Tag: security

Monitoring Windows Virtual Desktop environments with Azure Sentinel

In this blog, we will explore how you can use Azure Sentinel to monitor your WVD environment. This blog post covers monitoring resources using the Windows Virtual Desktop Fall 2019 release without Azure Resource Manager objects. If you are using the Windows Virtual Desktop Spring 2020 release with Azure Resource Manager objects (in Public Preview […]

Continue reading

Microsoft Defender ATP now in preview on Windows 10 Enterprise multi-session

Since customers that are licensed for #WVD very commonly as also licensed for Microsoft Defender Advanced Threat Protection (#MDATP) it is a very popular choice to protect these #WindowsVirtualDesktop worksloads. That’s why it is very exciting that Microsoft has announced MDATP support on Windows Virtual Desktop enabling both single and multi-session scenarios. The support for Multi-user session scenarios is […]

Continue reading

Use Azure Firewall to protect Windows Virtual Desktop | Microsoft Docs

Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It’s a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. You can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks. Azure Firewall uses a static public […]

Continue reading

Options for Locking down Windows 10 Multi-Session and using OneDrive Sync Client with C: drive restrictions

The amazing James Rankin ( @james____rankin ) has written a very good – and long – article that discusses options for Locking down (#WVD) Windows 10 Multi-Session and using #OneDrive Sync Client with C: drive restrictions. Some of the lockdown item he explains: 1. Local drives in File Explorer 2. The Run command 3. The […]

Continue reading

RDPwned: A Guide To Securing Microsoft Remote Desktop Services

Given the increase in us of RDP it’s imperative that you get serious about RDS security, even if most of the common attack vectors don’t exist (thankfully) when using #WVD. This book first walks you through how attackers find your RDS deployments, using normal search engines and device fingerprinting search engines like Shodan. It shows […]

Continue reading