Windows 365 coordinates and manages the lifecycles of all your Cloud PCs. Because Cloud PCs exist only in the cloud, managing Cloud PC lifecycles is easier than managing physical Windows device lifecycles. Cloud PCs never leave the manageability and security inherently provided by the cloud.
The Cloud PC lifecycle has five stages:
Provision
Windows 365 gives you an optimized experience for deploying your Cloud PCs. The admin experience for setting up your deployment is integrated into the Microsoft Intune admin center. Cloud PCs are provisioned in the Windows 365 service, connected to Azure, joined to your Microsoft Entra ID, and enrolled into Microsoft Intune.
By assigning a Windows 365 license to a user and adding them to a group targeted with a provisioning policy, you trigger automatic provisioning of the user’s Cloud PC.
Each Cloud PC is created using an operating system image. Windows 365 includes a gallery of default images that provide a remote connection experience optimized for both Windows and Microsoft 365. You can also upload your own custom images and Windows 365 will perform some of the optimizations for you.
Windows 365 also has monitoring infrastructure and synthetic provisioning tests built into Azure network connections. These tests run regularly to test your networking and other prerequisites. These tests help minimize provisioning failures due to environmental issues and helps you resolve those issues quicker.
Configure
Cloud PCs need to be configured and secured, just like any other endpoint in your environment. To make this configuration seamless, as part of provisioning, every Windows 365 Cloud PC is either:
After being joined, Cloud PCs are enrolled into Microsoft Intune. This enrollment means that every Cloud PC is instantly ready for Microsoft Entra Conditional Access and management through Microsoft Intune, including co-management if needed.
Microsoft Intune helps you to validate that your Cloud PCs are compliant by using compliance policies. Windows 365 also provides an optimized security baseline for Cloud PCs. This optional baseline helps you make sure that your Cloud PCs are securely configured with minimal overhead. These baselines have been optimized to ensure that remote connectivity isn't impacted.
Protect
Windows 365 integrates with the rest of Microsoft 365 to make sure that you can secure your Cloud PCs. You can use Microsoft Intune’s integration with Microsoft Defender for Endpoint to protect your Cloud PCs from the moment that they’re provisioned. This protection includes using the endpoint detection and response capabilities of Microsoft Defender for Endpoint to determine device risk.
Windows 365 can also be protected by Microsoft Entra Conditional Access. This protection includes optionally excluding Windows 365 itself from device compliance policies to ensure that your end users can access their Cloud PCs from any device. You can still use multi-factor authentication, sign-in risk, and other controls to ensure that the user is securely authenticated.
Windows 365 uses the Windows Update auto-scan ability to install the latest quality updates. To make sure that updates are installed promptly, the end user should sign in to the newly provisioned Cloud PC as soon as possible.
You can also disable clipboard and drive redirection to ensure a foundation of data loss prevention. Disabling prevents users from:
Copy/pasting information from their Cloud PCs to other unmanaged locations.
Saving files to their personal devices from Cloud PCs.
Monitor
A key requirement of Cloud PCs is making sure that the virtual hardware is the right size for the needs of the end user. Windows 365 integrates with the Endpoint analytics in Microsoft Productivity Score. Endpoint analytics provide measurement of the compute and memory load on your Cloud PCs. You can then use Windows 365 to resize those Cloud PCs to match the demands of your users and their apps. This resize action is surfaced in Microsoft Intune along with other device actions to provide a seamless experience between your Cloud PCs and other endpoints.
You can also use Remediation in Endpoint analytics to improve Cloud PC monitoring and remediation. Remediation lets you extend the built-in Microsoft 365 optimizations that Windows 365 provides, including optimizations for a heterogenous IT environment.
Deprovision
There are a couple ways to securely remove a user’s access to their Cloud PC. If you remove the user’s license or targeted provisioning policy, their Cloud PC is moved into a seven-day grace period. This grace period allows for errors and reinstatement without affecting the user. To block access immediately, disable the user account in on-premises Active Directory and revoke the user’s refresh tokens in Microsoft Entra ID.
After the grace period expires, Windows 365 deprovisions the Cloud PC and its storage completely. The Cloud PCs are encrypted using server-side encryption in Azure Disk Storage (platform-managed keys) so that devices are deprovisioned securely.
This module covers the deployment, provisioning, and imaging options available for each edition of Windows 365. It also covers the Windows 365 Boot feature that enables users to sign-in directly to their Cloud PC.
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.