Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Windows 365

You're reading from   Mastering Windows 365 Deploy and Manage Cloud PCs and Windows 365 Link devices, Copilot with Intune, and Intune Suite

Arrow left icon
Product type Paperback
Published in Nov 2024
Publisher Packt
ISBN-13 9781836206712
Length 662 pages
Edition 2nd Edition
Arrow right icon
Authors (3):
Arrow left icon
Christiaan Brinkhoff Christiaan Brinkhoff
Author Profile Icon Christiaan Brinkhoff
Christiaan Brinkhoff
Morten Pedholt Morten Pedholt
Author Profile Icon Morten Pedholt
Morten Pedholt
Sandeep Patnaik Sandeep Patnaik
Author Profile Icon Sandeep Patnaik
Sandeep Patnaik
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Introduction 2. Architecture FREE CHAPTER 3. Deploying Cloud PCs 4. Managing Cloud PCs 5. Intune Suite: Optimize and Secure Your Cloud PC Deployment 6. Application Management and Delivery to Cloud PCs 7. Managing Cloud PCs with Security Copilot 8. Accessing Cloud PCs 9. Securing Cloud PCs 10. Windows 365 Link 11. Analyzing, Monitoring, and Troubleshooting Cloud PCs 12. Windows 365 Partner Solutions 13. Community Experts Hall of Fame 14. Index

Operating system and security

On the software side, Microsoft has developed a minimalist operating system, including only the components required to connect to Windows 365. For example, this endpoint does not need the entire Windows 11 shell or the UWP or Win32 runtimes since no apps run locally on the device. The apps and data are stored in the Microsoft Cloud and are accessible via the Windows 365 service.

Security first

Security is a top priority at Microsoft, and Windows 365 Link is no exception. The device is secure-by-default with discrete TPM, Secure Boot, VBS, HVCI, BitLocker, and security baselines enabled out of the box. It has a strict integrity policy, ensuring it can only run the intended code, giving it a high-security posture. Additionally, there is no way to install local apps, store local data, or have local users with administrative rights.

A computer device with text above it

Figure 10.10: Security layers

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image