Summary
In this chapter, you learned about modern cyberattacks and how to protect against these attacks. It’s almost impossible to provide a 100% safe environment for a company and its users. You learned about the Microsoft solutions and guidelines as well as NIST and how an incident response plan should be followed if an incident has taken place. Lastly, you learned how virtual desktops, using the power and flexibility of the Microsoft Cloud, can be used to speed up the recovery process if existing desktops have become compromised.
The connection from a local device to a virtual desktop is called a session. In the next chapter, we will discuss the security controls that IT admins can leverage to secure user sessions.