{"id":7712,"date":"2022-06-07T00:00:00","date_gmt":"2022-06-07T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/virtual-desktop-infrastructure-security-best-practices"},"modified":"2025-06-13T04:39:36","modified_gmt":"2025-06-13T11:39:36","slug":"virtual-desktop-infrastructure-security-best-practices","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/","title":{"rendered":"Virtual desktop infrastructure security best practices"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">It\u2019s no longer a matter of organizations deciding whether to embrace remote and hybrid work but finding the best way to do so. A recent study showed most employees are happier having the option to work from home, and <a href=\"https:\/\/news.microsoft.com\/wp-content\/wp-content\/uploads\/sites\/631\/2022\/03\/WTI_AnnualReport_Extended_.pdf?msclkid=7a287ebeb51e11ec85264a53e7f9e81e\" target=\"_blank\" rel=\"noopener\">80 percent say they\u2019re as productive or more productive<\/a> when they do. One of the most popular options for organizations who want to offer remote work options is virtual desktop infrastructure or VDI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-vdi\">What is VDI?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/overview\/what-is-virtual-desktop-infrastructure-vdi\/\" target=\"_blank\" rel=\"noopener\">Virtual desktop infrastructure (VDI)<\/a> is an IT infrastructure that virtualizes desktops\u2014to give employees access to enterprise data and applications from anywhere and from most personal and professional devices. Organizations host applications and data on servers, and through VDI, enable their employees to work remotely via remote desktops. VDI is popular for enabling remote work because, with the right configuration, it\u2019s highly secure and relatively inexpensive compared to on-premises options.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-are-some-of-the-security-benefits-of-cloud-based-vdi-migration\">What are some of the security benefits of cloud-based VDI migration?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Migrating to a cloud-based VDI solution allows organizations to take advantage of built-in security features that mitigate and eliminate the risks associated with traditional desktop virtualization. <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/virtual-desktop\/\">Azure Virtual Desktop<\/a> in combination with the Azure public cloud, for example, offers comprehensive security features, like Azure Sentinel and Microsoft Defender for Endpoint, that are built-in before deployment. This helps enable an organization to follow critical VDI security best practices from the start of their virtualization journey.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-are-some-vdi-security-best-practices\">What are some VDI security best practices?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Conditional access<\/strong> applies access controls based on signals like group membership, type of device, and IP address to enforce policies.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Multifactor authentication<\/strong> requires that users consistently verify their identities to access sensitive data.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Audit logs<\/strong> are used to gain insight into user and admin activities.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Endpoint security<\/strong> like Microsoft Defender for Endpoints offers built-in protection against malware and other advanced threats for all your endpoints.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Application restriction<\/strong> mitigates security threats by limiting what applications certain users are allowed to access using software like Windows Defender Application Control.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Following these VDI security practices helps organizations secure user identities, data, and access to their VDI. They\u2019re the reason a comprehensive VDI solution, like Azure Virtual Desktop, doesn\u2019t just mitigate security risks associated with virtualization, but increases overall security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Of course, there are numerous factors and potential issues for an organization to consider in choosing to implement a VDI solution. Most of these issues stem from hosting virtual desktops on-premises, as traditional VDIs do.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-are-some-concerns-for-an-organization-considering-a-traditional-vdi\">What are some concerns for an organization considering a traditional VDI?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">First, there\u2019s the<strong> cost<\/strong>. Traditionally, implementing VDI is an involved, complicated process. It often requires employees with specialized roles to deploy, manage, and scale an organization\u2019s VDI as needed. Cloud-based VDI solutions like Azure Virtual Desktop are managed and scaled by the cloud VDI solution provider themselves, which lowers cost considerably.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Second and most importantly, there are the <strong>security<\/strong> concerns that come with adopting a hybrid model through traditional VDI. After the deployment of a VDI, IT managers must consider the security of home and corporate networks when developing security protocols. Employees using different types of devices to access data also opens networks to new vulnerabilities, as these new devices can be more vulnerable to cyberattacks. Most of these vulnerabilities are eliminated when you use a cloud-based VDI with built-in security features and endpoint protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-do-you-choose-a-secure-vdi-for-your-organization\">How do you choose a secure VDI for your organization?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Meeting these implementation and security challenges often poses a barrier to organizations fully embracing a hybrid work model. IT decision makers must consider the challenges along with the benefits of enabling remote work when choosing a VDI solution for their organization. Adopting a comprehensive, cloud-based virtual desktop solution, like Azure Virtual Desktop, mitigates and eliminates many of these security concerns.