%systemroot%\SoftwareDistribution\DataStore.Exclude low-risk files and folders from real-time scans on single-user View virtual machines or RDSH machines.Because this type of disk is persistent, a refresh or recompose operation will not remove any viruses. Scan VMware View Composer persistent disks-formerly called user data disks (UDD)-for viruses on a regular basis.
Ensure that you keep golden images regularly updated with new antivirus software versions and signature files. Important : This actually applies to any installed software, not just antivirus software, as updates made during use of a nonpersistent desktop will be lost on logout and refresh anyway.
There is a balance between an acceptable level of security and an acceptable level of performance, and this varies from one environment to the next. However, one of the consequences of having an operating system that is fully protected from viruses is that its performance can decrease. Unless your operating system is protected from malware, you leave it open to negative and potentially destructive software infection.
Thoroughly research any product advertised on the sites before you decide to download and install it.Using antivirus software in any computing environment is a very important security consideration. Watch out for ads on the sites that may advertise products frequently classified as a PUP (Potentially Unwanted Products). The pages appear to be providing accurate, safe information. Standard Disclaimer: There are links to non-Microsoft websites. Please let me know if you need further assistance. They are more oriented with regards to this type of query and there will be IT Pros/System Admins/Server Admins/AD Admins who are available that will be able to fulfil your query. If my answer does not fulfil your desire, you can post your question at the link below.
I would suggest using a dedicated computer for that purpose rather than your home PC with all your important and personal data.
It is not fully protected and many forms of malware may break RDP connections, however, using a virtual machine is a safer way to study malware than running it on a normal machine with considering how you transfer malware to this VM.
It depends on what Virtual machine are you using as well as how to configure its network if it has access to the outside world. I will be happy to assist you in this regard.