Description:Understand the challenges of modern desktop management, focusing on zero trust and network considerations during the transition to cloud. Explore high-level scenarios for moving workloads between on-prem and cloud environments, while learning to avoid pitfalls that disrupt traditional practices.
What you will learn: - Proxy support and the importance of allow-listing IP addresses.
- Peering and throttling with cloud content in a zero trust model.
- VPN considerations for cloud environments and zero trust principles.
- Proxy limitations and the relationship between HTTP/3 and UDP over SOCKS.