How to allow only ingress traffic from vendors coporate network to WVD instead of allowing any public connections such as public wifi?
As far as I know this is not poosible. The Azure Windows Virtual Desktop infrastructure allows connections from any public internet connection. But authentication is required to get access to the WVD environment. This authentication could also include/require MFA.
How to allow only egress traffic from WVD into specific vm/ devices in the corporate network?
You can use "forced tunneling" to send any traffic from WVD infrastructure in the corporate network: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-forced-tunneling
Is it good practice to have WVD as Domain-joined device because you are allowing internet connections and that would make more attack surface if compromised. what are the implications of having it non-domain joined?
Currently it's mandatory to domain join the WVD VMs. There is no option to use WVD VMs non-domain joined.
Is there an article that explains how to deploy hardened WVD for security reasons.
Basically "hardening the WVD VMs" is possible. The WVD VMs are Windows 10 based, you can do a lot of things with GPOs.
Maybe this link is helpful: https://learn.microsoft.com/en-us/azure/virtual-desktop/security-guide
Hope this helps.
----------
(If the reply was helpful please don't forget to upvote and/or accept as answer, thank you)
Regards
Andreas Baumgarten