Skip to content

Commit 670dda6

Browse files
Proposed ZT additions
1 parent c4d47eb commit 670dda6

1 file changed

Lines changed: 4 additions & 1 deletion

File tree

windows-365/enterprise/security.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,14 @@ ms.collection: M365-identity-device-management
3030

3131
# Windows 365 security
3232

33-
Windows 365 provides an end-to-end connection flow for users to do their work effectively and securely. There are three different considerations when evaluating the security of your environment:
33+
Windows 365 provides an end-to-end connection flow for users to do their work effectively and securely. Windows 365 is built with [Zero Trust](/security/zero-trust/zero-trust-overview) in mind, providing the foundation for you to implement controls to better secure your environment across the 6 pillars of Zero Trust. You can implement Zero Trust controls for the following categories:
3434

3535
- Securing the access to the Cloud PC
36+
- This aligns with securing the **Identity**, where you can place additional measures on who can access the Cloud PC and under which conditions.
3637
- Securing the Cloud PC device itself
38+
- This aligns with securing the **Endpoint**, where you can place additional measures on the Cloud PC devices since that is the device being used to access organizational data.
3739
- Securing the Cloud PC data and other data available while using the Cloud PC
40+
- This aligns with securing the **Data**, where you can place additional measures on the data itself or on how the Cloud PC user access the data.
3841

3942
Take a look at the sections below to better understand the components and features available to you to secure your Cloud PC environment.
4043

0 commit comments

Comments
 (0)