πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-140 Domain 2
Domain 2 β€” Module 1 of 5 20%
13 of 28 overall

AZ-140 Study Guide

Domain 1: Plan and Implement an AVD Infrastructure

  • AVD Architecture: The Big Picture Free
  • Network Capacity and Design Free
  • RDP Shortpath, Multipath and QoS Free
  • Private Link and Network Troubleshooting Free
  • Storage Planning for User Data Free
  • File Shares and Azure NetApp Files Free
  • Host Pool Architecture: Personal vs Pooled Free
  • Sizing for Performance and Capacity Free
  • Creating Host Pools and Session Hosts Free
  • Session Host Licensing Free
  • Building Session Host Images Free
  • Image Lifecycle and Compute Gallery Free

Domain 2: Plan and Implement Identity and Security

  • Identity Scenarios for AVD
  • RBAC, Conditional Access and SSO
  • Defending AVD with Microsoft Defender
  • Network Security: NSGs, Firewall, Bastion
  • Threat Protection and Confidential VMs

Domain 3: Plan and Implement User Environments and Apps

  • FSLogix Profile Containers and ODFC
  • FSLogix Cloud Cache and Application Masking
  • AVD Clients: Choose and Deploy
  • User Experience and Session Settings
  • Application Groups and RemoteApp
  • Microsoft 365, Teams and OneDrive on AVD
  • App Attach: Dynamic Application Delivery

Domain 4: Monitor and Maintain an AVD Infrastructure

  • Monitoring AVD with Azure Monitor
  • Autoscaling and Session Management
  • Update Strategy and Backups
  • Disaster Recovery and Multi-Region

AZ-140 Study Guide

Domain 1: Plan and Implement an AVD Infrastructure

  • AVD Architecture: The Big Picture Free
  • Network Capacity and Design Free
  • RDP Shortpath, Multipath and QoS Free
  • Private Link and Network Troubleshooting Free
  • Storage Planning for User Data Free
  • File Shares and Azure NetApp Files Free
  • Host Pool Architecture: Personal vs Pooled Free
  • Sizing for Performance and Capacity Free
  • Creating Host Pools and Session Hosts Free
  • Session Host Licensing Free
  • Building Session Host Images Free
  • Image Lifecycle and Compute Gallery Free

Domain 2: Plan and Implement Identity and Security

  • Identity Scenarios for AVD
  • RBAC, Conditional Access and SSO
  • Defending AVD with Microsoft Defender
  • Network Security: NSGs, Firewall, Bastion
  • Threat Protection and Confidential VMs

Domain 3: Plan and Implement User Environments and Apps

  • FSLogix Profile Containers and ODFC
  • FSLogix Cloud Cache and Application Masking
  • AVD Clients: Choose and Deploy
  • User Experience and Session Settings
  • Application Groups and RemoteApp
  • Microsoft 365, Teams and OneDrive on AVD
  • App Attach: Dynamic Application Delivery

Domain 4: Monitor and Maintain an AVD Infrastructure

  • Monitoring AVD with Azure Monitor
  • Autoscaling and Session Management
  • Update Strategy and Backups
  • Disaster Recovery and Multi-Region
Domain 2: Plan and Implement Identity and Security Premium ⏱ ~16 min read

Identity Scenarios for AVD

Azure Virtual Desktop supports three identity models: traditional AD DS, cloud-native Entra ID, and managed Entra Domain Services. Choosing the right one determines how session hosts join, how users authenticate, and how your VNet is configured.

Why identity matters in AVD

β˜• Simple explanation

Think of identity as the guest list at a building entrance.

Before anyone sits down at a virtual desktop, the system needs to know who they are. There are three ways to check the guest list:

  • AD DS β€” The classic office security desk. Your own guards, your own badge system, running in your own building. You maintain everything.
  • Entra ID β€” A cloud-based badge system. No office needed. Everyone scans in from anywhere and the cloud verifies them.
  • Entra Domain Services β€” A managed security desk Microsoft runs for you. It understands the old badge system (AD DS protocols) but you do not have to maintain the guards or the building.

Each approach changes how your session host VMs β€œjoin” the organisation and how users log in.

Every AVD deployment requires an identity provider to authenticate users and domain-join (or cloud-join) session hosts. The identity model you choose affects networking, DNS, authentication flow, profile management, and Group Policy support.

Azure Virtual Desktop supports three identity models:

  • Active Directory Domain Services (AD DS) β€” on-premises or IaaS-hosted domain controllers synced to Entra ID via Entra Connect
  • Microsoft Entra ID (cloud-native) β€” session hosts are Entra ID joined with no domain controller dependency
  • Microsoft Entra Domain Services β€” a Microsoft-managed domain service that provides LDAP, Kerberos, and NTLM without managing domain controllers

All three require users to exist in Entra ID for the initial authentication. The difference is how the session hosts are joined and how the second-hop authentication works.

The three identity models

1. Active Directory Domain Services (AD DS)

This is the traditional model most organisations already have. Domain controllers run either on-premises (connected via VPN or ExpressRoute) or as VMs in Azure.

