[{"data":1,"prerenderedAt":1641},["Reactive",2],{"surroundBlogs":3,"content-query-ND0X8aqXbE":10,"content-query-WZfvBznF07":293},[4,7],{"_path":5,"title":6},"/blog/app-v-to-msix-planning-before-2026","Navigating the Transition from App-V to MSIX",{"_path":8,"title":9},"/blog/msix-flexible-virtualization-on-windows-11","Strategic Modernization: Using Flexible Virtualization in MSIX",{"_path":11,"_dir":12,"_draft":13,"_partial":13,"_locale":14,"title":15,"description":16,"date":17,"categories":18,"tags":22,"image":26,"author":14,"body":27,"_type":288,"_id":289,"_source":290,"_file":291,"_extension":292},"/blog/the-architectural-case-for-msix","blog",false,"","Modernizing the Enterprise Desktop: The Architectural Case for MSIX","MSIX matters because it separates app identity and app state from traditional installer sprawl.","2026-02-10",[19,20,21],"euc-enduser-computing","microsoft","application-management",[23,24,21,25],"msix","packaging","windows","/images/blog/2025-2026/msix-architectural-case.jpg",{"type":28,"children":29,"toc":278},"root",[30,39,45,50,57,62,67,73,86,91,116,121,127,133,138,143,156,161,166,172,177,200,205,210,216,221,226,232,237,243],{"type":31,"tag":32,"props":33,"children":34},"element","p",{},[35],{"type":31,"tag":36,"props":37,"children":38},"img",{"alt":14,"src":26},[],{"type":31,"tag":32,"props":40,"children":41},{},[42],{"type":43,"value":44},"text","MSIX is not important just because it is newer than MSI or App-V. It matters because it gives Windows applications a cleaner contract with the operating system.",{"type":31,"tag":32,"props":46,"children":47},{},[48],{"type":43,"value":49},"That is the real architectural value.",{"type":31,"tag":51,"props":52,"children":54},"h2",{"id":53},"start-with-package-identity",[55],{"type":43,"value":56},"Start with package identity",{"type":31,"tag":32,"props":58,"children":59},{},[60],{"type":43,"value":61},"At the center of MSIX is package identity. Once an application is packaged, Windows can identify it consistently by name, publisher, and version. That enables reliable installation, update behavior, clean removal, and access to platform capabilities that depend on package identity.",{"type":31,"tag":32,"props":63,"children":64},{},[65],{"type":43,"value":66},"This is a significant improvement over the traditional sprawl of installer-driven state where files, registry keys, shell changes, and dependencies can be written all over the machine.",{"type":31,"tag":51,"props":68,"children":70},{"id":69},"what-the-container-model-actually-does",[71],{"type":43,"value":72},"What the container model actually does",{"type":31,"tag":32,"props":74,"children":75},{},[76,78,84],{"type":43,"value":77},"MSIX uses a lightweight containerization model. That does ",{"type":31,"tag":79,"props":80,"children":81},"strong",{},[82],{"type":43,"value":83},"not",{"type":43,"value":85}," mean every packaged app runs inside a separate virtual machine or a perfect sandbox. It means Windows controls how the package is installed and how certain file system and registry operations are virtualized at runtime.",{"type":31,"tag":32,"props":87,"children":88},{},[89],{"type":43,"value":90},"In practice, that gives you a few major benefits:",{"type":31,"tag":92,"props":93,"children":94},"ul",{},[95,101,106,111],{"type":31,"tag":96,"props":97,"children":98},"li",{},[99],{"type":43,"value":100},"App binaries are treated as read-only package content.",{"type":31,"tag":96,"props":102,"children":103},{},[104],{"type":43,"value":105},"App state is separated from app installation files.",{"type":31,"tag":96,"props":107,"children":108},{},[109],{"type":43,"value":110},"Uninstall is cleaner and more predictable.",{"type":31,"tag":96,"props":112,"children":113},{},[114],{"type":43,"value":115},"Updates are more reliable because they replace package content atomically.",{"type":31,"tag":32,"props":117,"children":118},{},[119],{"type":43,"value":120},"This is why MSIX tends to feel operationally cleaner than older installer models.",{"type":31,"tag":36,"props":122,"children":126},{"src":123,"alt":124,"width":125},"/images/blog/2025-2026/msix-architectural-case/architecture.jpg","MSIX architecture diagram.","50%",[],{"type":31,"tag":51,"props":128,"children":130},{"id":129},"isolation-is-real-but-not-absolute",[131],{"type":43,"value":132},"Isolation is real, but not absolute",{"type":31,"tag":32,"props":134,"children":135},{},[136],{"type":43,"value":137},"One source of confusion is that \"containerized\" often gets interpreted as \"fully isolated.\" That is not always true.",{"type":31,"tag":32,"props":139,"children":140},{},[141],{"type":43,"value":142},"Microsoft documents two trust models:",{"type":31,"tag":92,"props":144,"children":145},{},[146,151],{"type":31,"tag":96,"props":147,"children":148},{},[149],{"type":43,"value":150},"Full trust packaged desktop apps.",{"type":31,"tag":96,"props":152,"children":153},{},[154],{"type":43,"value":155},"AppContainer apps with stricter isolation.",{"type":31,"tag":32,"props":157,"children":158},{},[159],{"type":43,"value":160},"Most converted Win32 applications are full trust packaged apps. They benefit from package identity and parts of the containerization model, but they are not equivalent to highly restricted AppContainer applications.",{"type":31,"tag":32,"props":162,"children":163},{},[164],{"type":43,"value":165},"That distinction matters when people oversell MSIX as a universal security boundary.",{"type":31,"tag":51,"props":167,"children":169},{"id":168},"why-enterprise-teams-should-care",[170],{"type":43,"value":171},"Why enterprise teams should care",{"type":31,"tag":32,"props":173,"children":174},{},[175],{"type":43,"value":176},"For enterprise application management, MSIX is attractive because it reduces platform mess:",{"type":31,"tag":92,"props":178,"children":179},{},[180,185,190,195],{"type":31,"tag":96,"props":181,"children":182},{},[183],{"type":43,"value":184},"Cleaner uninstall behavior.",{"type":31,"tag":96,"props":186,"children":187},{},[188],{"type":43,"value":189},"Better state separation.",{"type":31,"tag":96,"props":191,"children":192},{},[193],{"type":43,"value":194},"Easier packaging consistency.",{"type":31,"tag":96,"props":196,"children":197},{},[198],{"type":43,"value":199},"Better fit for modern deployment tools.",{"type":31,"tag":32,"props":201,"children":202},{},[203],{"type":43,"value":204},"That is especially useful in environments trying to reduce image complexity, modernize app delivery, and cut down on the operational drag of traditional Win32 installer behavior.",{"type":31,"tag":36,"props":206,"children":209},{"src":207,"alt":208,"width":125},"/images/blog/2025-2026/msix-architectural-case/infographic.jpg","MSIX value infographic.",[],{"type":31,"tag":51,"props":211,"children":213},{"id":212},"the-pragmatic-view",[214],{"type":43,"value":215},"The pragmatic view",{"type":31,"tag":32,"props":217,"children":218},{},[219],{"type":43,"value":220},"MSIX is not the answer for every application. Some apps still need remediation work, and some are better left in other deployment models. But when an application fits, MSIX improves the integrity of the desktop platform by making installation and runtime behavior more predictable.",{"type":31,"tag":32,"props":222,"children":223},{},[224],{"type":43,"value":225},"That