{"id":191,"date":"2020-10-15T11:46:46","date_gmt":"2020-10-15T11:46:46","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=191"},"modified":"2021-09-10T06:37:13","modified_gmt":"2021-09-10T06:37:13","slug":"10-best-practices-for-desktop-virtualization","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/","title":{"rendered":"10 Best Practices for Desktop Virtualization"},"content":{"rendered":"<p><b>10 Best Practices for Desktop Virtualization<\/b><\/p>\n<p><!--more--><\/p>\n<p>Windows Virtual Desktop is a managed virtual desktop service that includes many security capabilities for keeping your organization safe. Below we describe the ten best practices for desktop virtualization that admins can implement to keep its users secure.<\/p>\n<p><b>1. Keep machines updated<\/b><\/p>\n<p>Keep all machines in your environment up to date with security patches. One advantage is that you can use thin clients as terminals, which simplifies this task.<\/p>\n<p><b>2. Protect all machines in your environment with antivirus software<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Consider using platform-specific anti-malware software such as the Microsoft Enhanced Mitigation Experience Toolkit (EMET) for Windows machines. Some authorities recommend using the latest Microsoft-supported version of EMET within their regulated environments. Note that, according to Microsoft, EMET may not be compatible with some software, so it should be thoroughly tested with your applications before deployment in a production environment. XenApp and XenDesktop have been tested with EMET 5.5 in its default configuration. Currently, EMET is not recommended for use on a machine that has a Virtual Delivery Agent (VDA) installed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><b>3. Protect Machines with Firewalls<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Protect all machines in your environment with perimeter firewalls, including at enclave boundaries as appropriate.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are migrating a conventional environment to this release, you may need to reposition an existing perimeter firewall or add new perimeter firewalls. For example, suppose there is a perimeter firewall between a conventional client and database server in the data center. When this release is used, that perimeter firewall must be placed so that the virtual desktop and user device are on one side, and the database servers and Delivery Controllers in the data center are on the other side. Therefore, consider creating an enclave within your data center to contain the database servers and Controllers. Also consider having protection between the user device and the virtual desktop.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">All machines in your environment should be protected by a personal firewall. When you install core components and VDAs, you can choose to have the ports required for component and feature communication opened automatically if the Windows Firewall Service is detected (even if the firewall is not enabled). You can also choose to configure those firewall ports manually. If you use a different firewall, you must configure the firewall manually.<\/span><\/p>\n<p><b>4. Manage user privileges<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Grant users only the capabilities they require. Microsoft Windows privileges continue to be applied to desktops in the usual way: configure privileges through User Rights Assignment and group memberships through Group Policy. One advantage of this release is that it is possible to grant a user administrative rights to a desktop without also granting physical control over the computer on which the desktop is stored.<\/span><\/p>\n<p><b>5. Get your apps in order<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Don\u2019t assume you can treat all your applications the same way and virtualize them using the same model. You\u2019ll need to understand where each app writes its data, whether its compliant with terminal services or RDS, and whether your homegrown apps can run in a shared environment. Understanding your apps is a critical first step\u2014don\u2019t skip it!<\/span><\/p>\n<p><b>6. Know your users<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">One of the biggest reasons desktop virtualization initiatives fail is that they\u2019re disconnected from what the business really does and what it needs to improve. To make sure users are getting what they really need, spend some time with a few managers and power users in each department and have them walk you through their environment. What apps are they using? How are their desktops configured? How are their drives mapped? As you move ahead, return to the same users to demo the new environment for them. They can become key advocates.<\/span><\/p>\n<p><b>7. Segment your user base<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Identify the use cases you\u2019ll need to support to make sure you\u2019re meeting their needs effectively. The key is not to over-segment. You can usually find commonalities across use cases and departments that let you consolidate down to just a few groups that share key dimensions. Once you know the lay of the land, you can start with the low-hanging fruit\u2014the easiest cases\u2014to deliver a quick win and generate buzz.<\/span><\/p>\n<p><b>8. Determine the level of customization needed for application delivery. <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once you&#8217;ve decided on the degree of customization, review the application infrastructure. Identify the skills needed to maintain and manage the new desktop virtualization environment. Don&#8217;t skimp on training or recertification. You&#8217;ll also want to establish that any new solution won&#8217;t require you to rip out and replace the entire existing infrastructure.