Summary
In this chapter, you learned about the more common use cases for Windows 365. You learned how Windows 365 can be used to simplify a VDI infrastructure and how it can replace an on-premise VDI. You learned how Windows 365 is able to deploy secure desktops to a remote workforce or contractors and how it can deploy highly secure Cloud PCs to privileged accounts, protecting against attackers by implementing a PAW strategy. You also learned how Windows 365 Boot transforms a Windows 11 device so that it can only be used to sign into a Cloud PC, without storing any data on the device itself. Lastly, you learned how to use a Conditional Access policy to easily restrict access to Office 365 services so that they can only be accessed from a Cloud PC.
This concludes the chapter about Windows 365 use cases. In the next chapter, we will continue our journey by exploring several Azure Virtual Desktop use cases.