- 6 minutes to read
Windows 365 provides a per-user per-month license model by hosting Cloud PCs on behalf of customers in Microsoft Azure. In this model, there’s no need to consider storage, compute infrastructure architecture, or costs. The Windows 365 architecture also lets you use your existing investments in Azure networking and security. Each Cloud PC is provisioned according to the configuration you define in the Windows 365 section of the Microsoft Endpoint Manager admin center.
Virtual network connectivity
Each Cloud PC has a virtual network interface card (NIC) in Microsoft Azure. You have two NIC management options:
- If you use Azure Active Directory (Azure AD) Join and a Microsoft hosted network, you don’t need to bring an Azure subscription or manage the NIC.
- If you bring your own network and use an Azure network connection (ANC), the NICs are created by Windows 365 in your Azure subscription.
The NICs are attached to an Azure Virtual Network based on your Azure network connection (ANC) configuration.
Windows 365 is supported in many Azure regions. You can control which Azure region is used in two ways:
- By selecting the Microsoft-hosted network and an Azure region.
- By selecting an Azure virtual network from your Azure subscription when creating an ANC.
The Azure virtual network's region determines where the Cloud PC is created and hosted.
When using your own virtual network, you can extend access between your current Azure regions to other Azure regions supported by Windows 365. To extend to other regions, you can use Azure virtual network peering or Virtual WAN.
By using your own Azure virtual network, Windows 365 lets you use Virtual Network security and routing features, including:
- Azure Network Security Groups
- User Defined Routing
- Azure Firewall
- Network virtual appliances (NVAs)
For web filtering and network protection for Cloud PCs, consider using the Network Protection and Web Protection features of Microsoft Defender for Endpoint. These features can be deployed across both physical and virtual endpoints by using the Microsoft Endpoint Manager admin center.
Microsoft Endpoint Manager integration
Microsoft Endpoint Manager is used to manage all of your Cloud PCs. Microsoft Endpoint Manager and associated Windows components have various network endpoints that must be allowed through the Virtual Network. Apple and Android endpoints may be safely ignored if you don’t use Microsoft Endpoint Manager for managing those device types.
Be sure to allow access to Windows Notification Services (WNS). You might not immediately notice an impact if access is blocked. However, WNS enables Microsoft Endpoint Manager to trigger actions on Windows endpoints immediately instead of waiting for normal policy polling intervals on those devices or policy polling at startup/logon behavior. WNS recommends direct connectivity from the Windows client to WNS.
You only need to grant access to a subset of endpoints based on your Microsoft Endpoint Manager tenant location. To find your tenant location (or Azure Scale Unit (ASU)), sign in to the Microsoft Endpoint Manager admin center, choose Tenant administration > Tenant details. Under Tenant location, you’ll see something similar to "North America 0501" or "Europe 0202". The rows in the Microsoft Endpoint Manager documentation are differentiated by geographic region. Regions are indicated by the first two letters in the names (na = North America, eu = Europe, ap = Asia Pacific). Because tenants may be relocated within a region, it’s best to allow access to an entire region rather than a specific endpoint in that region.
For more information about Microsoft Endpoint Manager service regions and data location information, see Data storage and processing in Intune.
Windows 365 uses both Microsoft Azure AD and on-premises Active Directory Domain Services (AD DS). Azure AD provides:
- User authentication for Windows 365 (as with any other Microsoft 365 service).
- Device identity services for Microsoft Endpoint Manager through Hybrid Azure AD Join or Azure AD Join.
When configuring Cloud PCs to use Hybrid Azure AD Join, AD DS provides:
- On-premises domain join for the Cloud PCs.
- User authentication for the Remote Desktop Protocol (RDP) connections.
When configuring Cloud PCs to use Azure AD Join, Azure AD provides:
- The domain join mechanism for the Cloud PCs.
- User authentication for RDP connections.
For more information on how the identity services affect the deployment, management, and usage of Cloud PCs, see identity and authentication.
Azure AD provides user authentication and authorization for both the Windows 365 web portal and for the Remote Desktop client apps. Both support modern authentication, which means Azure AD Conditional Access can be integrated to provide:
- multi-factor authentication
- location-based restrictions
- sign-in risk management
- session limits, including:
- sign-in frequency for Remote Desktop clients and the Windows 365 web portal
- cookie persistence for the Windows 365 web portal
- device compliance controls
For more information on how to use Azure AD Conditional Access with Windows 365, see Set conditional access policies.
Active Directory Domain Services
Windows 365 Cloud PCs can be either Hybrid Azure AD joined or Azure AD Joined. When using Hybrid Azure AD Join, Cloud PCs must domain join to an AD DS domain. This domain must be synchronized with Azure AD. The domain’s domain controllers may be hosted in Azure or on-premises. If hosted on-premises, connectivity must be established from Azure to the on-premises environment. The connectivity can be in the form of Azure Express Route or a site-to-site VPN. For more information on establish hybrid network connectivity, see implement a secure hybrid network. The connectivity must allow communication from the Cloud PCs to the domain controllers required by Active Directory. For more information, see Configure firewall for AD domain and trusts.
Cloud PC connectivity is provided by Azure Virtual Desktop. No inbound connections direct from the Internet are made to the Cloud PC. Instead, connections are made from:
- The Cloud PC to the Azure Virtual Desktop endpoints.
- The Remote Desktop clients to Azure Virtual Desktop endpoints.
For more information on these ports, see Azure Virtual Desktop required URL list. To ease configuration of network security controls, use Service Tags for Azure Virtual Desktop to identity those endpoints. For more information on Azure Service Tags, see Azure service tags overview.
There's no requirement to configure your Cloud PCs to make these connections. Windows 365 seamlessly integrates Azure Virtual Desktop connectivity components into gallery or custom images.
For more information on the network architecture of Azure Virtual Desktop, see Understanding Azure Virtual Desktop network connectivity.
Windows 365 Cloud PCs don't support third-party connection brokers.
"Hosted on behalf of" architecture
The "hosted on behalf of" architecture lets Microsoft services, after they’re delegated appropriate and scoped permissions to a virtual network by a subscription owner, attach hosted Azure services to a customer subscription. This connectivity model lets a Microsoft service provide software-as-a-service and user licensed services as opposed to standard consumption-based services.
The following diagrams show the logical architecture for an Azure AD Join configuration using a Microsoft hosted network, an Azure AD Join configuration using a customer's network connection ("bring your own network"), and a Hybrid Azure AD Join configuration using an ANC, respectively.
All Cloud PC connectivity is provided by the virtual network interface card. The "hosted on behalf of" architecture means that the Cloud PCs exist in the subscription owned by Microsoft. Therefore, Microsoft incurs the costs for running and managing this infrastructure.
Windows 365 manages the capacity and in-region availability in the Windows 365 subscriptions. Windows 365 determines the size and type of VM based on the license you assign to the user. Windows 365 determines the Azure region to host your Cloud PCs in based on the virtual network you select when creating an on-premises network connection.
Windows 365 aligns with Microsoft 365 data protection policies. Customer data within Microsoft's enterprise cloud services is protected by various technologies and processes:
- Various forms of encryption.
- Isolated logically from other tenants.
- Accessible to a limited, controlled, and secured set of users, from specific clients.
- Secured for access using role-based access controls.
- Replicated to multiple servers, storage endpoints, and data centers for redundancy.
- Monitored for unauthorized access, excessive resource consumption, and availability.
For more information about Windows 365 Cloud PC encryption, see Data encryption in Windows 365.
Learn about Windows 365 identity and authentication.