{"id":9002,"date":"2024-09-06T06:51:32","date_gmt":"2024-09-06T13:51:32","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=9002"},"modified":"2024-08-30T09:22:37","modified_gmt":"2024-08-30T16:22:37","slug":"verifying-device-health-at-microsoft-with-zero-trust","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/verifying-device-health-at-microsoft-with-zero-trust\/","title":{"rendered":"Verifying device health at Microsoft with Zero Trust"},"content":{"rendered":"
Here at Microsoft, we\u2019re using our Zero Trust security model to help us transform the way we verify device health across all devices that access company resources. Zero Trust supplies an integrated security philosophy and end-to-end strategy that informs how our company protects its customers, data, employees, and business in an increasingly complex and dynamic digital world.<\/p>\n
Verified device health is a core pillar of our Microsoft Digital Zero Trust security model. Because unmanaged devices are an easy entry point for bad actors, ensuring that only healthy devices can access corporate applications and data is vital for enterprise security. As a fundamental part of our Zero Trust implementation, we require all user devices accessing corporate resources to be enrolled in device-management systems.<\/p>\n
Verified devices support our broader framework for Zero Trust, alongside the other pillars of verified identity, verified access, and verified services.<\/p>\n