is why the architectural case is stronger than the marketing case. The value is not novelty. The value is control.",{"type":31,"tag":51,"props":227,"children":229},{"id":228},"bottom-line",[230],{"type":43,"value":231},"Bottom line",{"type":31,"tag":32,"props":233,"children":234},{},[235],{"type":43,"value":236},"MSIX gives enterprise teams a more disciplined packaging model by combining package identity, cleaner state management, and more reliable install and uninstall behavior. That makes it a strong foundation for modern Windows application delivery, provided you stay realistic about compatibility and trust boundaries.",{"type":31,"tag":51,"props":238,"children":240},{"id":239},"references",[241],{"type":43,"value":242},"References",{"type":31,"tag":92,"props":244,"children":245},{},[246,258,268],{"type":31,"tag":96,"props":247,"children":248},{},[249],{"type":31,"tag":250,"props":251,"children":255},"a",{"href":252,"rel":253},"https://learn.microsoft.com/en-us/windows/msix/overview",[254],"nofollow",[256],{"type":43,"value":257},"What is MSIX?",{"type":31,"tag":96,"props":259,"children":260},{},[261],{"type":31,"tag":250,"props":262,"children":265},{"href":263,"rel":264},"https://learn.microsoft.com/en-us/windows/msix/msix-containerization-overview",[254],[266],{"type":43,"value":267},"MSIX containerization overview",{"type":31,"tag":96,"props":269,"children":270},{},[271],{"type":31,"tag":250,"props":272,"children":275},{"href":273,"rel":274},"https://learn.microsoft.com/en-us/windows/apps/package-and-deploy/packaging/",[254],[276],{"type":43,"value":277},"Packaging overview for Windows apps",{"title":14,"searchDepth":279,"depth":279,"links":280},2,[281,282,283,284,285,286,287],{"id":53,"depth":279,"text":56},{"id":69,"depth":279,"text":72},{"id":129,"depth":279,"text":132},{"id":168,"depth":279,"text":171},{"id":212,"depth":279,"text":215},{"id":228,"depth":279,"text":231},{"id":239,"depth":279,"text":242},"markdown","content:blog:the-architectural-case-for-msix.md","content","blog/the-architectural-case-for-msix.md","md",[294,629,987,1335],{"_path":295,"_dir":12,"_draft":13,"_partial":13,"_locale":14,"title":296,"description":297,"date":298,"categories":299,"tags":301,"image":307,"author":14,"body":308,"_type":288,"_id":627,"_source":290,"_file":628,"_extension":292},"/blog/stop-choosing-between-avd-and-windows-365-based-on-licensing","Stop Choosing Between AVD and Windows 365 Based on Licensing","AVD and Windows 365 solve different operating-model problems, so licensing should never be the first decision criterion.","2026-05-05",[19,20,300],"avd",[302,303,304,305,306],"azure-virtual-desktop","windows-365","frontline","cloud-pc","fslogix","/images/blog/2025-2026/avd-vs-windows-365-licensing.jpg",{"type":28,"children":309,"toc":619},[310,316,321,326,332,337,342,347,352,365,370,376,381,386,391,396,401,407,412,435,440,463,468,474,479,484,489,494,512,518,523,547,552,556],{"type":31,"tag":32,"props":311,"children":312},{},[313],{"type":31,"tag":36,"props":314,"children":315},{"alt":14,"src":307},[],{"type":31,"tag":32,"props":317,"children":318},{},[319],{"type":43,"value":320},"Licensing is rarely the most important factor in a cloud desktop strategy. If you pick Azure Virtual Desktop or Windows 365 only because one appears cheaper on a licensing slide, you usually miss the day-two operating model that will actually determine cost, resiliency, and support effort.",{"type":31,"tag":32,"props":322,"children":323},{},[324],{"type":43,"value":325},"Azure Virtual Desktop and Windows 365 are not interchangeable VDI products. They answer different design questions, and the right choice normally comes from user segmentation, not from a single enterprise standard.",{"type":31,"tag":51,"props":327,"children":329},{"id":328},"start-with-the-operating-model",[330],{"type":43,"value":331},"Start with the operating model",{"type":31,"tag":32,"props":333,"children":334},{},[335],{"type":43,"value":336},"Azure Virtual Desktop is a desktop and app virtualization service on Azure. Microsoft runs the service components such as the gateway and broker, but you still manage the session hosts, images, scaling choices, applications, and much of the operational tuning inside your Azure estate.",{"type":31,"tag":32,"props":338,"children":339},{},[340],{"type":43,"value":341},"Windows 365 is a cloud-based SaaS service that automatically creates Cloud PCs for licensed users through provisioning policies. That shifts more of the operating experience toward policy, provisioning, and endpoint management in Intune rather than classic VDI platform engineering.",{"type":31,"tag":36,"props":343,"children":346},{"src":344,"alt":345,"width":125},"/images/blog/2025-2026/avd-vs-windows-365/control-plane.jpg","Control-plane comparison between Azure Virtual Desktop and Windows 365.",[],{"type":31,"tag":32,"props":348,"children":349},{},[350],{"type":43,"value":351},"That is the real architectural divide:",{"type":31,"tag":92,"props":353,"children":354},{},[355,360],{"type":31,"tag":96,"props":356,"children":357},{},[358],{"type":43,"value":359},"AVD gives you a flexible platform with deep tuning options.",{"type":31,"tag":96,"props":361,"children":362},{},[363],{"type":43,"value":364},"Windows 365 gives you a managed Cloud PC service with a more opinionated operating model.",{"type":31,"tag":36,"props":366,"children":369},{"src":367,"alt":368,"width":125},"/images/blog/2025-2026/avd-vs-windows-365/architecture.jpg","Architecture diagram comparing Azure Virtual Desktop and Windows 365 operating models.",[],{"type":31,"tag":51,"props":371,"children":373},{"id":372},"the-blast-radius-question-matters-more-than-the-price-sheet",[374],{"type":43,"value":375},"The blast radius question matters more than the price sheet",{"type":31,"tag":32,"props":377,"children":378},{},[379],{"type":43,"value":380},"The most useful design lens is failure boundary.",{"type":31,"tag":32,"props":382,"children":383},{},[384],{"type":43,"value":385},"In a pooled AVD environment, multiple users share the same session-host estate. If a host becomes unstable, a profile dependency breaks, or an image issue lands badly, the impact can fan out across many users. That model can be efficient, but it requires engineering discipline and good operational hygiene.",{"type":31,"tag":32,"props":387,"children":388},{},[389],{"type":43,"value":390},"Windows 365 Enterprise changes the failure boundary because each user gets a dedicated Cloud PC. A user issue is more likely to stay at the individual machine boundary rather than immediately becoming a shared-host incident. That does not remove every shared dependency, but it does change the support model materially.",{"type":31,"tag":32,"props":392,"children":393},{},[394],{"type":43,"value":395},"This is why a pure compute comparison is often misleading. Pooled AVD can be very cost-effective, but some of that efficiency is traded for operational complexity. Windows 365 can look more expensive at the unit level while still being the simpler service to run for many user groups.",{"type":31,"tag":36,"props":397,"children":400},{"src":398,"alt":399,"width":125},"/images/blog/2025-2026/avd-vs-windows-365/infographic.jpg","Infographic comparing pooled Azure Virtual Desktop blast radius