device: Check for only one entry in the [Microsoft Defender portal](https://security.microsoft.com).
112+
- For multiple entries for each device: Check multiple entries in the [Microsoft Defender portal](https://security.microsoft.com).
123113

124-
6. Click **Devices list** on the Navigation pane.
114+
6. In the navigation pane, select **Devices list**.
125115

126116
7. Use the search function by entering the device name and select **Device** as search type.
127117

@@ -130,20 +120,24 @@ The following steps guide you through onboarding VDI devices and highlight steps
130120
> [!NOTE]
131121
> These instructions for other Windows server versions also apply if you are running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at [Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
132122
133-
The following registry is relevant only when the aim is to achieve a 'Single entry for each device'.
123+
The following registry is relevant only when the aim is to achieve a single entry for each device.
134124

135-
1. Set registry value to:
125+
1. Set the registry value as follows:
126+
127+
```console
136128

137-
```console
138129
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging]
139130
"VDI"="NonPersistent"
140-
```
141131

142-
or using command line:
132+
```
133+
134+
Or, you can use command line as follows:
135+
136+
```console
137+
138+
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging" /v VDI /t REG_SZ /d "NonPersistent" /f
143139

144-
```console
145-
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging" /v VDI /t REG_SZ /d "NonPersistent" /f
146-
```
140+
```
147141

148142
2. Follow the [server onboarding process](configure-server-endpoints.md).
149143

@@ -154,27 +148,32 @@ With the ability to easily deploy updates to VMs running in VDIs, we've shortene
154148
If you have onboarded the primary image of your VDI environment (SENSE service is running), then you must offboard and clear some data before putting the image back into production.
155149

156150
1. [Offboard the machine](offboard-machines.md).
151+
157152
2. Ensure the sensor is stopped by running the following command in a CMD window:
158153

159154
```console
155+
160156
sc query sense
157+
161158
```
162159

163160
3. Run the following commands in a CMD window::
164161

165162
```console
163+
166164
del "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Cyber\*.*" /f /s /q
167165
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection" /v senseGuid /f
168166
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection" /v 7DC0B629-D7F6-4DB3-9BF7-64D5AAF50F1A /f
169167
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\48A68F11-7A16-4180-B32C-7F974C7BD783" /f
170168
exit
169+
171170
```
172171

173172
### Are you using a third party for VDIs?
174173

175-
If you're deploying non-persistent VDIs through VMware instant cloning or similar technologies, make sure that your internal template VMs and replica VMs are not onboarded to Defender for Endpoint. If you onboard devices using the single entry method, instant clones that are provisioned from onboarded VMs might have the same senseGuid, and that can stop a new entry from being listed in the Device Inventory view (in the [Microsoft Defender portal](https://security.microsoft.com), choose **Assets** > **Devices**).
174+
If you're deploying non-persistent VDIs through VMware instant cloning or similar technologies, make sure that your internal template VMs and replica VMs aren't onboarded to Defender for Endpoint. If you onboard devices using the single entry method, instant clones that are provisioned from onboarded VMs might have the same senseGuid, and that can stop a new entry from being listed in the Device Inventory view (in the [Microsoft Defender portal](https://security.microsoft.com), choose **Assets** > **Devices**).
176175

177-
If either the primary image, template VM, or replica VM are onboarded to Defender for Endpoint using the single entry method, it will stop Defender from creating entries for new non-persistent VDIs in the Microsoft Defender portal.
176+
If either the primary image, template VM, or replica VM are onboarded to Defender for Endpoint using the single entry method, it stops Defender for Endpoint from creating entries for new non-persistent VDIs in the Microsoft Defender portal.
178177

179178
Reach out to your third-party vendors for further assistance.
180179

@@ -184,73 +183,9 @@ After onboarding devices to the service, it's important to take advantage of the
184183

185184
### Next generation protection configuration
186185

187-
The following configuration settings are recommended:
188-
189-
#### Cloud Protection Service
190-
191-
- Turn on cloud-delivered protection: Yes
192-
- Cloud-delivered protection level: Not configured
193-
- Defender Cloud Extended Timeout In Seconds: 20
194-
195-
#### Exclusions
196-
197-
- Please review the FXLogix antivirus exclusion recommendations here: [Prerequisites for FSLogix](/fslogix/overview-prerequisites#file--folder-exclusions).
198-
199-
#### Real-time Protection
200-
201-
- Turn on all settings and set to monitor all files
202-
203-
#### Remediation
204-
205-
- Number of days to keep quarantined malware: 30
206-
- Submit samples consent: Send all samples automatically
207-
- Action to take on potentially unwanted apps: Enable
208-
- Actions for detected threats:
209-
- Low threat: Clean
210-
- Moderate threat, High threat, Severe threat: Quarantine
211-
212-
#### Scan
213-
214-
- Scan archived files: Yes
215-
- Use low CPU priority for scheduled scans: Not configured
216-
- Disable catch-up full scan: Not configured
217-
- Disable catchup quick scan: Not configured
218-
- CPU usage limit per scan: 50
219-
- Scan mapped network drives during full scan: Not configured
220-
- Run daily quick scan at: 12 PM
221-
- Scan type: Not configured
222-
- Day of week to run scheduled scan: Not configured
223-
- Time of day to run a scheduled scan: Not configured
224-
- Check for signature updates before running scan: Yes
225-
226-
#### Updates
227-
228-
- Enter how often to check for security intelligence updates: 8
229-
- Leave other settings in default state
230-
231-
#### User experience
232-
233-
- Allow user access to Microsoft Defender app: Not configured
234-
235-
#### Enable Tamper protection
236-
237-
- Enable tamper protection to prevent Microsoft Defender being disabled: Enable
238-
239-
#### Attack surface reduction
240-
241-
- Enable network protection: Test mode
242-
- Require SmartScreen for Microsoft Edge: Yes
243-
- Block malicious site access: Yes
244-
- Block unverified file download: Yes
245-
246-
#### Attack surface reduction rules
247-
248-
- Configure all available rules to Audit.
249-
250-
> [!NOTE]
251-
> Blocking these activities may interrupt legitimate business processes. The best approach is setting everything to audit, identifying which ones are safe to turn on, and then enabling those settings on endpoints which do not have false positive detections.
186+
The configuration settings in this link are recommended: [Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment](/defender-endpoint/deployment-vdi-microsoft-defender-antivirus).
252187

253-
## Related topics
188+
## Related articles
254189

255190
- [Onboard Windows devices using Group Policy](configure-endpoints-gp.md)
256191
- [Onboard Windows devices using Microsoft Configuration Manager](configure-endpoints-sccm.md)

0 commit comments

Comments
 (0)