Windows Thin PC

Windows Thin PC enables customers to repurpose existing PCs as thin clients by providing a smaller footprint, locked down version of Windows 7. This provides organizations with significant benefits:

  • Reduced End Point costs for VDI

    Windows Thin PC empowers enterprises to leverage their end point hardware investments to access virtual desktops that are delivered using VDI or sessions. Windows Thin PC is available as a benefit of SA, and hence does not represent any additional cost for SA customers. Windows Thin PC also provides IT with the flexibility to revert back to PCs if necessary, in case the thin client computing model does not provide the benefits they were after.

  • Excellent Thin Client experience

    Windows Thin PC offers many of the benefits of a thin client. Organizations can improve security and compliance on their repurposed PCs, by using write filters to prevent data from being written to disk. Additionally, Windows Thin PC ensures a rich remote desktop experience through RemoteFX, enabling delivery of high fidelity multimedia content from centralized desktops.

  • Enterprise Ready platform

    Windows Thin PC is built on the proven Windows 7 platform. Organizations can leverage existing management strategy and tools such as System Center to centrally manage Windows Thin PC, including accelerated role based deployment of applications, security patches, updates, and data. Enterprise features such as BitLocker and AppLocker further help IT secure their devices, while DirectAccess helps customers securely access their corporate data on repurposed laptops.

  • Microsoft recommends that customers who are currently evaluating thin client computing begin their journey by first repurposing existing PCs as thin clients with Windows Thin PC and evaluate the benefits they would get with this architecture. Once Windows Thin PC device hardware get decommissioned, customers can then purchase new Windows Embedded Thin Clients from our OEM partners without having to make changes to their existing management and security policies.