with dedicated Windows 365 Cloud PCs.",[],{"type":31,"tag":51,"props":402,"children":404},{"id":403},"where-each-platform-actually-fits",[405],{"type":43,"value":406},"Where each platform actually fits",{"type":31,"tag":32,"props":408,"children":409},{},[410],{"type":43,"value":411},"AVD is strongest when you need platform flexibility:",{"type":31,"tag":92,"props":413,"children":414},{},[415,420,425,430],{"type":31,"tag":96,"props":416,"children":417},{},[418],{"type":43,"value":419},"Pooled or personal host pools.",{"type":31,"tag":96,"props":421,"children":422},{},[423],{"type":43,"value":424},"Full desktops or RemoteApp delivery.",{"type":31,"tag":96,"props":426,"children":427},{},[428],{"type":43,"value":429},"Multi-session efficiency.",{"type":31,"tag":96,"props":431,"children":432},{},[433],{"type":43,"value":434},"More direct control over images, VM size, autoscale, and application delivery patterns.",{"type":31,"tag":32,"props":436,"children":437},{},[438],{"type":43,"value":439},"Windows 365 is strongest when you want a more predictable desktop service model:",{"type":31,"tag":92,"props":441,"children":442},{},[443,448,453,458],{"type":31,"tag":96,"props":444,"children":445},{},[446],{"type":43,"value":447},"Automated Cloud PC provisioning through Intune-backed policies.",{"type":31,"tag":96,"props":449,"children":450},{},[451],{"type":43,"value":452},"Fixed monthly per-user licensing for human-operated Cloud PCs.",{"type":31,"tag":96,"props":454,"children":455},{},[456],{"type":43,"value":457},"A simpler endpoint-style management experience.",{"type":31,"tag":96,"props":459,"children":460},{},[461],{"type":43,"value":462},"Dedicated desktops for users who need lower operational friction.",{"type":31,"tag":32,"props":464,"children":465},{},[466],{"type":43,"value":467},"Windows 365 Frontline extends that model for non-concurrent scenarios. In dedicated mode, one license can provision up to three Cloud PCs for non-concurrent use with one active session per license. In shared mode, one license provisions one shared Cloud PC for one concurrent session, with user data deleted when the session ends unless user experience sync is used.",{"type":31,"tag":51,"props":469,"children":471},{"id":470},"most-enterprises-should-segment-not-standardize-blindly",[472],{"type":43,"value":473},"Most enterprises should segment, not standardize blindly",{"type":31,"tag":32,"props":475,"children":476},{},[477],{"type":43,"value":478},"The better pattern is usually to route users by persona.",{"type":31,"tag":32,"props":480,"children":481},{},[482],{"type":43,"value":483},"Use AVD where concurrency, app density, RemoteApp delivery, or deep platform tuning create meaningful value. Use Windows 365 where dedicated user experience, fixed-cost planning, and lower support tolerance matter more.",{"type":31,"tag":36,"props":485,"children":488},{"src":486,"alt":487,"width":125},"/images/blog/2025-2026/avd-vs-windows-365/persona-routing.jpg","Persona routing diagram for choosing Azure Virtual Desktop or Windows 365 by user type.",[],{"type":31,"tag":32,"props":490,"children":491},{},[492],{"type":43,"value":493},"That means:",{"type":31,"tag":92,"props":495,"children":496},{},[497,502,507],{"type":31,"tag":96,"props":498,"children":499},{},[500],{"type":43,"value":501},"Task and app-centric estates often lean toward AVD.",{"type":31,"tag":96,"props":503,"children":504},{},[505],{"type":43,"value":506},"Knowledge workers, contractors, and low-tolerance support populations often lean toward Windows 365.",{"type":31,"tag":96,"props":508,"children":509},{},[510],{"type":43,"value":511},"Shift-based workers can be a strong fit for Windows 365 Frontline when non-concurrent access is realistic.",{"type":31,"tag":51,"props":513,"children":515},{"id":514},"practical-guidance-for-architects",[516],{"type":43,"value":517},"Practical guidance for architects",{"type":31,"tag":32,"props":519,"children":520},{},[521],{"type":43,"value":522},"If you want to choose well, start here:",{"type":31,"tag":524,"props":525,"children":526},"ol",{},[527,532,537,542],{"type":31,"tag":96,"props":528,"children":529},{},[530],{"type":43,"value":531},"Map personas by isolation and persistence needs, not by licensing bundle.",{"type":31,"tag":96,"props":533,"children":534},{},[535],{"type":43,"value":536},"Measure actual concurrency before assuming pooled density savings.",{"type":31,"tag":96,"props":538,"children":539},{},[540],{"type":43,"value":541},"Decide how much platform engineering your team can realistically own.",{"type":31,"tag":96,"props":543,"children":544},{},[545],{"type":43,"value":546},"Standardize images, application packaging, and join patterns so users can move between platforms when needed.",{"type":31,"tag":32,"props":548,"children":549},{},[550],{"type":43,"value":551},"The goal is not to crown a universal winner. The goal is to pick the operating model that your team can support and your users can tolerate.",{"type":31,"tag":51,"props":553,"children":554},{"id":239},[555],{"type":43,"value":242},{"type":31,"tag":92,"props":557,"children":558},{},[559,569,579,589,599,609],{"type":31,"tag":96,"props":560,"children":561},{},[562],{"type":31,"tag":250,"props":563,"children":566},{"href":564,"rel":565},"https://learn.microsoft.com/en-us/azure/virtual-desktop/overview",[254],[567],{"type":43,"value":568},"What is Azure Virtual Desktop?",{"type":31,"tag":96,"props":570,"children":571},{},[572],{"type":31,"tag":250,"props":573,"children":576},{"href":574,"rel":575},"https://learn.microsoft.com/en-us/azure/virtual-desktop/terminology#host-pools",[254],[577],{"type":43,"value":578},"Azure Virtual Desktop terminology",{"type":31,"tag":96,"props":580,"children":581},{},[582],{"type":31,"tag":250,"props":583,"children":586},{"href":584,"rel":585},"https://learn.microsoft.com/en-us/azure/virtual-desktop/fslogix-profile-containers",[254],[587],{"type":43,"value":588},"User profile management for Azure Virtual Desktop with FSLogix profile containers",{"type":31,"tag":96,"props":590,"children":591},{},[592],{"type":31,"tag":250,"props":593,"children":596},{"href":594,"rel":595},"https://learn.microsoft.com/en-us/windows-365/overview",[254],[597],{"type":43,"value":598},"What is Windows 365?",{"type":31,"tag":96,"props":600,"children":601},{},[602],{"type":31,"tag":250,"props":603,"children":606},{"href":604,"rel":605},"https://learn.microsoft.com/en-us/windows-365/enterprise/provisioning",[254],[607],{"type":43,"value":608},"Provisioning overview",{"type":31,"tag":96,"props":610,"children":611},{},[612],{"type":31,"tag":250,"props":613,"children":616},{"href":614,"rel":615},"https://learn.microsoft.com/en-us/windows-365/enterprise/introduction-windows-365-frontline",[254],[617],{"type":43,"value":618},"What is Windows 365 Frontline?",{"title":14,"searchDepth":279,"depth":279,"links":620},[621,622,623,624,625,626],{"id":328,"depth":279,"text":331},{"id":372,"depth":279,"text":375},{"id":403,"depth":279,"text":406},{"id":470,"depth":279,"text":473},{"id":514,"depth":279,"text":517},{"id":239,"depth":279,"text":242},"content:blog:stop-choosing-between-avd-and-windows-365-based-on-licensing.md","blog/stop-choosing-between-avd-and-windows-365-based-on-licensing.md",{"_path":630,"_dir":12,"_draft":13,"_partial":13,"_locale":14,"title":631,"description":632,"date":633,"categories":634,"tags":636,"image":639,"author":14,"body":640,"_type":288,"_id":985,"_source":290,"_file":986,"_extension":292},"/blog/ai-in-end-user-computing-from-passive-chat-to-active-agency","Engineering