Virtual Desktop — Securing Cloud Pcs And Azure
“They’re not asleep,” she muttered, pulling up the Intune device compliance report. “They’re the bait.”
Frustrated, the attacker pivoted. They tried to deploy a new session host directly via the Azure API. But Marta had locked down the with Azure Privileged Identity Management (PIM) . You couldn’t spin up a host without a time-bound, approved, audited elevation request. securing cloud pcs and azure virtual desktop
Marta pulled up a diagram. The AVD architecture was a Rube Goldberg machine of trust. “They’re not asleep,” she muttered, pulling up the