Security guidelines for Windows 365
While the Windows 365 advanced deployment guide is meant to assist IT admins with presenting design questions, the security guidelines should be interpreted as best practices for companies who are implementing Windows 365. Currently, there are six guidelines to improve security for Windows 365:
- Apply Conditional Access policies:
- Conditional access policies are used to control access to devices and apps by requiring MFA, for example.
- Use Microsoft Defender for Endpoint:
- Microsoft Defender for Endpoint is an enterprise-class solution to detect and prevent malware, for example. By enrolling in Microsoft Defender for Endpoint, IT admins make sure that Cloud PCs are safe while in use by end users.
- Use compliance policies with Conditional Access policies in Microsoft Intune:
- Compliance policies are a collection of settings requirements that a Cloud PC needs to meet. If a Cloud PC fails to meet these requirements, it will be considered non...