<\/span><\/p>\n<p><b>9. Calculate the investment cost and ramp-up time<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Once you&#8217;ve collected the requirements, you&#8217;re ready to look at desktop virtualization solutions. Establish a realistic estimate of the capital expenditure acquisition costs and calculate costs for each phase of the desktop virtualization project. Construct a timetable for the development, testing and final rollout of the virtual desktop infrastructure. Estimate the annual maintenance support costs, so this can be incorporated into the IT department&#8217;s annual operational budget. Companies must map out a three- to five-year business plan that includes a realistic budget for IT salaries, training and migrations to the appropriate desktop virtualization solutions, as well as support and maintenance agreements. Do not rush the project. Careful fiscal planning will lead to faster ROI.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><b>10. Ensure integration and interoperability with the legacy environment.<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">New technology deployments are frequently disruptive. Carefully review all aspects of your legacy desktop applications and tools, with an eye toward a smooth transition. Some incompatibilities are unavoidable. This is particularly true if your firm&#8217;s desktop hardware and applications are outmoded. Your IT department should work closely with vendors to find workarounds and construct a plan to ensure backward compatibility.<\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Want to Know More?<\/strong><\/span><\/p>\n<p>Want to know one of the best ways to protect your VDI?<\/p>\n<p>Download a 30 day trial of RecordTS and begin recording and protecting your servers today.<\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/\">https:\/\/www.tsfactory.com\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>10 Best Practices for Desktop Virtualization<\/p>\n","protected":false},"author":2,"featured_media":584,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[21],"class_list":["post-191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest","tag-desktop-virtualization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 Best Practices for Desktop Virtualization - Blogs<\/title>\n<meta name=\"description\" content=\"Below we describe the ten best practices for desktop virtualization that admins can implement to keep its users secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Best Practices for Desktop Virtualization - Blogs\" \/>\n<meta property=\"og:description\" content=\"Below we describe the ten best practices for desktop virtualization that admins can implement to keep its users secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-15T11:46:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-10T06:37:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/10\/5-BEST-PRACTICES-FOR-DESKTOP-VIRTUALIZATION-1-e1631255822699.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/\",\"name\":\"10 Best Practices for Desktop Virtualization - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/10\/5-BEST-PRACTICES-FOR-DESKTOP-VIRTUALIZATION-1-e1631255822699.png\",\"datePublished\":\"2020-10-15T11:46:46+00:00\",\"dateModified\":\"2021-09-10T06:37:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"Below we describe the ten best practices for desktop virtualization that admins can implement to keep its users secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/10\/5-BEST-PRACTICES-FOR-DESKTOP-VIRTUALIZATION-1-e1631255822699.png\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/10\/5-BEST-PRACTICES-FOR-DESKTOP-VIRTUALIZATION-1-e1631255822699.png\",\"width\":600,\"height\":1500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Best Practices for Desktop Virtualization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Best Practices for Desktop Virtualization - Blogs","description":"Below we describe the ten best practices for desktop virtualization that admins can implement to keep its users secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/","og_locale":"en_US","og_type":"article","og_title":"10 Best Practices for Desktop Virtualization - Blogs","og_description":"Below we describe the ten best practices for desktop virtualization that admins can implement to keep its users secure.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2020-10-15T11:46:46+00:00","article_modified_time":"2021-09-10T06:37:13+00:00","og_image":[{"width":600,"height":1500,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/10\/5-BEST-PRACTICES-FOR-DESKTOP-VIRTUALIZATION-1-e1631255822699.png","type":"image\/png"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/","name":"10 Best Practices for Desktop Virtualization - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/10\/5-BEST-PRACTICES-FOR-DESKTOP-VIRTUALIZATION-1-e1631255822699.png","datePublished":"2020-10-15T11:46:46+00:00","dateModified":"2021-09-10T06:37:13+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"Below we describe the ten best practices for desktop virtualization that admins can implement to keep its users secure.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/10\/5-BEST-PRACTICES-FOR-DESKTOP-VIRTUALIZATION-1-e1631255822699.png","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/10\/5-BEST-PRACTICES-FOR-DESKTOP-VIRTUALIZATION-1-e1631255822699.png","width":600,"height":1500},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/10-best-practices-for-desktop-virtualization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"10 Best Practices for Desktop Virtualization"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=191"}],"version-history":[{"count":7,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/191\/revisions"}],"predecessor-version":[{"id":583,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/191\/revisions\/583"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/584"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}