The document outlines design decisions for securing access to a customer's virtual desktop solution. Key decisions include: requiring the solution to integrate with the customer's Active Directory; using a dedicated administrative account and domain local group for virtual desktop administrators; creating a dedicated organizational unit to isolate the virtual desktop environment; and establishing trust relationships between domains to enable authentication for users across multiple forests. The design is intended to leverage the customer's existing security processes while providing sufficient access for administrators to setup and configure the virtual desktop environment.