TechNet
Table of contents
TOC
Collapse the table of content
Expand the table of content

Security and Protection for MED-V

jamiejdt|Last Updated: 6/16/2016
|
1 Contributor

The following section contains best practices that we recommend for running Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 in a secure configuration.

In This Section

Security Best Practices for MED-V Operations
Describes best practices to follow to help maintain security when preparing, building, testing, deploying, and managing MED-V workspaces.

Authentication of MED-V End Users
Describes best practices to follow to help maintain security when verifying the identity of MED-V end users.

Microsoft Enterprise Desktop Virtualization 2.0

© 2016 Microsoft