πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-140 Domain 2
Domain 2 β€” Module 3 of 5 60%
15 of 28 overall

AZ-140 Study Guide

Domain 1: Plan and Implement an AVD Infrastructure

  • AVD Architecture: The Big Picture Free
  • Network Capacity and Design Free
  • RDP Shortpath, Multipath and QoS Free
  • Private Link and Network Troubleshooting Free
  • Storage Planning for User Data Free
  • File Shares and Azure NetApp Files Free
  • Host Pool Architecture: Personal vs Pooled Free
  • Sizing for Performance and Capacity Free
  • Creating Host Pools and Session Hosts Free
  • Session Host Licensing Free
  • Building Session Host Images Free
  • Image Lifecycle and Compute Gallery Free

Domain 2: Plan and Implement Identity and Security

  • Identity Scenarios for AVD
  • RBAC, Conditional Access and SSO
  • Defending AVD with Microsoft Defender
  • Network Security: NSGs, Firewall, Bastion
  • Threat Protection and Confidential VMs

Domain 3: Plan and Implement User Environments and Apps

  • FSLogix Profile Containers and ODFC
  • FSLogix Cloud Cache and Application Masking
  • AVD Clients: Choose and Deploy
  • User Experience and Session Settings
  • Application Groups and RemoteApp
  • Microsoft 365, Teams and OneDrive on AVD
  • App Attach: Dynamic Application Delivery

Domain 4: Monitor and Maintain an AVD Infrastructure

  • Monitoring AVD with Azure Monitor
  • Autoscaling and Session Management
  • Update Strategy and Backups
  • Disaster Recovery and Multi-Region

AZ-140 Study Guide

Domain 1: Plan and Implement an AVD Infrastructure

  • AVD Architecture: The Big Picture Free
  • Network Capacity and Design Free
  • RDP Shortpath, Multipath and QoS Free
  • Private Link and Network Troubleshooting Free
  • Storage Planning for User Data Free
  • File Shares and Azure NetApp Files Free
  • Host Pool Architecture: Personal vs Pooled Free
  • Sizing for Performance and Capacity Free
  • Creating Host Pools and Session Hosts Free
  • Session Host Licensing Free
  • Building Session Host Images Free
  • Image Lifecycle and Compute Gallery Free

Domain 2: Plan and Implement Identity and Security

  • Identity Scenarios for AVD
  • RBAC, Conditional Access and SSO
  • Defending AVD with Microsoft Defender
  • Network Security: NSGs, Firewall, Bastion
  • Threat Protection and Confidential VMs

Domain 3: Plan and Implement User Environments and Apps

  • FSLogix Profile Containers and ODFC
  • FSLogix Cloud Cache and Application Masking
  • AVD Clients: Choose and Deploy
  • User Experience and Session Settings
  • Application Groups and RemoteApp
  • Microsoft 365, Teams and OneDrive on AVD
  • App Attach: Dynamic Application Delivery

Domain 4: Monitor and Maintain an AVD Infrastructure

  • Monitoring AVD with Azure Monitor
  • Autoscaling and Session Management
  • Update Strategy and Backups
  • Disaster Recovery and Multi-Region
Domain 2: Plan and Implement Identity and Security Premium ⏱ ~17 min read

Defending AVD with Microsoft Defender

Protect your session hosts with Defender for Cloud security posture management, configure antivirus with FSLogix-specific exclusions, and onboard endpoints to Defender for Endpoint for advanced threat detection.

Why AVD needs special Defender attention

β˜• Simple explanation

Think of Defender like the health and safety team at a hotel.

Your session host VMs are like hotel rooms. Guests check in, use the room, and leave. The safety team has three jobs:

  • Defender for Cloud β€” The safety inspector who walks through the building, checks fire exits, and gives you a score on how safe the hotel is. They recommend improvements but do not fix things themselves.
  • Defender Antivirus β€” The cleaner who scrubs every room after guests leave. But you have to tell them NOT to scrub certain locked drawers (FSLogix profile containers) or they will slow everything down.
  • Defender for Endpoint β€” The undercover security guard who watches for suspicious behaviour: someone picking locks, sneaking into staff areas, or copying the guest register.

AVD session hosts are VMs running Windows and serving user sessions β€” they are vulnerable to the same threats as any Windows endpoint. But multi-session environments add complexity:

  • Multiple users share one VM, so a compromised session can affect all users on that host
  • FSLogix profile containers (VHD/VHDX files) are constantly mounted and unmounted β€” antivirus scanning these files causes severe performance issues
  • Pooled hosts are rebuilt frequently from images, so endpoint protection must be part of the image or auto-deployed
  • Session hosts often need internet access (for AVD service endpoints), increasing their attack surface

Microsoft Defender provides three layers of protection: cloud security posture (Defender for Cloud), antivirus (Defender Antivirus), and endpoint detection and response (Defender for Endpoint).

Defender for Cloud and AVD

What Defender for Cloud does for AVD

Defender for Cloud is a Cloud Security Posture Management (CSPM) tool that continuously assesses your AVD infrastructure and provides recommendations.

