Summary
In this chapter, you have learned how to configure these shared security controls for virtual desktops. Not only do these controls add more security for the user accounts, but they also add an extra level of security to the virtual desktops in this new hybrid way of working.
Let’s continue securing virtual desktops in Chapter 5, Preventing Data Leakage from Desktops, and take a look at how IT admins can prevent data leakage from the endpoint with technologies such as watermarking and screen capture protection.