the Proactive IT Architect: AI in End-User Computing","AI becomes valuable in EUC when it reduces discovery, packaging, triage, and cost-governance friction under controlled operational boundaries.","2026-05-03",[19,635,20],"ai",[635,637,23,302,638],"euc","cost-management","/images/blog/2025-2026/ai-in-end-user-computing.jpg",{"type":28,"children":641,"toc":976},[642,648,653,658,664,669,674,679,684,690,695,700,725,730,758,763,769,774,779,784,789,795,800,805,828,833,838,844,849,854,877,882,888,893,916,921,925],{"type":31,"tag":32,"props":643,"children":644},{},[645],{"type":31,"tag":36,"props":646,"children":647},{"alt":14,"src":639},[],{"type":31,"tag":32,"props":649,"children":650},{},[651],{"type":43,"value":652},"At the recent E2EMVC Capital Agenda AI Masterclass, I focused on a shift that matters for every modern EUC team: the role of the architect is moving from reactive troubleshooting toward proactive engineering.",{"type":31,"tag":32,"props":654,"children":655},{},[656],{"type":43,"value":657},"That shift is not about replacing engineers with generic AI. It is about using AI in a controlled way to reduce manual discovery, packaging effort, triage noise, and cost-governance drag so architects can spend more time on design decisions that actually change outcomes.",{"type":31,"tag":51,"props":659,"children":661},{"id":660},"what-proactive-ai-in-euc-actually-means",[662],{"type":43,"value":663},"What proactive AI in EUC actually means",{"type":31,"tag":32,"props":665,"children":666},{},[667],{"type":43,"value":668},"The weak version of AI in IT is a chatbot that summarizes documentation and produces one-off snippets. That can be useful, but it does not materially change the operating model.",{"type":31,"tag":32,"props":670,"children":671},{},[672],{"type":43,"value":673},"The stronger version is workflow-aware assistance that helps teams investigate, plan, and execute bounded tasks with the right context. In EUC, that means using AI to shorten the time between a problem being observed and a defensible action being taken.",{"type":31,"tag":36,"props":675,"children":678},{"src":676,"alt":677,"width":125},"/images/blog/2025-2026/ai-in-euc/active-agency.jpg","Illustration of a proactive IT architect using AI to move from reactive support toward governed execution.",[],{"type":31,"tag":32,"props":680,"children":681},{},[682],{"type":43,"value":683},"For me, that is the practical definition of active agency in EUC: not uncontrolled autonomy, but systems that can help engineers move through repeatable operational workflows with less manual friction.",{"type":31,"tag":51,"props":685,"children":687},{"id":686},"packaging-and-application-delivery-are-obvious-starting-points",[688],{"type":43,"value":689},"Packaging and application delivery are obvious starting points",{"type":31,"tag":32,"props":691,"children":692},{},[693],{"type":43,"value":694},"Application packaging remains one of the most stubborn bottlenecks in end-user computing because the hard part is often not the final package. The hard part is understanding what the application does, how it installs, what it writes, and which delivery route makes sense.",{"type":31,"tag":32,"props":696,"children":697},{},[698],{"type":43,"value":699},"Microsoft's packaging model gives a clear foundation for this work:",{"type":31,"tag":92,"props":701,"children":702},{},[703,715],{"type":31,"tag":96,"props":704,"children":705},{},[706,708,713],{"type":43,"value":707},"The ",{"type":31,"tag":79,"props":709,"children":710},{},[711],{"type":43,"value":712},"MSIX Packaging Tool",{"type":43,"value":714}," can repackage existing desktop apps to MSIX and supports conversion from installers such as MSI, EXE, ClickOnce, App-V, scripts, and manual installs.",{"type":31,"tag":96,"props":716,"children":717},{},[718,723],{"type":31,"tag":79,"props":719,"children":720},{},[721],{"type":43,"value":722},"App Attach",{"type":43,"value":724}," in Azure Virtual Desktop dynamically attaches application packages to user sessions so applications do not need to be installed into every base image.",{"type":31,"tag":32,"props":726,"children":727},{},[728],{"type":43,"value":729},"A sensible AI-assisted packaging workflow looks like this:",{"type":31,"tag":524,"props":731,"children":732},{},[733,738,743,748,753],{"type":31,"tag":96,"props":734,"children":735},{},[736],{"type":43,"value":737},"Observe the installer or application footprint.",{"type":31,"tag":96,"props":739,"children":740},{},[741],{"type":43,"value":742},"Profile dependencies, file writes, services, and user-state assumptions.",{"type":31,"tag":96,"props":744,"children":745},{},[746],{"type":43,"value":747},"Match the findings to known patterns and likely remediation steps.",{"type":31,"tag":96,"props":749,"children":750},{},[751],{"type":43,"value":752},"Route the app toward the right outcome, such as MSIX packaging, App Attach delivery, or another managed enterprise path.",{"type":31,"tag":96,"props":754,"children":755},{},[756],{"type":43,"value":757},"Produce an output that is easier to test, govern, and maintain.",{"type":31,"tag":32,"props":759,"children":760},{},[761],{"type":43,"value":762},"That is where AI can create immediate value. It reduces the manual discovery burden that usually slows the entire modernization process down.",{"type":31,"tag":51,"props":764,"children":766},{"id":765},"app-attach-is-about-operational-control-not-just-packaging-format",[767],{"type":43,"value":768},"App Attach is about operational control, not just packaging format",{"type":31,"tag":32,"props":770,"children":771},{},[772],{"type":43,"value":773},"One of the more important architectural advantages in Azure Virtual Desktop is that App Attach lets teams separate application delivery from the session host image. Microsoft documents that the same application package can be used across multiple host pools, and that applications can be delivered using RemoteApp or inside a full desktop session.",{"type":31,"tag":32,"props":775,"children":776},{},[777],{"type":43,"value":778},"That matters because it lets architects reduce image sprawl and manage application rollout more deliberately. Microsoft also supports multiple application package types for App Attach, including MSIX, Appx, and App-V, and documents CimFS, VHDX, and VHD as disk image options for MSIX and Appx images.",{"type":31,"tag":36,"props":780,"children":783},{"src":781,"alt":782,"width":125},"/images/blog/2025-2026/ai-in-euc/architecture.jpg","Architecture diagram showing proactive EUC operations across packaging, delivery, and governance.",[],{"type":31,"tag":32,"props":785,"children":786},{},[787],{"type":43,"value":788},"The architectural lesson is straightforward: when packaging intelligence and delivery intelligence are connected, teams can make better decisions earlier and with less rework.",{"type":31,"tag":51,"props":790,"children":792},{"id":791},"cost-governance-also-needs-a-better-operating-model",[793],{"type":43,"value":794},"Cost governance also needs a better operating