Summary
In this chapter, you’ve learned how to use Microsoft Defender for Endpoint to detect and prevent threats on the desktop. You also learned how tampering, performed either manually or via malware, can be prevented and monitored. You learned how to encrypt AVD session hosts with Azure Disk Encryption, and lastly, you learned why the most common way of encrypting data is not supported or even necessary on a Cloud PC. Instead, Windows 365 relies on encryption at rest together with encryption of data in transit to keep your data safe!
We hope that you enjoyed this chapter and that you join us in the next chapter as we take a look at various topics related to access control. We will discuss everything from role-based access control and Azure Bastion to solutions such as Windows LAPS, Microsoft Entra PIM, and JIT for admins.