Security and Protection for MED-V
Updated: March 10, 2011
Applies To: Microsoft Enterprise Desktop Virtualization 2.0
The following section contains best practices that we recommend for running Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 in a secure configuration.
In This Section
- Security Best Practices for MED-V Operations
- Describes best practices to follow to help maintain security when preparing, building, testing, deploying, and managing MED-V workspaces.
- Authentication of MED-V End Users
- Describes best practices to follow to help maintain security when verifying the identity of MED-V end users.
Other ResourcesMicrosoft Enterprise Desktop Virtualization 2.0
You can learn more about MDOP in the TechNet Library, search for troubleshooting on the TechNet Wiki, or follow us on Facebook or Twitter.