Key capabilities for AVD:

  • Secure Score β€” a percentage rating of your security posture across all Azure resources including AVD
  • Security recommendations β€” specific actions like β€œEnable disk encryption on session hosts” or β€œInstall endpoint protection”
  • Regulatory compliance β€” track compliance against standards like ISO 27001, NIST, CIS
  • Alert correlation β€” links alerts from session hosts to broader attack chains

Defender for Servers plans

For AVD session hosts, the relevant Defender plan is Defender for Servers.

FeatureDefender for Servers Plan 1Defender for Servers Plan 2
Defender for Endpoint integrationYesYes
Vulnerability assessmentNoYes (built-in Qualys or MDVM)
Just-in-time VM accessNoYes
File integrity monitoringNoYes
Adaptive application controlsNoYes
Network hardening recommendationsNoYes
PricingLowerHigher
Best forBasic endpoint protectionFull server security

πŸ›οΈ JC at the Federal Department uses Plan 2: β€œDirector Walsh requires vulnerability assessment and file integrity monitoring for compliance audits. We need to prove that no unauthorised files changed on session hosts between image deployments. Plan 2 is mandatory for our accreditation.”

🎧 Mia at Horizons Health uses Plan 1: β€œWe need endpoint protection on our clinical session hosts but our budget is tight. Plan 1 gives us Defender for Endpoint integration, which covers our HIPAA requirements for malware protection.”

πŸ’‘ Exam tip: Defender for Servers vs Defender for Endpoint

These are NOT the same thing. Defender for Servers is a Defender for Cloud plan that protects Azure VMs (including session hosts). Defender for Endpoint is the agent-based endpoint detection and response (EDR) solution that runs on the VM. Plan 1 includes Defender for Endpoint. Plan 2 adds vulnerability assessment, JIT access, and file integrity monitoring. Know which features belong to which plan.

Defender Antivirus on session hosts

The FSLogix exclusion problem

This is one of the most important AVD security topics for the exam and real life. Defender Antivirus will cripple your session hosts if you do not configure FSLogix exclusions.

Why? FSLogix profile containers are VHD/VHDX files that are mounted and unmounted constantly as users sign in and out. Without exclusions, the antivirus scans these large files on every mount, causing:

  • Login times increasing from seconds to minutes
  • High CPU usage on session hosts during peak sign-in hours
  • Profile attachment failures (file locked by antivirus scan)

Required FSLogix exclusions

These exclusions are mandatory for any AVD deployment using FSLogix:

File exclusions:

PathPurpose
%ProgramFiles%\FSLogix\Apps\frxdrv.sysFSLogix driver
%ProgramFiles%\FSLogix\Apps\frxdrvvt.sysFSLogix driver
%ProgramFiles%\FSLogix\Apps\frxccd.sysFSLogix Cloud Cache driver
%TEMP%*.VHDTemporary profile VHD files
%TEMP%*.VHDXTemporary profile VHDX files
%Windir%\TEMP*.VHDSystem temp VHD files
%Windir%\TEMP*.VHDXSystem temp VHDX files

Folder exclusions (profile container share paths):

PathPurpose
The UNC path to your profile share (e.g. \\storage\profiles)Profile container VHDs
The UNC path to your ODFC share (e.g. \\storage\odfc)Office Data File Cache containers

Process exclusions:

ProcessPurpose
%ProgramFiles%\FSLogix\Apps\frxccd.exeCloud Cache process
%ProgramFiles%\FSLogix\Apps\frxccds.exeCloud Cache service
%ProgramFiles%\FSLogix\Apps\frxsvc.exeFSLogix service

🎧 Mia learned this the hard way: β€œOn our first pilot, nurses were waiting 4 minutes to log in during the 7 AM shift change. Twelve nurses hitting the same two session hosts, all mounting profiles simultaneously, and Defender scanning every VHD. After adding the FSLogix exclusions, login dropped to 15 seconds.”

ℹ️ Deep dive: Cloud Cache exclusions

If you are using FSLogix Cloud Cache (for profile replication across storage providers), you need additional exclusions for the Cloud Cache temp files. Cloud Cache writes temporary copies of the VHD locally before syncing. These temp files are in %ProgramData%\FSLogix\Cache and %ProgramData%\FSLogix\Proxy. Both paths must be excluded.

Cloud Cache also uses a local cache directory that can grow large β€” antivirus scanning this directory causes write contention and can corrupt the cache. This is a real-world issue that also appears in exam scenarios.

Real-time protection considerations

For multi-session hosts, real-time protection should remain enabled β€” but it must be configured with the exclusions above. Disabling real-time protection is not recommended, even for performance.

