Summary
In this chapter, we covered the BYOD and CYOD scenarios, key considerations for deciding which types of devices can be used by your users, and the risks and benefits of each option. Whether you enforce MDM to manage external devices or opt for a MAM-only option, there are plenty of choices for providing access and governance to resources. We also looked at alternative EUC solutions and storage sync options.
In the next chapter, we will explore the new hardware and software-based security options available in Windows 11.