You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Windows 365 provides an end-to-end connection flow for users to do their work effectively and securely. There are three different considerations when evaluating the security of your environment:
33
+
Windows 365 provides an end-to-end connection flow for users to do their work effectively and securely. Windows 365 is built with [Zero Trust](/security/zero-trust/zero-trust-overview) in mind, providing the foundation for you to implement controls to better secure your environment across the 6 pillars of Zero Trust. You can implement Zero Trust controls for the following categories:
34
34
35
35
- Securing the access to the Cloud PC
36
+
- This aligns with securing the **Identity**, where you can place additional measures on who can access the Cloud PC and under which conditions.
36
37
- Securing the Cloud PC device itself
38
+
- This aligns with securing the **Endpoint**, where you can place additional measures on the Cloud PC devices since that is the device being used to access organizational data.
37
39
- Securing the Cloud PC data and other data available while using the Cloud PC
40
+
- This aligns with securing the **Data**, where you can place additional measures on the data itself or on how the Cloud PC user access the data.
38
41
39
42
Take a look at the sections below to better understand the components and features available to you to secure your Cloud PC environment.
0 commit comments