Additional recommendations for multi-session:

  • Scheduled scans β€” run during off-hours (e.g. 2 AM), not during business hours
  • Scan type β€” use Quick Scan for daily scans, Full Scan weekly during maintenance windows
  • CPU throttle β€” set ScanAvgCPULoadFactor to limit CPU usage during scans (default is 50 percent)

Defender for Endpoint on session hosts

Onboarding methods

Defender for Endpoint (MDE) must be onboarded on each session host. For pooled environments, this should be part of the golden image or deployed automatically.

Onboarding MethodBest ForHow It Works
Microsoft IntuneEntra ID joined or hybrid joined hosts managed by IntuneIntune deploys the MDE agent via device configuration profile
Group PolicyAD DS joined hosts in traditional environmentsGPO deploys the onboarding package to the OU containing session hosts
Local scriptTesting, small deployments, or image bakingRun the onboarding script (WindowsDefenderATPLocalOnboardingScript.cmd) during image creation
Microsoft Endpoint Configuration ManagerOrganisations using MECM/SCCMDeploy onboarding package as an application or task sequence step

πŸ›οΈ JC onboards via Group Policy: β€œOur 3,000 session hosts are all AD DS joined. GPO deploys the MDE onboarding package to the AVD Session Hosts OU. For new images, the onboarding script is baked into the image build process.”

🎧 Mia onboards via Intune: β€œOur clinical session hosts are hybrid Entra joined and Intune-managed. Intune pushes the MDE sensor automatically. When we rebuild pooled hosts from a new image, they auto-enrol in Intune and get MDE within minutes.”

Scanning strategy for multi-session

Scan TypeFrequencyWhen to RunNotes
Quick ScanDailyDuring low-usage hours (early morning)Scans common malware locations, fast
Full ScanWeeklyMaintenance window (e.g. Saturday night)Scans all files and running processes
Custom ScanAs neededAfter incident or image updateTarget specific folders or drives

Performance tip: On multi-session hosts with 10+ concurrent users, a full scan during business hours can cause noticeable lag for all users. Always schedule scans outside peak hours using Group Policy or Intune.

πŸ’‘ Exam tip: Onboarding pooled vs personal hosts

For pooled hosts that are rebuilt frequently, bake the MDE onboarding into the golden image. If you onboard via Intune or GPO after deployment, there is a window where the session host is unprotected. The exam may present a scenario where new pooled hosts are not showing in the MDE portal β€” the fix is to include the onboarding script in the image build process, not wait for policy-based deployment.

For personal hosts that persist, Intune or GPO-based onboarding works well because the host stays around long enough for the policy to apply.

Putting it all together

LayerToolWhat It Does for AVD
Posture managementDefender for CloudScans infrastructure, gives secure score, compliance tracking
Server protectionDefender for Servers (Plan 1 or 2)Adds vulnerability assessment, JIT, file integrity (Plan 2)
AntivirusDefender AntivirusReal-time protection with FSLogix exclusions
Endpoint detectionDefender for EndpointThreat detection, investigation, automated response
Question

Why must you configure antivirus exclusions for FSLogix profile containers?

Click or press Enter to reveal answer

Answer

FSLogix uses VHD/VHDX files that are mounted at sign-in and unmounted at sign-out. Without exclusions, the antivirus scans these large files on every mount, causing slow logins, high CPU, and potential profile attachment failures.

Click to flip back

Question

What is the difference between Defender for Servers Plan 1 and Plan 2?

Click or press Enter to reveal answer

Answer

Plan 1 includes Defender for Endpoint integration (basic EDR). Plan 2 adds vulnerability assessment, just-in-time VM access, file integrity monitoring, and adaptive application controls.

Click to flip back

Question

What is the recommended onboarding method for Defender for Endpoint on pooled AVD session hosts?

Click or press Enter to reveal answer

Answer

Bake the onboarding script into the golden image. This ensures every new session host is protected from first boot, with no gap waiting for Intune or GPO to apply.

Click to flip back

Question

When should you schedule full antivirus scans on multi-session AVD hosts?

Click or press Enter to reveal answer

Answer

During maintenance windows outside business hours (e.g. weekends or early morning). Full scans on multi-session hosts during peak hours cause noticeable performance degradation for all connected users.

Click to flip back

Knowledge Check

Mia's clinical session hosts are experiencing 4-minute login times during the morning shift change. CPU spikes to 100 percent when multiple nurses sign in simultaneously. FSLogix profiles are stored on an Azure Files share. What is the most likely cause?

Knowledge Check

JC is deploying Defender for Endpoint on 500 pooled AVD session hosts that are rebuilt from a golden image every two weeks. New hosts take 30 minutes to appear in the MDE portal after deployment. How should JC fix this gap?

Knowledge Check

Which of the following paths should be EXCLUDED from Defender Antivirus scanning on AVD session hosts using FSLogix? (Choose two)

🎬 Video coming soon

Defending AVD with Microsoft Defender


Next up: Network Security: NSGs, Firewall, Bastion β€” how to lock down session host networking with NSGs and Azure Firewall, and secure admin access with Bastion and JIT.

← Previous

RBAC, Conditional Access and SSO

Next β†’

Network Security: NSGs, Firewall, Bastion

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.