model",{"type":31,"tag":32,"props":796,"children":797},{},[798],{"type":43,"value":799},"The same principle applies to Azure cost governance. Too many teams still treat cloud costs as a monthly spreadsheet exercise instead of an operational discipline.",{"type":31,"tag":32,"props":801,"children":802},{},[803],{"type":43,"value":804},"Microsoft Cost Management is built around a more practical loop:",{"type":31,"tag":92,"props":806,"children":807},{},[808,813,818,823],{"type":31,"tag":96,"props":809,"children":810},{},[811],{"type":43,"value":812},"Analyze cloud costs.",{"type":31,"tag":96,"props":814,"children":815},{},[816],{"type":43,"value":817},"Monitor with budgets.",{"type":31,"tag":96,"props":819,"children":820},{},[821],{"type":43,"value":822},"Optimize with recommendations.",{"type":31,"tag":96,"props":824,"children":825},{},[826],{"type":43,"value":827},"Keep billing visibility tied to operational decisions.",{"type":31,"tag":36,"props":829,"children":832},{"src":830,"alt":831,"width":125},"/images/blog/2025-2026/ai-in-euc/compliance.jpg","Illustration of governed operations covering compliance, cost visibility, and architectural control.",[],{"type":31,"tag":32,"props":834,"children":835},{},[836],{"type":43,"value":837},"For EUC architects, this matters when evaluating delivery models and user patterns. For example, Windows 365 Frontline can reduce costs for the right workforce pattern, but only when it is matched correctly to how people actually work. Microsoft documents that Frontline dedicated mode allows one license to provision up to three non-concurrent Cloud PCs with one active session, while shared mode provides one shared non-concurrent Cloud PC per license. Those are useful levers, but only when access patterns, persistence needs, and concurrency are understood up front.",{"type":31,"tag":51,"props":839,"children":841},{"id":840},"governance-is-part-of-the-architecture",[842],{"type":43,"value":843},"Governance is part of the architecture",{"type":31,"tag":32,"props":845,"children":846},{},[847],{"type":43,"value":848},"None of this becomes credible without controls.",{"type":31,"tag":32,"props":850,"children":851},{},[852],{"type":43,"value":853},"If AI is involved in packaging analysis, operational triage, automation, or cost optimization, then the architecture also needs answers for:",{"type":31,"tag":92,"props":855,"children":856},{},[857,862,867,872],{"type":31,"tag":96,"props":858,"children":859},{},[860],{"type":43,"value":861},"What data is being used?",{"type":31,"tag":96,"props":863,"children":864},{},[865],{"type":43,"value":866},"What actions can run automatically?",{"type":31,"tag":96,"props":868,"children":869},{},[870],{"type":43,"value":871},"What evidence is retained for change control and audit?",{"type":31,"tag":96,"props":873,"children":874},{},[875],{"type":43,"value":876},"Where are the approval boundaries?",{"type":31,"tag":32,"props":878,"children":879},{},[880],{"type":43,"value":881},"This is why I see the future EUC architect as proactive rather than merely reactive. The job is no longer just troubleshooting issues after they occur. It is designing a system where discovery, packaging, delivery, governance, and cost control work together with less manual drag.",{"type":31,"tag":51,"props":883,"children":885},{"id":884},"practical-guidance",[886],{"type":43,"value":887},"Practical guidance",{"type":31,"tag":32,"props":889,"children":890},{},[891],{"type":43,"value":892},"If you want AI to help rather than distract, start with the parts of EUC that are expensive in human time:",{"type":31,"tag":524,"props":894,"children":895},{},[896,901,906,911],{"type":31,"tag":96,"props":897,"children":898},{},[899],{"type":43,"value":900},"Automate discovery-heavy work before automating high-impact production changes.",{"type":31,"tag":96,"props":902,"children":903},{},[904],{"type":43,"value":905},"Focus on packaging analysis, environment profiling, and repeatable runbooks first.",{"type":31,"tag":96,"props":907,"children":908},{},[909],{"type":43,"value":910},"Use Microsoft-native controls for packaging, app delivery, and cost governance as the operational baseline.",{"type":31,"tag":96,"props":912,"children":913},{},[914],{"type":43,"value":915},"Keep engineers accountable for approval and architecture decisions.",{"type":31,"tag":32,"props":917,"children":918},{},[919],{"type":43,"value":920},"The real objective is not to add another assistant to the stack. It is to engineer a more proactive operating model for EUC.",{"type":31,"tag":51,"props":922,"children":923},{"id":239},[924],{"type":43,"value":242},{"type":31,"tag":92,"props":926,"children":927},{},[928,938,948,958,968],{"type":31,"tag":96,"props":929,"children":930},{},[931],{"type":31,"tag":250,"props":932,"children":935},{"href":933,"rel":934},"https://learn.microsoft.com/en-us/windows/msix/packaging-tool/tool-overview",[254],[936],{"type":43,"value":937},"MSIX Packaging Tool overview",{"type":31,"tag":96,"props":939,"children":940},{},[941],{"type":31,"tag":250,"props":942,"children":945},{"href":943,"rel":944},"https://learn.microsoft.com/en-us/windows/msix/packaging-tool/create-app-package",[254],[946],{"type":43,"value":947},"Create an MSIX package from any desktop installer",{"type":31,"tag":96,"props":949,"children":950},{},[951],{"type":31,"tag":250,"props":952,"children":955},{"href":953,"rel":954},"https://learn.microsoft.com/en-us/azure/virtual-desktop/app-attach-overview",[254],[956],{"type":43,"value":957},"App Attach in Azure Virtual Desktop",{"type":31,"tag":96,"props":959,"children":960},{},[961],{"type":31,"tag":250,"props":962,"children":965},{"href":963,"rel":964},"https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/azure-setup-guide/manage-costs",[254],[966],{"type":43,"value":967},"Manage costs and billing for your Azure resources",{"type":31,"tag":96,"props":969,"children":970},{},[971],{"type":31,"tag":250,"props":972,"children":974},{"href":614,"rel":973},[254],[975],{"type":43,"value":618},{"title":14,"searchDepth":279,"depth":279,"links":977},[978,979,980,981,982,983,984],{"id":660,"depth":279,"text":663},{"id":686,"depth":279,"text":689},{"id":765,"depth":279,"text":768},{"id":791,"depth":279,"text":794},{"id":840,"depth":279,"text":843},{"id":884,"depth":279,"text":887},{"id":239,"depth":279,"text":242},"content:blog:ai-in-end-user-computing-from-passive-chat-to-active-agency.md","blog/ai-in-end-user-computing-from-passive-chat-to-active-agency.md",{"_path":988,"_dir":12,"_draft":13,"_partial":13,"_locale":14,"title":989,"description":990,"date":991,"categories":992,"tags":993,"image":997,"author":14,"body":998,"_type":288,"_id":1333,"_source":290,"_file":1334,"_extension":292},"/blog/azure-virtual-desktop-hybrid-on-premises-control-plane","Azure Virtual Desktop Hybrid: Rationalizing On-Premises Session Hosts with a Cloud Control Plane","Azure Virtual Desktop Hybrid brings Azure-managed brokering to on-premises session hosts, but the current preview has important boundaries.","2026-05-01",[19,20,300],[302,300,994,995,996],"azure-arc","hybrid","on-premises","/images/blog/2025-2026/azure-virtual-desktop-hybrid.jpg",{"type":28,"children":999,"toc":1324},[1000,1006,1011,1016,1022,1027,1040,1045,1050,1055,1061,1066,1071,1094,1099,1105,1110,1115,1178,1183,1188,1194,1199,1237,1242,1248,1253,1258,1263,1267,1272,1277,1281],{"type":31,"tag":32,"props":1001,"children":1002},{},[1003],{"type":31,"tag":36,"props":1004,"children":1005},{"alt":14,"src":997},[],{"type":31,"tag":32,"props":1007,"children":1008},{},[1009],{"type":43,"value":1010},"Azure