Summary
In this chapter, you learned how to plan for a Windows 365 deployment by using the Windows 365 advanced deployment guide and how to use the security guidelines to provide a secure environment for users to work in. You learned how local administrative rights are configured and used for Windows 365 and how EPM assists users in performing tasks that require elevated rights without assigning local administrator permission. Lastly, you learned how local IT admins or internal/external investigators can perform forensic investigations using Cloud PC restore points, either created manually or by placing a Cloud PC under review.
We will shift the focus from Windows 365 to Azure Virtual Desktop (AVD) and Azure infrastructure in the next two chapters. In these chapters, we will guide you on how to securely configure AVD and the Azure infrastructure components.