KTL’s Virtual Desktop Infrastructure (VDI) solution utilizes Azure cloud to empower businesses to achieve improved security, compliance, enhanced mobility and flexibility.
Whether you are ready to move your entire IT infrastructure to the cloud, or you require a hybrid infrastructure combining on prem and cloud native solutions, there’s no denying that moving to the cloud offers many benefits. KTL’s Virtual Desktop Infrastructure (VDI) solution utilizes Azure cloud to empower businesses to achieve improved security, compliance, enhanced mobility and flexibility as well as a more streamlined IT infrastructure. KTL will configure and implement Office 365, Enterprise Mobility & Security, and Windows 10 Enterprise features in a Virtual Desktop Infrastructure (VDI) in Azure cloud and configure Azure Sentinel services.
Services included in KTL’s VDI:
Deployment of Azure Active Directory Domain Services.
Deployment and configuration of Azure Virtual Desktops.
Deployment of a next gen network security appliance to protect devices within the enclave.
Configuration of routing and access control lists to limit connectivity to required services only.
Configuration of conditional access policies.
Deployment and configuration of Azure Sentinel.
Configuration of up to five Azure Sentinel analytic rules.
Configuration of up to five Azure Information Protection (AIP) labels.
Deployment of Microsoft Defender for Endpoint on supported systems within the environment.
Configuration of Microsoft Defender for Office 365 following industry and vendor best practices.
Configuration of backups for user data within Office 365 and Azure.
Configuration of Azure AD Privilege Identity Management features (for Azure AD P2 licenses).
Configuration of Office 365 B2B features.
Configuration of Azure AD user settings following industry and vendor security best practices.
Set up of VDI for users in Azure cloud.
Determining and Configuration of Required Compliance Policies.
Determining and Configuration of Required and Supportable Configuration Policies.
Configuration of Conditional Access Policies.
Configuration of Exchange DLP Rules