WVD Fall LLD
WVD Fall LLD
WVD Fall LLD
AUTHOR(S) :
DOCUMENT NUMBER :
VERSION : 1.0
STATUS : Final
SOURCE :
DOCUMENT DATE : 05 May 2020
NUMBER OF PAGES : 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
Contents
1 Introduction................................................................................................
1.1 Purpose......................................................................................................
1.2 Audience....................................................................................................
1.3 Scope.........................................................................................................
1.4 Related documents......................................................................................
2 Hardware Layer...........................................................................................
2.1 Design schematic........................................................................................
2.2 Azure Subscription.......................................................................................
3 User Layer Design.......................................................................................
3.1 User Topology.............................................................................................
3.2 User Locations.............................................................................................
3.3 Logical User Groups.....................................................................................
3.4 Endpoints and Peripherals.............................................................................
4 Access Layer Design....................................................................................
4.1 Windows Virtual Desktop Brokering................................................................
4.2 Access Methods...........................................................................................
4.3 Access Criteria............................................................................................
4.4 Access Flowchart.........................................................................................
5 Resource Layer Design...............................................................................
5.1 Personalization..........................................................................................
5.1.1 Profiles.....................................................................................................
5.2 Policies.....................................................................................................
5.2.1 Active Directory Policies..............................................................................
5.3 Printing....................................................................................................
5.4 Images.....................................................................................................
5.4.1 Azure compute..........................................................................................
6 Control Layer: Infrastructure.......................................................................
6.1 Active Directory.........................................................................................
6.2 SCCM.......................................................................................................
6.3 High Availability.........................................................................................
7 System Administration...............................................................................
7.1 Administrative Consoles..............................................................................
7.1.1 Service Account.........................................................................................
8 Security....................................................................................................
8.1 Session Timeouts.......................................................................................
8.2 Antivirus Configuration...............................................................................
Appendix A Hostnames /IPs:.................................................................................
Appendix B - User Groups Detailed Requirements....................................................
05 May 2020
2 of 15
sys_WordMark_AT
version: 1.0
document number:
List of changes
Version Date Description Author(s)
05 May 2020
3 of 15
sys_WordMark_AT
version: 1.0
document number:
1 Introduction
Windows Virtual Desktop is a desktop and application virtualization service that runs on the cloud
simplifying the desktop as a service offering by removing the need to manage all of the
infrastructure services. It does this by offering the brokering, web access, load balancing,
management and monitoring services for you managed by Azure. This only leaves the image and
user management as administrative tasks to allow users secure access to their desktops in the
cloud from any machine. As at the time of writing this document WVD support Windows 10
Enterprise desktops, Windows Server and is also the only way to provide Windows 7 desktops
with free extended security updates.
1.1 Purpose
The purpose of this document is to provide detailed design and architectural guidance required to
implement a new Windows Virtual Desktops service on Azure in accordance with the HLD. The LLD
contains implementation details and options that can be used and enabled for a specific customer.
The HLD provides a high-level technical view of the service from an “outside in” perspective and
will outline all major technical decisions made for the service. The Low-Level Design(s) will
expand on this by describing the detailed configurations and settings that are required to
successfully implement these design choices.
1.2 Audience
This document is intended for Virtual Workplace engineers, architects and designers tasked with
implementing or migrating to a new solution, as well as for other Service Matter Experts (SME)
which are incorporated in the overall Virtual Workplace stack as one of its building blocks.
1.3 Scope
The scope of this document covers the following:
The following best practice documentation has been used in this blueprint:
05 May 2020
4 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
2 Hardware Layer
As all the infrastructure layer is managed by Microsoft the only real decision is what sizing of VM
to use for the Virtual machine deployment in the WVD pool(s). Virtual machines used in a WVD
deployment are subject to the subscription & quota limits here https://docs.microsoft.com/en-
us/azure/azure-subscription-service-limits.
Figure 1:
05 May 2020
5 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
Azure Value
Subscription ID
JusticeUK.onmicrosoft.com
Tenant ID
Windows Virtual Desktop
application ID
Vnet name
Vnet address space
Images Resource Group
WVD VMs Resource
Groups
Network Resource Group
WVD Tenant Name
WVD Pool Names
VM naming conventions
OU for WVD VMs
Domain Join Account
05 May 2020
6 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
Understanding user requirements, locations and concurrency will help in defining the overall
architecture of the solution.
WVD is designed to fit the BYOD model meaning any internet connected computer can connect to
the service and use a configured virtual machine as long as the user correctly authenticates.
