Summary
In this chapter, you learned how to determine which cloud-based update management solution from Microsoft best fits the needs of your company and how to implement and use these solutions. You also learned how to create your own custom images and how they can be used to install the newest updates.
In the next chapter, we will continue our journey as we take a look at threat detection and prevention. We will discuss topics such as Microsoft Defender for Endpoint, how to use tamper protection, and how disk encryption works for Windows 365 and Azure Virtual Desktop. Did you know that it actually works differently for each solution?