Virtual Desktop Hybrid is one of the more interesting changes in the desktop virtualization space because it breaks the old assumption that the Azure Virtual Desktop service and the session hosts must live in the same place.",{"type":31,"tag":32,"props":1012,"children":1013},{},[1014],{"type":43,"value":1015},"With Azure Virtual Desktop Hybrid, Microsoft keeps the Azure Virtual Desktop service components in Azure while the actual session hosts can remain on-premises on your existing virtualization platform, or in some cases on bare-metal Windows Server. For organizations trying to modernize management without immediately retiring datacenter capacity, that is a meaningful design option.",{"type":31,"tag":51,"props":1017,"children":1019},{"id":1018},"what-azure-virtual-desktop-hybrid-is",[1020],{"type":43,"value":1021},"What Azure Virtual Desktop Hybrid is",{"type":31,"tag":32,"props":1023,"children":1024},{},[1025],{"type":43,"value":1026},"At a high level, the architecture splits into two layers:",{"type":31,"tag":92,"props":1028,"children":1029},{},[1030,1035],{"type":31,"tag":96,"props":1031,"children":1032},{},[1033],{"type":43,"value":1034},"Microsoft-hosted Azure Virtual Desktop service components in Azure.",{"type":31,"tag":96,"props":1036,"children":1037},{},[1038],{"type":43,"value":1039},"Customer-hosted session hosts running on-premises.",{"type":31,"tag":32,"props":1041,"children":1042},{},[1043],{"type":43,"value":1044},"That means the gateway, broker, and surrounding control-plane services remain cloud-managed, while your desktops and RemoteApps continue to run close to local data, local infrastructure, and existing operational tooling.",{"type":31,"tag":32,"props":1046,"children":1047},{},[1048],{"type":43,"value":1049},"Microsoft positions this as platform-agnostic for on-premises Windows virtual machines, and it uses Azure Arc to represent those local machines inside Azure so they can register into Azure Virtual Desktop host pools.",{"type":31,"tag":36,"props":1051,"children":1054},{"src":1052,"alt":1053,"width":125},"/images/blog/2025-2026/azure-virtual-desktop-hybrid/architecture.jpg","Azure Virtual Desktop Hybrid architecture diagram.",[],{"type":31,"tag":51,"props":1056,"children":1058},{"id":1057},"why-the-model-matters",[1059],{"type":43,"value":1060},"Why the model matters",{"type":31,"tag":32,"props":1062,"children":1063},{},[1064],{"type":43,"value":1065},"The value is not just \"run AVD outside Azure.\" The more useful way to frame it is infrastructure rationalization.",{"type":31,"tag":32,"props":1067,"children":1068},{},[1069],{"type":43,"value":1070},"Azure Virtual Desktop Hybrid lets you:",{"type":31,"tag":92,"props":1072,"children":1073},{},[1074,1079,1084,1089],{"type":31,"tag":96,"props":1075,"children":1076},{},[1077],{"type":43,"value":1078},"Keep using existing on-premises compute investments.",{"type":31,"tag":96,"props":1080,"children":1081},{},[1082],{"type":43,"value":1083},"Move brokering and service control to Microsoft-managed infrastructure.",{"type":31,"tag":96,"props":1085,"children":1086},{},[1087],{"type":43,"value":1088},"Reduce the need to maintain older on-premises RDS-style gateway and broker patterns.",{"type":31,"tag":96,"props":1090,"children":1091},{},[1092],{"type":43,"value":1093},"Keep session-host compute near data sources where latency or residency still matter.",{"type":31,"tag":32,"props":1095,"children":1096},{},[1097],{"type":43,"value":1098},"That makes it relevant for regulated workloads, latency-sensitive workloads, and environments that want a staged modernization path rather than an all-at-once migration.",{"type":31,"tag":51,"props":1100,"children":1102},{"id":1101},"the-current-preview-boundaries",[1103],{"type":43,"value":1104},"The current preview boundaries",{"type":31,"tag":32,"props":1106,"children":1107},{},[1108],{"type":43,"value":1109},"This is the part that needs to be stated clearly: Azure Virtual Desktop Hybrid is still in public preview, and Microsoft documents some important limitations.",{"type":31,"tag":32,"props":1111,"children":1112},{},[1113],{"type":43,"value":1114},"The main ones are:",{"type":31,"tag":92,"props":1116,"children":1117},{},[1118,1130,1142,1160],{"type":31,"tag":96,"props":1119,"children":1120},{},[1121,1123,1128],{"type":43,"value":1122},"It is only supported with ",{"type":31,"tag":79,"props":1124,"children":1125},{},[1126],{"type":43,"value":1127},"validation host pools",{"type":43,"value":1129}," during preview.",{"type":31,"tag":96,"props":1131,"children":1132},{},[1133,1135,1140],{"type":43,"value":1134},"You should create a ",{"type":31,"tag":79,"props":1136,"children":1137},{},[1138],{"type":43,"value":1139},"standard",{"type":43,"value":1141}," host pool without adding Azure VMs to it.",{"type":31,"tag":96,"props":1143,"children":1144},{},[1145,1147,1151,1153,1158],{"type":43,"value":1146},"It does ",{"type":31,"tag":79,"props":1148,"children":1149},{},[1150],{"type":43,"value":83},{"type":43,"value":1152}," support ",{"type":31,"tag":79,"props":1154,"children":1155},{},[1156],{"type":43,"value":1157},"session host configuration",{"type":43,"value":1159},".",{"type":31,"tag":96,"props":1161,"children":1162},{},[1163,1165,1170,1172,1177],{"type":43,"value":1164},"You add on-premises session hosts by onboarding them to ",{"type":31,"tag":79,"props":1166,"children":1167},{},[1168],{"type":43,"value":1169},"Azure Arc",{"type":43,"value":1171}," and then applying the ",{"type":31,"tag":79,"props":1173,"children":1174},{},[1175],{"type":43,"value":1176},"Microsoft.AzureVirtualDesktop.CloudDeviceExtension",{"type":43,"value":1159},{"type":31,"tag":32,"props":1179,"children":1180},{},[1181],{"type":43,"value":1182},"That means this is not yet a drop-in production pattern for every host pool strategy. It is a preview path that needs to be treated accordingly.",{"type":31,"tag":36,"props":1184,"children":1187},{"src":1185,"alt":1186,"width":125},"/images/blog/2025-2026/azure-virtual-desktop-hybrid/infographic.jpg","Azure Virtual Desktop Hybrid deployment infographic.",[],{"type":31,"tag":51,"props":1189,"children":1191},{"id":1190},"what-implementation-actually-looks-like",[1192],{"type":43,"value":1193},"What implementation actually looks like",{"type":31,"tag":32,"props":1195,"children":1196},{},[1197],{"type":43,"value":1198},"The deployment flow is straightforward conceptually, but the sequence matters:",{"type":31,"tag":524,"props":1200,"children":1201},{},[1202,1207,1212,1217,1222,1227,1232],{"type":31,"tag":96,"props":1203,"children":1204},{},[1205],{"type":43,"value":1206},"Deploy the on-premises Windows virtual machine or supported Windows Server resource using your existing provisioning process.",{"type":31,"tag":96,"props":1208,"children":1209},{},[1210],{"type":43,"value":1211},"Make sure the machine meets Azure Virtual Desktop prerequisites and can reach the required endpoints.",{"type":31,"tag":96,"props":1213,"children":1214},{},[1215],{"type":43,"value":1216},"Install and configure the Azure Arc