Security and Protection for MED-V
Gäller för: Microsoft Enterprise Desktop Virtualization 2.0
The following section contains best practices that we recommend for running Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 in a secure configuration.
I det här avsnittet
- Security Best Practices for MED-V Operations
Describes best practices to follow to help maintain security when preparing, building, testing, deploying, and managing MED-V-arbetsytas.
- Authentication of MED-V End Users
Describes best practices to follow to help maintain security when verifying the identity of MED-V end users.
Se även
Ytterligare resurser
Microsoft Enterprise Desktop Virtualization 2.0
-----
You can learn more about MDOP in the TechNet Library, search for troubleshooting on the TechNet Wiki, or follow us on Facebook or Twitter.
-----