How it works:

  • Session hosts are AD DS joined (traditional domain join)
  • Users authenticate to Entra ID first, then the session host validates credentials against AD DS
  • Requires Entra Connect to sync on-premises AD users to Entra ID
  • Domain controllers must be reachable from the session host VNet (DNS and network connectivity)

πŸ›οΈ JC at the Federal Department uses AD DS because the government has a 15-year-old Active Directory forest with thousands of Group Policy Objects. β€œWe have 3,000 staff and 400 GPOs. Ripping out AD DS is not happening this decade. Our domain controllers run on Azure VMs in the same region as our session hosts, connected to on-prem via ExpressRoute.”

Requirements:

  • Domain controllers reachable from session host subnet (VNet peering or same VNet)
  • DNS servers on the VNet must resolve the AD DS domain name
  • Entra Connect syncing users to Entra ID
  • A user account with permissions to join computers to the domain (or an OU-scoped join account)
  • Line of sight from session hosts to a domain controller on ports 389, 636, 88, 53, 445

2. Microsoft Entra ID (cloud-native join)

The newest and simplest model. No domain controllers at all. Session hosts join Entra ID directly.

How it works:

  • Session hosts are Entra ID joined (cloud-native)
  • Users authenticate entirely through Entra ID
  • No domain controllers, no Entra Connect sync required (if users are cloud-only)
  • Supports single sign-on (SSO) so users do not see a second credential prompt

🌐 Priya at NomadTech went fully cloud-native. β€œWe are a 200-person remote company with no offices and no on-prem servers. Our users are all cloud-native Entra ID accounts. Entra ID join was the obvious choice β€” no domain controllers to manage, no VPN, no sync headaches.”

Requirements:

  • Session hosts must run Windows 11 Enterprise (single or multi-session) or Windows Server 2022 or later
  • Intune enrolment is recommended (Group Policy is not available without AD DS)
  • If users need to access on-premises file shares, you still need hybrid identity (Entra Connect) or alternative access methods
  • FSLogix profiles work with Azure Files when using Entra ID-based authentication
πŸ’‘ Exam tip: Entra ID join OS requirement

This is a favourite exam question. Entra ID join for AVD session hosts requires Windows 11 Enterprise or Windows Server 2022 at minimum. If the scenario mentions Windows 10 or Server 2019, Entra ID join is NOT an option β€” the answer must be AD DS join or Entra Domain Services.

3. Microsoft Entra Domain Services (managed domain)

A managed domain that provides traditional AD protocols (LDAP, Kerberos, NTLM) without you managing any domain controllers.

How it works:

  • Microsoft provisions and manages domain controllers in the background
  • Session hosts are domain-joined to the managed domain
  • Supports Group Policy (but with some limitations compared to full AD DS)
  • Users and groups sync one-way from Entra ID into the managed domain
  • You cannot extend the schema or create forest trusts (it is a standalone managed forest)

🏒 Raj at TerraStack considered Entra Domain Services for a new subsidiary that has no existing AD DS. β€œThe subsidiary has 200 users who need domain-joined session hosts for legacy apps that require Kerberos auth. But they do not have domain controllers. Entra Domain Services gave us domain services without building new infrastructure.”

Requirements:

  • Entra Domain Services must be provisioned in the same VNet (or a peered VNet) as the session hosts
  • A dedicated subnet for the managed domain (Microsoft recommends /24)
  • DNS settings on the VNet must point to the managed domain’s IP addresses
  • Password hash sync must be enabled in Entra ID (for cloud-only users, this happens automatically; for synced users, you must enable password hash sync in Entra Connect)
ℹ️ Deep dive: Why Entra Domain Services needs password hashes

Entra Domain Services provides Kerberos and NTLM authentication, which require password hashes stored in the managed domain. For cloud-only users, Entra ID already stores the right hash formats. For users synced from on-premises AD via Entra Connect, you must enable password hash synchronisation β€” otherwise those users cannot authenticate to the managed domain.

This is a common gotcha in both the exam and real deployments. If hybrid users cannot log in to Entra Domain Services-joined session hosts, check that password hash sync is enabled in Entra Connect.

Session host join types at a glance

Join TypeIdentity ProviderDomain Controller NeededGroup PolicyWindows Version
AD DS joinOn-prem or IaaS AD DSYesFull GPO supportAny supported Windows
Entra ID joinMicrosoft Entra IDNoIntune policies onlyWin 11 or Server 2022+
Hybrid Entra joinAD DS + Entra IDYesFull GPO + IntuneAny supported Windows
Entra DS joinManaged domainNo (Microsoft manages)Limited GPOAny supported Windows

The identity decision matrix

Use this flowchart when the exam gives you a scenario:

  1. Do you have existing AD DS infrastructure you must keep?
    • Yes, and users need full Group Policy: AD DS join or hybrid Entra join
    • Yes, but moving toward cloud management: Hybrid Entra join (transition path)
  2. Is the deployment cloud-only with no legacy AD dependencies?
    • Yes: Entra ID join
  3. Do you need domain services (Kerberos, LDAP) but have no domain controllers?
    • Yes: Entra Domain Services
  4. Do the session hosts run Windows 10 or Server 2019?
    • Yes: Entra ID join is not available β€” must use AD DS or Entra DS
AD DS vs Entra ID vs Entra Domain Services
CapabilityAD DS (Traditional)Entra ID (Cloud-Native)Entra Domain Services (Managed)
Domain controllersYou deploy and manageNone neededMicrosoft manages
Group PolicyFull GPO supportIntune only (no GPO)Limited GPO support
Kerberos / NTLMYesNo (token-based auth)Yes
LDAP accessYesNoYes (read-only LDAP)
Forest trustsYesN/ANo
Schema extensionsYesN/ANo
Minimum OS for session hostsAny supportedWindows 11 / Server 2022+Any supported
Profile storage authAD DS or Kerberos for file sharesEntra ID-based Azure FilesKerberos for Azure Files
Best forExisting AD environmentsCloud-native orgsLift-and-shift without DCs
Network requirementDCs reachable from VNetInternet access to Entra IDManaged domain in same/peered VNet
Entra Connect neededYes (sync to Entra ID)No (cloud-only users)No (syncs from Entra ID)

DNS considerations by identity model

DNS is the silent deal-breaker in AVD identity. Get it wrong and session hosts cannot join.

Identity ModelDNS Configuration
AD DSVNet DNS must point to your domain controllers (so hosts can find the domain). Azure DNS alone will NOT work.
Entra IDAzure-provided DNS is fine. No domain to resolve.
Entra Domain ServicesVNet DNS MUST point to the managed domain IP addresses (shown in the Entra Domain Services blade in the portal).
Hybrid joinVNet DNS must resolve both on-prem AD and Azure resources. Typically domain controller IPs plus Azure DNS forwarder.

Common mistake: Leaving VNet DNS as β€œAzure-provided” when using AD DS join. The session hosts will never find the domain controller and the domain join will fail.

πŸ’‘ Exam tip: DNS for Entra Domain Services

If a question describes Entra Domain Services and session hosts failing to join, check the DNS configuration first. The VNet custom DNS settings must point to the two IP addresses of the managed domain β€” not Azure DNS, not an on-prem DNS server.

Real-world scenarios

πŸ›οΈ JC β€” Government with strict compliance: AD DS join with hybrid Entra join for Conditional Access. Domain controllers on Azure VMs in a government-accredited region. ExpressRoute to on-prem for legacy app servers.

🌐 Priya β€” Remote-first startup: Entra ID join. No servers, no VPN. Intune for policy management. Azure Files with Entra ID authentication for FSLogix profiles.

🏒 Raj β€” Enterprise Citrix migration: Hybrid Entra join for the main campus (existing AD DS), Entra Domain Services for the new subsidiary. Both peered to the same hub VNet.

Question

What is the minimum Windows version for Entra ID-joined AVD session hosts?

Click or press Enter to reveal answer

Answer

Windows 11 Enterprise (single or multi-session) or Windows Server 2022. Windows 10 and Server 2019 do NOT support Entra ID join for AVD.

Click to flip back

Question

What must be enabled in Entra Connect for hybrid users to authenticate to Entra Domain Services?

Click or press Enter to reveal answer

Answer

Password hash synchronisation. Entra Domain Services needs NTLM and Kerberos hashes, which are only available if Entra Connect syncs them from on-premises AD.

Click to flip back

Question

What DNS setting is required for AD DS-joined session hosts?

Click or press Enter to reveal answer

Answer

The VNet custom DNS must point to your domain controller IP addresses. Azure-provided DNS cannot resolve your AD DS domain name, so domain join will fail without this.

Click to flip back

Question

Can you create forest trusts with Entra Domain Services?

Click or press Enter to reveal answer

Answer

No. Entra Domain Services is a standalone managed forest. You cannot create forest trusts, extend the AD schema, or promote additional domain controllers.

Click to flip back

Knowledge Check

Priya is deploying AVD for NomadTech. They have no on-premises infrastructure, all users are cloud-native Entra ID accounts, and they use Intune for device management. The session hosts will run Windows 11 Enterprise multi-session. Which identity model should she use?

Knowledge Check

JC is deploying AVD session hosts for the Federal Department. They have an existing AD DS forest with 400 Group Policy Objects, and the security team requires full GPO support. The session hosts will run Windows 10 Enterprise multi-session. Which join type can JC use?

Knowledge Check

Raj is setting up Entra Domain Services for a subsidiary's AVD deployment. The managed domain is provisioned, but hybrid users synced from on-premises AD cannot authenticate. Cloud-only users work fine. What is the most likely cause?

🎬 Video coming soon

Identity Scenarios for AVD


Next up: RBAC, Conditional Access and SSO β€” how to control who can manage AVD, enforce security policies on connections, and eliminate the double sign-in prompt with SSO.

← Previous

Image Lifecycle and Compute Gallery

Next β†’

RBAC, Conditional Access and SSO

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.