Connected Machine agent.",{"type":31,"tag":96,"props":1218,"children":1219},{},[1220],{"type":43,"value":1221},"Create the Azure Virtual Desktop host pool, workspace, and application group in Azure.",{"type":31,"tag":96,"props":1223,"children":1224},{},[1225],{"type":43,"value":1226},"Configure the host pool as a validation environment.",{"type":31,"tag":96,"props":1228,"children":1229},{},[1230],{"type":43,"value":1231},"Generate a host-pool registration key.",{"type":31,"tag":96,"props":1233,"children":1234},{},[1235],{"type":43,"value":1236},"Deploy the Azure Virtual Desktop Azure Arc extension and pass the registration token.",{"type":31,"tag":32,"props":1238,"children":1239},{},[1240],{"type":43,"value":1241},"Once that extension succeeds, the machine can appear as an available session host in the host pool.",{"type":31,"tag":51,"props":1243,"children":1245},{"id":1244},"os-and-licensing-nuance",[1246],{"type":43,"value":1247},"OS and licensing nuance",{"type":31,"tag":32,"props":1249,"children":1250},{},[1251],{"type":43,"value":1252},"Microsoft's current documentation is also more specific than many summaries make it sound.",{"type":31,"tag":32,"props":1254,"children":1255},{},[1256],{"type":43,"value":1257},"Windows Server 2016, 2019, 2022, and 2025 are supported on virtual machines and physical servers. Windows 10 and Windows 11 Enterprise are supported only on virtual machines in this model, not on physical PCs. Windows 10/11 Enterprise multi-session is not supported for Azure Virtual Desktop Hybrid.",{"type":31,"tag":32,"props":1259,"children":1260},{},[1261],{"type":43,"value":1262},"That matters because the phrase \"bare metal\" is easy to overgeneralize. The physical-server story applies to Windows Server session hosts, not to every Windows client scenario.",{"type":31,"tag":51,"props":1264,"children":1265},{"id":228},[1266],{"type":43,"value":231},{"type":31,"tag":32,"props":1268,"children":1269},{},[1270],{"type":43,"value":1271},"Azure Virtual Desktop Hybrid is strategically useful because it lets organizations modernize the control plane before they fully modernize the compute plane. That is a practical option for real environments with existing hardware, local dependencies, and nontrivial migration constraints.",{"type":31,"tag":32,"props":1273,"children":1274},{},[1275],{"type":43,"value":1276},"The caution is equally important: this is still a preview feature with validation-host-pool requirements and explicit deployment boundaries. If you position it as a staged modernization tool instead of a universal replacement pattern, the architecture makes sense.",{"type":31,"tag":51,"props":1278,"children":1279},{"id":239},[1280],{"type":43,"value":242},{"type":31,"tag":92,"props":1282,"children":1283},{},[1284,1294,1304,1314],{"type":31,"tag":96,"props":1285,"children":1286},{},[1287],{"type":31,"tag":250,"props":1288,"children":1291},{"href":1289,"rel":1290},"https://learn.microsoft.com/en-us/azure/virtual-desktop/hybrid-overview",[254],[1292],{"type":43,"value":1293},"Azure Virtual Desktop Hybrid Overview",{"type":31,"tag":96,"props":1295,"children":1296},{},[1297],{"type":31,"tag":250,"props":1298,"children":1301},{"href":1299,"rel":1300},"https://learn.microsoft.com/en-us/azure/virtual-desktop/deploy-azure-virtual-desktop-hybrid",[254],[1302],{"type":43,"value":1303},"Deploy Azure Virtual Desktop Hybrid",{"type":31,"tag":96,"props":1305,"children":1306},{},[1307],{"type":31,"tag":250,"props":1308,"children":1311},{"href":1309,"rel":1310},"https://learn.microsoft.com/en-us/azure/virtual-desktop/configure-validation-environment",[254],[1312],{"type":43,"value":1313},"Configure a host pool as a validation environment",{"type":31,"tag":96,"props":1315,"children":1316},{},[1317],{"type":31,"tag":250,"props":1318,"children":1321},{"href":1319,"rel":1320},"https://learn.microsoft.com/en-us/azure/azure-arc/servers/overview",[254],[1322],{"type":43,"value":1323},"What is Azure Arc-enabled servers?",{"title":14,"searchDepth":279,"depth":279,"links":1325},[1326,1327,1328,1329,1330,1331,1332],{"id":1018,"depth":279,"text":1021},{"id":1057,"depth":279,"text":1060},{"id":1101,"depth":279,"text":1104},{"id":1190,"depth":279,"text":1193},{"id":1244,"depth":279,"text":1247},{"id":228,"depth":279,"text":231},{"id":239,"depth":279,"text":242},"content:blog:azure-virtual-desktop-hybrid-on-premises-control-plane.md","blog/azure-virtual-desktop-hybrid-on-premises-control-plane.md",{"_path":1336,"_dir":12,"_draft":13,"_partial":13,"_locale":14,"title":1337,"description":1338,"date":1339,"categories":1340,"tags":1342,"image":1345,"author":14,"body":1346,"_type":288,"_id":1639,"_source":290,"_file":1640,"_extension":292},"/blog/windows-365-reserve-for-business-continuity","Strategic Resilience: Implementing Windows 365 Reserve for Business Continuity","Windows 365 Reserve is designed for short-term disruption scenarios, not as a general-purpose replacement for Enterprise or Frontline.","2026-02-24",[19,20,1341],"windows365",[303,1343,1344,305],"reserve","business-continuity","/images/blog/2025-2026/windows-365-reserve.jpg",{"type":28,"children":1347,"toc":1630},[1348,1354,1359,1364,1370,1375,1398,1403,1409,1414,1432,1437,1443,1448,1476,1481,1486,1492,1497,1509,1520,1525,1530,1536,1541,1564,1569,1573,1578,1583,1587],{"type":31,"tag":32,"props":1349,"children":1350},{},[1351],{"type":31,"tag":36,"props":1352,"children":1353},{"alt":14,"src":1345},[],{"type":31,"tag":32,"props":1355,"children":1356},{},[1357],{"type":43,"value":1358},"Windows 365 Reserve is one of the clearest examples of Microsoft shaping Cloud PCs around a specific business continuity use case rather than general desktop replacement. It is built for people who normally work on physical devices but need fast, short-term Cloud PC access when those devices are unavailable.",{"type":31,"tag":32,"props":1360,"children":1361},{},[1362],{"type":43,"value":1363},"That makes it useful, but only if it is positioned accurately.",{"type":31,"tag":51,"props":1365,"children":1367},{"id":1366},"what-reserve-is",[1368],{"type":43,"value":1369},"What Reserve is",{"type":31,"tag":32,"props":1371,"children":1372},{},[1373],{"type":43,"value":1374},"Windows 365 Reserve gives a user up to 10 days of Cloud PC access per year under a dedicated license. The target scenarios are disruption events such as:",{"type":31,"tag":92,"props":1376,"children":1377},{},[1378,1383,1388,1393],{"type":31,"tag":96,"props":1379,"children":1380},{},[1381],{"type":43,"value":1382},"Device loss or theft.",{"type":31,"tag":96,"props":1384,"children":1385},{},[1386],{"type":43,"value":1387},"Hardware repair delays.",{"type":31,"tag":96,"props":1389,"children":1390},{},[1391],{"type":43,"value":1392},"Shipping delays.",{"type":31,"tag":96,"props":1394,"children":1395},{},[1396],{"type":43,"value":1397},"Short-term continuity needs after an outage or incident.",{"type":31,"tag":32,"props":1399,"children":1400},{},[1401],{"type":43,"value":1402},"This is not the same thing as giving a user a full-time Windows 365 Enterprise Cloud PC, and it is not the same thing as cross-region disaster recovery for an existing Cloud PC estate.",{"type":31,"tag":51,"props":1404,"children":1406},{"id":1405},"what-makes-it-different",[1407],{"type":43,"value":1408},"What makes it