Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The following section contains best practices that we recommend for running Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 in a secure configuration.
In This Section
Security Best Practices for MED-V Operations Describes best practices to follow to help maintain security when preparing, building, testing, deploying, and managing MED-V workspaces.
Authentication of MED-V End Users Describes best practices to follow to help maintain security when verifying the identity of MED-V end users.
Related topics
Microsoft Enterprise Desktop Virtualization 2.0