Skip to content

Commit a3dbbb5

Browse files
authored
Merge pull request #8046 from ChristianMontoya/security
New "Security" concept article for Windows 365
2 parents 12db676 + 670dda6 commit a3dbbb5

2 files changed

Lines changed: 100 additions & 2 deletions

File tree

windows-365/enterprise/TOC.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,12 @@ items:
2929
href: customer-permissions.md
3030
- name: Device configuration with MEM
3131
href: device-configuration.md
32-
- name: Encryption
33-
href: encryption.md
32+
- name: Security
33+
items:
34+
- name: Windows 365 security
35+
href: security.md
36+
- name: Encryption
37+
href: encryption.md
3438
- name: Privacy and personal data
3539
href: privacy-personal-data.md
3640
- name: How-to guides

windows-365/enterprise/security.md

Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
---
2+
# required metadata
3+
title: Overview of security concepts in Windows 365
4+
titleSuffix:
5+
description: Learn about security concepts in Windows 365.
6+
keywords:
7+
author: ErikjeMS
8+
ms.author: erikje
9+
manager: dougeby
10+
ms.date: 07/20/2022
11+
ms.topic: overview
12+
ms.service: cloudpc
13+
ms.subservice:
14+
ms.localizationpriority: high
15+
ms.technology:
16+
ms.assetid:
17+
18+
# optional metadata
19+
20+
#ROBOTS:
21+
#audience:
22+
23+
ms.reviewer: chrimo
24+
ms.suite: ems
25+
search.appverid:
26+
#ms.tgt_pltfrm:
27+
ms.custom: intune-azure; get-started
28+
ms.collection: M365-identity-device-management
29+
---
30+
31+
# Windows 365 security
32+
33+
Windows 365 provides an end-to-end connection flow for users to do their work effectively and securely. Windows 365 is built with [Zero Trust](/security/zero-trust/zero-trust-overview) in mind, providing the foundation for you to implement controls to better secure your environment across the 6 pillars of Zero Trust. You can implement Zero Trust controls for the following categories:
34+
35+
- Securing the access to the Cloud PC
36+
- This aligns with securing the **Identity**, where you can place additional measures on who can access the Cloud PC and under which conditions.
37+
- Securing the Cloud PC device itself
38+
- This aligns with securing the **Endpoint**, where you can place additional measures on the Cloud PC devices since that is the device being used to access organizational data.
39+
- Securing the Cloud PC data and other data available while using the Cloud PC
40+
- This aligns with securing the **Data**, where you can place additional measures on the data itself or on how the Cloud PC user access the data.
41+
42+
Take a look at the sections below to better understand the components and features available to you to secure your Cloud PC environment.
43+
44+
## Secure Cloud PC access
45+
46+
The first consideration for securing your environment is to secure access to the Cloud PC.
47+
48+
As described in [identity and authentication](/windows-365/enterprise/identity-authentication#authentication), there are two authentication challenges to access the Cloud PC:
49+
50+
- The Windows 365 service.
51+
- The Cloud PC.
52+
53+
The primary control for securing access is by using Azure Active Directory (Azure AD) Conditional Access to conditionally grant access to the Windows 365 service. To secure access to the Cloud PC, see [set conditional access policies](/windows-365/enterprise/set-conditional-access-policies).
54+
55+
## Secure Cloud PC devices
56+
57+
The second consideration for securing your environment is to secure the Cloud PC device itself.
58+
59+
### Security features enabled by default
60+
61+
All new Cloud PCs have the following security components enabled by default:
62+
63+
- **vTPM**: Short for virtual Trusted Platform Module, a vTPM provides Cloud PCs their own dedicate TPM instance that acts as a secure vault for keys and measurements. For more information, see [vTPM](/azure/virtual-machines/trusted-launch#vtpm).
64+
- **Secure Boot**: Secure Boot is a feature that will prevent the Windows operating system from booting if untrusted rootkits or boot kits are installed on the machine. For more information, see [secure boot](/azure/virtual-machines/trusted-launch#secure-boot).
65+
66+
With both security components enabled, Windows 365 supports enabling the following Windows security features:
67+
68+
- Hypervisor Code Integrity (HVCI)
69+
- [Microsoft Defender Credential Guard](/windows/security/identity-protection/credential-guard/credential-guard-manage)
70+
71+
### Security features requiring specific Cloud PC SKUs or configuration
72+
73+
The following security components are enabled by default on specific Cloud PC SKUs or configurations:
74+
75+
- **Virtualization-based workloads**
76+
- **Description**: Virtualization-based workloads typically require the Windows device to enable the Hyper-V feature and run the workloads in an isolated space, to protect the Windows OS from any security threats.
77+
- **Security features supported**:
78+
- [Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview)
79+
- [Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview)
80+
- **Required configuration**: Cloud PC must have 8 vCPU and 32 GB RAM. See [set up virtualization-based workloads support](nested-virtualization.md#requirements) for more information.
81+
82+
## Secure Cloud PC data
83+
84+
The third consideration for securing your environment is to secure the Cloud PC data and other data that is made available by using the Cloud PC.
85+
86+
### Security of Cloud PC data
87+
88+
The data of the Cloud PC data itself is secured through encryption. For more details, see [data encryption in Windows 365](/windows-365/enterprise/encryption).
89+
90+
### Security of data available on the Cloud PC
91+
92+
Securing the data available to users on their Cloud PCs should be no different than securing the data available to users on work-assigned Windows PCs, with the caveat that the Cloud PC is being accessed through Remote Desktop Protocol (RDP).
93+
94+
To manage RDP features available to the user during their Cloud PC connection, see [manage RDP device redirections for Cloud PCs](/windows-365/enterprise/manage-rdp-device-redirections).

0 commit comments

Comments
 (0)