different",{"type":31,"tag":32,"props":1410,"children":1411},{},[1412],{"type":43,"value":1413},"Reserve is intentionally constrained:",{"type":31,"tag":92,"props":1415,"children":1416},{},[1417,1422,1427],{"type":31,"tag":96,"props":1418,"children":1419},{},[1420],{"type":43,"value":1421},"One license is tied to one user.",{"type":31,"tag":96,"props":1423,"children":1424},{},[1425],{"type":43,"value":1426},"The 10-day entitlement is not pooled or shared.",{"type":31,"tag":96,"props":1428,"children":1429},{},[1430],{"type":43,"value":1431},"It is designed for short-term access rather than permanent assignment.",{"type":31,"tag":32,"props":1433,"children":1434},{},[1435],{"type":43,"value":1436},"That means the service is best thought of as a continuity option for physical-device users, not as an all-purpose capacity pool.",{"type":31,"tag":51,"props":1438,"children":1440},{"id":1439},"important-limitations-to-plan-around",[1441],{"type":43,"value":1442},"Important limitations to plan around",{"type":31,"tag":32,"props":1444,"children":1445},{},[1446],{"type":43,"value":1447},"This is where accuracy matters most. Reserve has boundaries that affect design decisions:",{"type":31,"tag":92,"props":1449,"children":1450},{},[1451,1456,1461,1466,1471],{"type":31,"tag":96,"props":1452,"children":1453},{},[1454],{"type":43,"value":1455},"It does not support custom images.",{"type":31,"tag":96,"props":1457,"children":1458},{},[1459],{"type":43,"value":1460},"It uses gallery images only.",{"type":31,"tag":96,"props":1462,"children":1463},{},[1464],{"type":43,"value":1465},"It does not support Azure Network Connections or Microsoft Entra hybrid join.",{"type":31,"tag":96,"props":1467,"children":1468},{},[1469],{"type":43,"value":1470},"It is managed through Intune and designed around Microsoft-hosted networking.",{"type":31,"tag":96,"props":1472,"children":1473},{},[1474],{"type":43,"value":1475},"It does not preallocate capacity in advance.",{"type":31,"tag":32,"props":1477,"children":1478},{},[1479],{"type":43,"value":1480},"There is also an operational timing detail teams should not miss: for a user's first eligibility window, the Reserve license needs to be assigned in advance. You cannot wait for the incident and assume instant first-time provisioning.",{"type":31,"tag":36,"props":1482,"children":1485},{"src":1483,"alt":1484,"width":125},"/images/blog/2025-2026/windows-365-reserve/infographic.jpg","Windows 365 Reserve business continuity infographic.",[],{"type":31,"tag":51,"props":1487,"children":1489},{"id":1488},"reserve-versus-cross-region-disaster-recovery",[1490],{"type":43,"value":1491},"Reserve versus cross-region disaster recovery",{"type":31,"tag":32,"props":1493,"children":1494},{},[1495],{"type":43,"value":1496},"These two features solve different problems.",{"type":31,"tag":32,"props":1498,"children":1499},{},[1500,1502,1507],{"type":43,"value":1501},"Use ",{"type":31,"tag":79,"props":1503,"children":1504},{},[1505],{"type":43,"value":1506},"Reserve",{"type":43,"value":1508}," when the user's primary problem is loss of the physical endpoint.",{"type":31,"tag":32,"props":1510,"children":1511},{},[1512,1513,1518],{"type":43,"value":1501},{"type":31,"tag":79,"props":1514,"children":1515},{},[1516],{"type":43,"value":1517},"Cross-region Disaster Recovery",{"type":43,"value":1519}," when the problem is regional disruption affecting existing Windows 365 Enterprise or Frontline Cloud PCs.",{"type":31,"tag":32,"props":1521,"children":1522},{},[1523],{"type":43,"value":1524},"If you mix those up, you risk buying the wrong continuity model.",{"type":31,"tag":36,"props":1526,"children":1529},{"src":1527,"alt":1528,"width":125},"/images/blog/2025-2026/windows-365-reserve/architecture.jpg","Windows 365 Reserve architecture diagram.",[],{"type":31,"tag":51,"props":1531,"children":1533},{"id":1532},"where-reserve-fits-well",[1534],{"type":43,"value":1535},"Where Reserve fits well",{"type":31,"tag":32,"props":1537,"children":1538},{},[1539],{"type":43,"value":1540},"Reserve is a strong fit when you have users who:",{"type":31,"tag":92,"props":1542,"children":1543},{},[1544,1549,1554,1559],{"type":31,"tag":96,"props":1545,"children":1546},{},[1547],{"type":43,"value":1548},"Primarily work from physical PCs.",{"type":31,"tag":96,"props":1550,"children":1551},{},[1552],{"type":43,"value":1553},"Need a secure fallback workspace.",{"type":31,"tag":96,"props":1555,"children":1556},{},[1557],{"type":43,"value":1558},"Can work effectively from a standard Windows 11 image and corporate policy baseline.",{"type":31,"tag":96,"props":1560,"children":1561},{},[1562],{"type":43,"value":1563},"Do not need a customized long-term Cloud PC.",{"type":31,"tag":32,"props":1565,"children":1566},{},[1567],{"type":43,"value":1568},"It is less compelling if your continuity model depends on custom images, hybrid join, or highly tailored network integration.",{"type":31,"tag":51,"props":1570,"children":1571},{"id":228},[1572],{"type":43,"value":231},{"type":31,"tag":32,"props":1574,"children":1575},{},[1576],{"type":43,"value":1577},"Windows 365 Reserve is not a general desktop platform. It is a short-duration recovery mechanism for a specific business continuity scenario. If you treat it that way, it is easy to understand and easy to justify.",{"type":31,"tag":32,"props":1579,"children":1580},{},[1581],{"type":43,"value":1582},"If you try to force it into roles better served by Enterprise, Frontline, or cross-region DR, the limitations become the story.",{"type":31,"tag":51,"props":1584,"children":1585},{"id":239},[1586],{"type":43,"value":242},{"type":31,"tag":92,"props":1588,"children":1589},{},[1590,1600,1610,1620],{"type":31,"tag":96,"props":1591,"children":1592},{},[1593],{"type":31,"tag":250,"props":1594,"children":1597},{"href":1595,"rel":1596},"https://learn.microsoft.com/en-us/windows-365/enterprise/introduction-windows-365-reserve",[254],[1598],{"type":43,"value":1599},"What is Windows 365 Reserve?",{"type":31,"tag":96,"props":1601,"children":1602},{},[1603],{"type":31,"tag":250,"props":1604,"children":1607},{"href":1605,"rel":1606},"https://learn.microsoft.com/en-us/windows-365/enterprise/windows-365-reserve-faq",[254],[1608],{"type":43,"value":1609},"Windows 365 Reserve FAQ",{"type":31,"tag":96,"props":1611,"children":1612},{},[1613],{"type":31,"tag":250,"props":1614,"children":1617},{"href":1615,"rel":1616},"https://learn.microsoft.com/en-us/windows-365/enterprise/windows-365-reserve-manage",[254],[1618],{"type":43,"value":1619},"Managing Windows 365 Reserve",{"type":31,"tag":96,"props":1621,"children":1622},{},[1623],{"type":31,"tag":250,"props":1624,"children":1627},{"href":1625,"rel":1626},"https://learn.microsoft.com/en-us/windows-365/enterprise/whats-new",[254],[1628],{"type":43,"value":1629},"What's new in Windows 365 Enterprise and Frontline",{"title":14,"searchDepth":279,"depth":279,"links":1631},[1632,1633,1634,1635,1636,1637,1638],{"id":1366,"depth":279,"text":1369},{"id":1405,"depth":279,"text":1408},{"id":1439,"depth":279,"text":1442},{"id":1488,"depth":279,"text":1491},{"id":1532,"depth":279,"text":1535},{"id":228,"depth":279,"text":231},{"id":239,"depth":279,"text":242},"content:blog:windows-365-reserve-for-business-continuity.md","blog/windows-365-reserve-for-business-continuity.md",1777986083230]