Skip to main content
DaaS

How DaaS Actually Works: Three Advantages and the Mechanics Behind Them

Three real advantages of DaaS, explained by what actually happens in the stack underneath them.

John Lane 2024-10-15 7 min read
How DaaS Actually Works: Three Advantages and the Mechanics Behind Them

Most "how does DaaS work" articles are one layer deep. They say "your desktop runs in the cloud and you access it from a thin client" and then list features. That is not enough to make a good buying decision and it is definitely not enough to troubleshoot a deployment when something breaks.

Here is how DaaS actually works under the hood, organized around three real advantages and the mechanics that deliver them. We have run enough DaaS deployments in production — Azure Virtual Desktop, Windows 365, Amazon WorkSpaces, Citrix DaaS — to have opinions about what each one does well and where the marketing oversells.

Advantage One: The Provider Operates Everything Below the Guest OS

In a traditional VDI deployment, the IT team is responsible for: the hypervisor, the physical hosts, the shared storage, the connection broker, the gateway, the load balancers, the backup infrastructure, the monitoring, the identity integration, the profile management, the golden images, and the Windows guest OS inside each desktop. That is ten layers of stack, each with its own failure modes, each needing maintenance and expertise.

In DaaS, the provider operates everything from the hypervisor down to the host OS, the session broker, the gateway, and often the identity glue. The customer operates the guest OS image, the applications inside it, the user accounts, and the policies. That is a meaningful reduction in surface area.

The mechanics

What the provider is actually doing under the hood:

  • Host pool management. The provider runs a fleet of Windows hypervisor hosts (Hyper-V on Azure, a custom hypervisor on AWS) and allocates guest VMs across them based on capacity and affinity. When a host fails, the guest VMs migrate automatically. The customer does not see the host layer at all.
  • Connection brokering. When a user launches their DaaS client, the client does not connect to the desktop directly. It first contacts a broker service that authenticates the user, finds an available desktop (or wakes up the user's assigned one), and returns a connection token. This broker is stateful, highly available, and managed entirely by the provider.
  • Gateway and transport. The actual session traffic flows through a provider-operated gateway that handles TLS termination, websocket tunneling for web clients, and protocol translation. In Azure Virtual Desktop this is the Azure Virtual Desktop gateway and it is one of the most load-tested pieces of infrastructure Microsoft runs.
  • Storage for profiles. In Windows 365 and AVD with FSLogix, user profile containers are stored on provider-managed file storage (Azure Files, Azure NetApp Files, or comparable). The provider handles snapshots, replication, and capacity.
  • Patching of the infrastructure layer. Hypervisor patches, firmware updates, and host OS updates all happen in the background. The customer does not schedule them and does not see them.

What the customer is actually doing:

  • Building and maintaining the guest OS image (usually Windows 10 or Windows 11 Enterprise)
  • Installing and configuring line-of-business applications
  • Managing users, groups, and access policies
  • Setting up profile redirection and FSLogix exclusions
  • Configuring session host pools and assignment
  • Monitoring user experience and responding to tickets

The split is roughly 70-30 in the provider's favor for operational effort. That is where the "managed" part of the value comes from — not that there is nothing to do, but that the things that remain are the application-level things that you have to do anyway, while the infrastructure-level things are handled.

Advantage Two: Elastic Capacity Matches Real Usage Patterns

Traditional VDI is sized for peak. You buy hosts, storage, and licenses for your 9 AM logon storm, and those hosts sit at 30 percent utilization the rest of the day. The capital cost is sized for the worst hour.

DaaS changes this shape by letting you scale horizontally in response to actual demand. In Azure Virtual Desktop, you configure auto-scale rules that bring host pool VMs online when session demand rises and shut them down when demand drops. In Windows 365 you pay per assigned user with no peak-sizing penalty. In WorkSpaces you pay hourly for hourly-use desktops and monthly for full-time ones.

The mechanics

The elasticity is not magic — it is a specific set of mechanisms that you configure and the provider executes.

