Reading Time: 7 minutes4 So this is part 4 of my multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW.. Introduction In this part I’ll go through what I did to complete the basic setup, this will then enable you to log on to the Azure Virtual Desktop PAW’s from the […]
Continue readingCategory Archives: Privileged Identity
Virtual PAW – Part 3 – Deploying the session hosts
Reading Time: 10 minutes7 So this is the 3rd part of a multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW.. Introduction Welcome to the 3rd installment of my multipart series on using a virtual/cloud PAW. By now you have hopefully deployed the core components for AVD, the Host pool, the […]
Continue readingVirtual PAW – Part 2 – Core Components
Reading Time: 10 minutes9 So this is the 2nd part of a multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW. Part One was the high level overview of what I have done. Introduction Welcome to the 2nd installment of my posts on using AVD as a PAW. It is probably […]
Continue readingVirtual PAW – Part 1 – A high level overview
Reading Time: 11 minutes7 I have decided to create this as a multi part post to hopefully make it easier to understand. Introduction So Following on from my last post I thought I’d share how I actually went about deploying my AVD environment as a PAW. This post is a high level overview of what I have done. The […]
Continue readingSecuring my privileged access with AVD
Reading Time: 3 minutes2 I’m trying to “lead by example” (I use that term loosely), when it comes to privileged access. A bit of background For a long time my regular Microsoft 365 account was also my GA account in my own tenant, I know, I know thats top of the no no’s when it comes to Entra, but, […]
Continue readingPrivileged Identity Management and Access Tiers
Reading Time: 7 minutes5 Introduction I’ve been working with a customer recently assisting with sorting out their privileged access and assisting them with their adoption of PIM (Privileged Identity Manager) Whilst I’d argue that PIM is not essential to secure you access to Entra, it is, in my view good practice and reduces the attack surface. You can use […]
Continue reading