Hi Ray German,
Thanks for posting your question in the Microsoft Q&A forum.
The most secure and practical way to allow RDP access to Azure AVD session hosts especially for testing or troubleshooting, is to use JIT VM access through Microsoft Defender for Cloud. By default, AVD doesn’t expose RDP ports to the internet because it uses a secure Reverse Connect method, so users connect safely through the AVD client.
When you do need direct RDP, JIT temporarily opens port 3389 only for a limited time and only from specific IPs. This keeps the VMs protected from constant exposure and attacks. It works in both test and production environments as long as Defender for Cloud is enabled.
Please don't forget to close up the thread here by upvoting and accept it as an answer if it is helpful