  • Scaling plans. AVD lets you define schedules (weekday business hours, after-hours, weekend) and for each schedule specify a minimum percentage of hosts running and a ramp-up / ramp-down threshold. At 8 AM your scaling plan brings hosts online. At 6 PM it drains and stops them. Session hosts that have no active sessions are shut down first.
  • Session density targets. You tell the scaler how many sessions per host is "comfortable" and it adds capacity when average density rises above that threshold. Too low and you waste money on half-empty hosts. Too high and logon time starts to degrade. We typically start at 10 to 15 for office workloads and tune from there.
  • Start-on-connect. Individual desktops can be configured to power on when a user tries to connect. The user waits 30 to 60 seconds for the VM to boot, then gets their session. For users who log in once a day or once a week, this saves most of the compute cost.
  • Per-user vs per-hour billing. Different provider products use different billing models. Windows 365 is per assigned user per month. AVD is per VM per hour plus per user per month for the licensing. WorkSpaces offers both. Matching the billing model to the usage pattern is where 30 to 50 percent of cost optimization opportunities live.

The gap between a naive "all hosts running all the time" deployment and a well-tuned scaled deployment is typically 40 to 60 percent of the monthly bill. This is the single biggest lever we pull when a customer comes to us with a DaaS bill that feels wrong.

Advantage Three: Identity and Policy Integration Is Deep

The third real advantage of DaaS — especially Microsoft-stack DaaS — is that identity and policy integration is not bolted on. Entra ID is the authentication plane, Intune is the policy plane, and Defender is the security plane, and a DaaS desktop is a first-class object in all three.

The mechanics

What this means in practice:

  • Single sign-on from endpoint to desktop to SaaS apps. A user with an Entra-joined endpoint authenticates once to their device. That authentication federates to the DaaS broker, which passes it to the guest OS, which uses it for Kerberos and Entra-backed SaaS apps running inside the session. No second password, no re-auth round trip.
  • Conditional Access policies that apply to the session. You can require MFA to start a DaaS session, block sessions from non-compliant devices, require sessions to originate from named locations, and enforce session time-of-day restrictions. These are the same Conditional Access policies that govern M365 access, applied to the remote desktop session.
  • Intune-managed guest OS. The guest OS inside the DaaS desktop can be Intune-enrolled. Policies, baselines, and software deployment that you already use for physical devices apply unchanged to the DaaS desktops. One management plane instead of two.
  • Defender for Cloud and Defender for Endpoint coverage. The DaaS guest OS can be enrolled in Defender for Endpoint, giving you the same EDR telemetry, the same alerting, and the same automated response you have on physical endpoints.

For customers who are already on Microsoft for identity and endpoint management, this deep integration is the honest reason to pick Microsoft-stack DaaS over alternatives. It is not that AVD is the fastest protocol or the cheapest seat — it is that the integration with the rest of the Microsoft stack saves more operational effort than the protocol or per-seat price matters for.

For customers who are not on Microsoft, the calculus is different. Amazon WorkSpaces integrates better with AWS IAM and Directory Service. Citrix DaaS integrates with everything at the cost of being the most complex option. Pick the DaaS that matches your existing identity and management stack, not the one with the best marketing page.

What Usually Breaks

No honest how-it-works article should skip the failure modes. The three things that most often cause DaaS deployments to feel bad:

  • Network quality between user and gateway. The provider operates the gateway well, but they do not operate the last mile. A bad home Wi-Fi router will ruin the experience no matter how good the DaaS platform is.
  • Profile container growth. Users' FSLogix containers grow over time. When they hit 10+ GB, logon starts to take 30+ seconds and then a minute and then users start calling. Actively manage container size.
  • Golden image drift. The customer still owns the guest OS image. If you update it in place instead of rebuilding it, inconsistencies accumulate. Rebuild the image monthly from a clean base and you avoid a whole class of weird problems.

DaaS works. It is not magic — it is a specific engineering architecture with specific tradeoffs — and knowing those tradeoffs is what separates a happy deployment from a frustrated one.

Talk with us about your infrastructure

Schedule a consultation with a solutions architect.

Schedule a Consultation
Talk to an expert →