Identity: The New Perimeter in Zero Trust

Reading Time: 12 minutes9 Welcome to the first deep dive in my Zero Trust blog series. If you’ve read the series introduction, you’ll know that Zero Trust isn’t a single product or a quick fix it’s a strategic approach that touches every part of your digital environment. Over the coming posts, I’ll be breaking down each of the core […]

Continue reading

Zero Trust Blog Series: A Microsoft-Centric Approach

Reading Time: 14 minutes11 Introduction Over the past few years, I’ve seen a growing interest in Zero Trust but also a lot of confusion. Many still view it as a product you can buy or a feature you can switch on. In reality, Zero Trust is a mindset a strategic approach to security that requires continuous verification, least privilege access, […]

Continue reading

Deploying Azure Virtual Desktop – A Modular, Automated Approach

Reading Time: 9 minutes7 Introduction Azure Virtual Desktop (AVD) is Microsoft’s comprehensive Desktop-as-a-Service platform, enabling secure remote access to Windows desktops and apps from virtually anywhere. While powerful, deploying AVD in a robust, enterprise-ready manner can be complex: it requires careful orchestration of network, identity, security, storage, and user access. Manual configuration is time-consuming, error-prone, and difficult to scale or […]

Continue reading

Always On VPN Entra Join – Part 1 Whats needed

Reading Time: 4 minutes2 This is part 1 of my Always On VPN series You can review the pervious posts if required: Introduction Always on VPN is a technology thats been around for some time now almost 10 years or so. It replaced Direct Access that enabled Windows 7 and Windows 8.1 (oh and 8) Enterprise clients to connect […]

Continue reading

Why use a PAW?

Reading Time: 6 minutes4 Introduction Following on from my previous post I have been asked why I use a PAW for my own tenant, and or why not just use a conditional access policy to ensure that a compliant device for the tenant is used by the privileged user. So, I reply with the question, why wouldn’t you want […]

Continue reading

Securing my privileged access with AVD

Reading Time: 3 minutes2 I’m trying to “lead by example” (I use that term loosely), when it comes to privileged access. A bit of background For a long time my regular Microsoft 365 account was also my GA account in my own tenant, I know, I know thats top of the no no’s when it comes to Entra, but, […]

Continue reading