05 May 2020
7 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
In order to help in defining the infrastructure and solutions required for managing user’s access to
the new environment, it is essential to understand how users connect to the WVD environment,
how they authenticate, where they authenticate, and the relevant authentication infrastructure
such as Active Directory, RSA and Client Certificates.
05 May 2020
8 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
05 May 2020
9 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
5.1 Personalization
The WVD Pools have been setup as personalized desktop pools. This means each user is assigned
a desktop on first launch and this desktop will be persistent. The user will connect to that same
WVD desktop each time they launch WVD, with all their customizations intact. OneDrive is
configured within the image, so users have access to their documents / desktop items etc.
5.1.1 Profiles
No windows roaming profiles are implemented in this WVD solution. The WVD machines are
persistent meaning all customizations will persistent on the VM between user logons.
5.2 Policies
Policies provide a user experience tailored to the needs of the user community. This section
provides discussion on the Active Directory policies implemented for the WVD workstations in
Azure.
Each virtual desktop is associated with a set of Active Directory policies. These policies provide
users with an expected operating environment similar to their physical devices. As the WVD OU
exists under the desktops OU all policies that apply to desktops on the estate also apply to the
WVD workstations. An additional WVD policy has been created to apply settings specifically
required for the WVD OU to include policy requirements such as RDP printing restrictions.
5.3 Printing
It has been decided that as a security measure printing or drive mapping to the local device from
the WVD workstations should not be permitted. This is controlled via an additional AD group
policy to restrict RDP drive and printing redirection.
5.4 Images
As at the time of this document creation there is only 1 master image for use in WVD. This was
created using a sequence from the existing SCCM build process to create a gen1 VM and uploaded
into Azure. It is envisaged that for standardization only 1 master image should be used in Azure
for WVD. It is possible to update the existing master image with updates etc and then create a
new image based on this.
The agreed standard for a WVD workstation in Azure is a D2hs_v3 which consists of 2vCPUs, 8GB
RAM with a max IOPS of 3200. This machine type is not publicly available yet and so does not
appear in the list of available machine types in the WVD Wizard. The storage has also been
changed from premium SSD to standard SSD.
05 May 2020
10 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
The infrastructure for the solution provides a set of common components to allow secure access
to the virtual workstations in Azure WVD. This layer is completely managed by Microsoft and as
such is outside the scope of this document
A new domain controller has been setup in Azure and a new site for the Azure subnet has been
created in AD in order to increase AD efficiency.
6.2 SCCM
SCCM will be used to manage patching on the devices and allow users to install approved
applications. In order to reduce bandwidth consumption an SCCM Server) has been provisioned
in Azure as a Management and Distribution Point. Furthermore, a new boundary group has been
created for the SCCM estate and a new boundary subnet to capture all the WVD devices. This will
mean all WVD devices will install the SCCM client from the Azure SCCM server, assign it’s
management point as the Azure SCCM server and download software updates locally in the cloud.
05 May 2020
11 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
7 System Administration
The following table details the design decisions for the service accounts for the server components
defined within the Control Layer.
05 May 2020
12 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
8 Security
This section provides information such as session timeouts, SSL certificates and anti-virus
software
05 May 2020
13 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
In all VNET subnets the following are reserved addresses from Azure:
X:X:X.0: Network address.
X:X:X.1: Reserved by Azure for the VNET router.
X:X:X.2: Reserved by Azure for gateway use
X:X:X.3: Reserved by Azure for gateway use
X:X:X.255: Network broadcast address. Azure does not support broadcast in a VNET, therefore
this address is reserved.
Network connection properties, such as IPs, DNS server IPs, should not be edited directly within
Windows VMs but in the related Azure network interface object. This is because they might get
erased during service heal when the virtual network adaptor gets replaced.
The WVD workstations will consume an IP from the vnet pool of available addresses and this
address space is provided by a DHCP service in Azure based on the vnet settings.
05 May 2020
14 of 15
Commercial in Confidence
sys_WordMark_AT
version: 1.0
document number:
Unfortunately, group membership support for accessing WVD isn’t supported in the current
version of the service. This will become a feature later in the year and in the meantime user
administration to grant access to the WVD Pool is achieved either through re-deploying the host
pool to add additional VMs or by using PowerShell commands to add additional users to existing
spare virtual desktops in the pool. These instructions will be covered in the Standard Operating
Procedures guide
05 May 2020
15 of 15