Security technologies in Microsoft Managed Desktop
Microsoft Managed Desktop uses several Microsoft technologies to help secure managed devices and data. In addition, the Microsoft Managed Desktop Security Operations Center uses various processes with these technologies. Specifically:
|Device security||Security and protection on Microsoft Managed Desktop devices.|
|Identity and Access Management||Managing secure use of devices through Azure Active Directory identity services.|
|Network security||VPN information and Microsoft Managed Desktop recommended solution and settings.|
|Information security||Optional available services to further protect sensitive information.|
For information about data storage, usage, and security practices used by Microsoft Managed Desktop, see our whitepaper at https://aka.ms/mmd-data.
Microsoft Managed Desktop ensures all managed devices are secured and protected, and detects threats as early as possible using the following services:
|Antivirus||Microsoft Defender Antivirus is installed and configured
Microsoft Defender Antivirus definitions are up to date.
|Full Volume Encryption||Windows BitLocker is the volume encryption solution for Microsoft Managed Desktop devices.
Once an organization is enrolled into the service, devices will be encrypted using Windows BitLocker with built-in Trust Platform Module (TPM) to prevent unauthorized access to local data when the device is in sleep mode, or off.
|Monitoring||Microsoft Defender for Endpoint is used for security threat monitoring across all Microsoft Managed Desktop devices. Defender for Endpoint allows enterprise customers to detect, investigate, and respond to advanced threats in their corporate network. For more information, see Microsoft Defender for Endpoint.|
|Operating system updates||Microsoft Managed Desktop devices are always secured with the latest security updates.|
|Secure Device Configuration||Microsoft Managed Desktop implements the Microsoft Security Baseline. For more information, see Windows security baselines.|
Identity and access management
Identity and access management protects corporate assets and business-critical data. Microsoft Managed Desktop configures devices to ensure secure use with Azure Active Directory (Azure AD) managed identities. It's the customer's responsibility to maintain accurate information in their Azure AD tenant.
|Biometric Authentication||Windows Hello allows users to sign in by using their face or a PIN, making passwords harder to forget or steal. Customers are responsible for implementing the necessary pre-requisites for their on-premises Active Directory to use this service in a hybrid configuration. For more information, see Windows Hello.|
|Standard user permission||To protect the system and make it more secure, the user will be assigned Standard User Permissions. This permission is assigned as part of the Windows Autopilot out-of-box experience.|
Customers are responsible for network security.
|VPN||Customers own their VPN infrastructure, to ensure limited corporate resources can be exposed outside the intranet.
Minimum requirement: Microsoft Managed Desktop requires a Windows 10 compatible and supported VPN solution. If your organization needs a VPN solution, it needs to support Windows 10 and be packaged and deployable through Intune. Contact your software publisher for more information.
You can configure these optional services to help protect corporate high-value assets.
|Data recovery||Information stored in key folders on the device is backed up to OneDrive for Business. Microsoft Managed Desktop isn't responsible for data that isn't synchronized with OneDrive for Business.|
|Windows Information Protection||For companies that require high levels of information security, we recommend Windows Information Protection and Azure Information Protection.|