Azure Virtual Desktop | The complete setup guide

Header Avd Completeguide
Reading Time: 2 minutes

In the next coming blogs we wil get a complete setup guide and which steps to take to get Azure Virtual Desktop running in your Azure subscription.

Azure Virtual Desktop (AVD) stands out as a powerful solution for delivering virtualised desktops and applications. Setting up AVD within an Azure Landing Zone with its dedicated subscription ensures optimal governance, security, and scalability.

In this guide, we’ll walk through the process of configuring host pools, app groups, and workspaces, followed by the creation of a golden image using Azure Image Builder. Finally, we’ll explore the integration of FSLogix with Azure Files and Cloud Kerberos Retrieval for enhanced user experience and security.

Setting Up Azure Virtual Desktop in an Azure Landing Zone

  1. Design Azure Landing Zone: Establish a well-architected Azure Landing Zone tailored to your organization’s needs, ensuring compliance, security, and efficiency.
  2. Create Dedicated Subscription: Allocate a separate Azure subscription for AVD deployment within the Landing Zone to isolate resources and manage costs effectively.
  3. Configure Networking: Set up Virtual Networks (VNets), subnets, and Network Security Groups (NSGs) to provide secure and isolated connectivity for AVD components.
  4. Provision Host Pools: Deploy host pools to provide virtual desktops for users, selecting appropriate VM sizes, scaling options, and load-balancing configurations based on workload requirements.
  5. Define App Groups: Organize applications into logical groups within AVD, assigning access permissions to users or user groups based on roles or departments.
  6. Create Workspaces: Establish workspaces to provide users with centralised access to virtual desktops and applications, simplifying management and user access.

Creating a Golden Image with Azure Image Builder

  1. Prepare Base Image: Start with a clean Windows image, ensuring it includes necessary updates, drivers, and prerequisite software.
  2. Configure Customizations: Install applications and apply security measures required for your organization’s desktop environment using PowerShell scripts.
  3. Capture Image with Azure Image Builder: Use Azure Image Builder to create a golden image from the customized VM, specifying configurations such as OS version, image type, and distribution settings.
  4. Schedule Image Builds: Set up recurring image builds to automatically capture and update the golden image with the latest patches and configurations. The best tip in this is, keep it as vanilla as possible. Use DevOps of Github Actions to trigger the build process or the trigger in the ImageBuilder.

Integrating FSLogix with Azure Files and Cloud Kerberos Retrieval

  1. Set Up Azure Files: Create Azure Files storage to host FSLogix profile containers, ensuring proper permissions and access controls are configured.
  2. Update FSLogix: Install and configure FSLogix on AVD session hosts, enabling profile containerisation and redirection to Azure Files storage for seamless user profile management.
  3. Enable Cloud Kerberos Retrieval: Configure Azure Active Directory Domain Services (AAD DS) and AVD to enable Cloud Kerberos Retrieval, facilitating secure authentication to on-premises resources.
  4. Test and Optimize: Conduct thorough testing to ensure proper functionality and performance of FSLogix profiles with Azure Files and Cloud Kerberos Retrieval, optimizing configurations as needed.

Intune

Use intune to manage your Azure Virtual Desktop. Use scripts and configuration policies to configure user specific settings or machine wide settings.

In the next posts, I will take you by the hand and provide tips and tricks which are learned during my journey. I will show you how to use the ImageBuilder but also which challenges there are with a Windows 11 Multi-Session host where not every intune policy is applied to.

Share and Enjoy !

Shares
Designer (23)

Stay close to the action—follow GetToThe.Cloud across social!
Deep dives and hands‑on how‑tos on Azure Local, hybrid cloud, automation, PowerShell/Bicep, AVD + FSLogix, image pipelines, monitoring, networking, and resilient design when the internet/Azure is down.

🔗 Our channels
▶️ YouTube: https://www.youtube.com/channel/UCa33PgGdXt-Dr4w3Ub9hrdQ
💼 LinkedIn Group: https://www.linkedin.com/groups/9181126/
✖️ X (Twitter): https://x.com/Gettothecloud
🎵 TikTok: https://www.tiktok.com/@gettothecloud
🐙 GitHub: https://github.com/GetToThe-Cloud/Website
💬 Slack: DM us for an invite
📲 WhatsApp: DM for the community link

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Our website address is: https://www.gettothe.cloud

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.
Save settings
Cookies settings