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Also referred to as desktop-as-a-service, cloud-based VDI solutions host their virtual desktops on the cloud using a subscription model instead of on-premises, locally operated and maintained servers. Not only does this lower the cost and time of implementing VDI by decreasing the amount of labor needed to maintain it, it also ensures that the cloud-based virtual desktop solution provider shares responsibility with its customers for security. With the right provider, this can prove to be an enormous benefit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To explore the possibility of implementing <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/virtual-desktop\/\">Azure Virtual Desktop<\/a> at your organization, read the 17-page e-book, <a href=\"https:\/\/azure.microsoft.com\/resources\/delivering-secure-remote-and-hybrid-work-with-azure-virtual-desktop\/\" target=\"_blank\" rel=\"noopener\">Delivering Secure Remote and Hybrid Work with Azure Virtual Desktop<\/a>, to learn more about how to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Increase your end-to-end security through VDI migration.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Implement and maintain VDI security best practices.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Scale resources on demand for your employees without the limitations of on-premises data centers using Azure Virtual Desktop.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Lower your costs by running multiple virtual desktop user sessions on a single virtual machine.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>One of the most popular options for organizations who want to offer remote work options is virtual desktop infrastructure or VDI. In this blog, get an overview of VDI and learn security best practices.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1467],"tags":[],"audience":[3053,3056],"content-type":[1481],"product":[1607],"tech-community":[],"topic":[],"coauthors":[1768],"class_list":["post-7712","post","type-post","status-publish","format-standard","hentry","category-compute","audience-it-decision-makers","audience-it-implementors","content-type-thought-leadership","product-azure-virtual-desktop","review-flag-anywh-1680286580-635","review-flag-new-1680286579-546","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Virtual desktop infrastructure security best practices | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"One of the most popular options for organizations who want to offer remote work options is virtual desktop infrastructure or VDI. In this blog, get an overview of VDI and learn security best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Virtual desktop infrastructure security best practices | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"One of the most popular options for organizations who want to offer remote work options is virtual desktop infrastructure or VDI. In this blog, get an overview of VDI and learn security best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-07T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-13T11:39:36+00:00\" \/>\n<meta name=\"author\" content=\"Tom Hickling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Hickling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/tom-hickling\/\",\"@type\":\"Person\",\"@name\":\"Tom Hickling\"}],\"headline\":\"Virtual desktop infrastructure security best practices\",\"datePublished\":\"2022-06-07T00:00:00+00:00\",\"dateModified\":\"2025-06-13T11:39:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/\"},\"wordCount\":785,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"articleSection\":[\"Compute\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/\",\"name\":\"Virtual desktop infrastructure security best practices | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"datePublished\":\"2022-06-07T00:00:00+00:00\",\"dateModified\":\"2025-06-13T11:39:36+00:00\",\"description\":\"One of the most popular options for organizations who want to offer remote work options is virtual desktop infrastructure or VDI. In this blog, get an overview of VDI and learn security best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compute\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/compute\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Virtual desktop infrastructure security best practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Virtual desktop infrastructure security best practices | Microsoft Azure Blog","description":"One of the most popular options for organizations who want to offer remote work options is virtual desktop infrastructure or VDI. In this blog, get an overview of VDI and learn security best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Virtual desktop infrastructure security best practices | Microsoft Azure Blog","og_description":"One of the most popular options for organizations who want to offer remote work options is virtual desktop infrastructure or VDI. In this blog, get an overview of VDI and learn security best practices.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2022-06-07T00:00:00+00:00","article_modified_time":"2025-06-13T11:39:36+00:00","author":"Tom Hickling","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Tom Hickling","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/tom-hickling\/","@type":"Person","@name":"Tom Hickling"}],"headline":"Virtual desktop infrastructure security best practices","datePublished":"2022-06-07T00:00:00+00:00","dateModified":"2025-06-13T11:39:36+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/"},"wordCount":785,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"articleSection":["Compute"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/","name":"Virtual desktop infrastructure security best practices | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"datePublished":"2022-06-07T00:00:00+00:00","dateModified":"2025-06-13T11:39:36+00:00","description":"One of the most popular options for organizations who want to offer remote work options is virtual desktop infrastructure or VDI. In this blog, get an overview of VDI and learn security best practices.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/virtual-desktop-infrastructure-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Compute","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/compute\/"},{"@type":"ListItem","position":3,"name":"Virtual desktop infrastructure security best practices"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=7712"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7712\/revisions"}],"predecessor-version":[{"id":41778,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/7712\/revisions\/41778"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=7712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=7712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=7712"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=7712"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=7712"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=7712"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=7712"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=7712"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=7712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}