Windows Virtual Desktop Officially Announced – My Take

This week at Ignite, Microsoft is announcing the introduction of Windows Virtual Desktop, a multi-user version of Windows 10 Enterprise that is deployable in Azure. Please see their blog post here about it.

I will have much more to say about this in future blog posts, but coupled with their heavy investments in “Remote Desktop Modern Infrastructure” (a.k.a RDmi for short) where RDS roles like the Connection Broker, Web Access, and Gateway are now simply PaaS components in Azure, this is going to upend the EUC/virtualization industry in an extreme way. The downward cost pressure Microsoft will place on user desktop and app hosting with this play will be tremendous. In the future at this blog and in webinars we host, we will analyze Windows Virtual Desktop licensing (with RDmi and compute costs factored in) versus traditional on-premise or datacenter-based Remote Desktop Services hosting on Server 2016/2019.

At first glance, I don’t think Windows Virtual Desktop will be good for Citrix, and I certainly think it will threaten Amazon’s DaaS offering. It’s also probably going to put a good swath of non-Azure based MSPs and CSPs out of business. I could be wrong, of course, but that’s my read on it right now.

Fortunately for our customers, we will be Windows Virtual Desktop ready in Q1 2019, and will be able to monitor multi-user Windows 10 instances just like Windows Server RDS session hosts. We look forward to continue to serving the Remote Desktop Services management and monitoring needs of all organizations, whether they run Windows Server or Windows 10 on premise, in the datacenter, or in Azure.

New Free RDS Log Viewer Tool Released!

UPDATE October 2018: We just released Version 2.0 of the RDS Log Viewer. Click here to read more details on the new Remote Desktop Gateway features and to get the download link.

For those who may have missed it, RDPSoft released a new FREE RDS Log Viewer tool at the end of March.

RDSLogViewer

This tool (currently in beta) displays both logon failures and successful logons from RDS session hosts. It has many features to assist you in finding the user account of an logon failure and then locating the attacker’s source IP, including:

-displaying traditional “security log only” RDS failures when the Security Layer is RDP
-correlating logon failures with NLA when the Security Layer is TLS/SSL

In addition, there are other features such as:

-showing all successful RDS authentifications
-the ability to export the results to comma-delimited text
-the ability to geolocate the attacker’s IP address

You can read more and download the tool for FREE HERE