• Home
  • About
    • Contact
    • Connect
  • Blog
  • Categories
    • AI
    • Automation
    • Compliance & Governance
    • Copilot
    • Cyber Security
    • Data Protection
    • GitHub
    • Information Protection
    • Mac OS
    • Microsoft
      • Azure
      • Azure Virtual Desktop
      • Entra
      • Intune
      • Microsoft Graph
      • Windows 11
      • Windows 365
      • Windows App
    • Microsoft 365 Security
    • Networking
    • Passwordless
    • PowerShell
    • Privileged Access
    • Privileged Identity
    • Scripting
      • Python
    • Security Strategy
    • Self-Hosting
    • Ubuntu
    • Uncategorized
    • Virtual
    • VPN
    • Web Development
    • WordPress
    • Zero Trust

Andy Kemp

Solutions, not theory

Posts in "Privileged Identity"

Applications – The Third Pillar of Zero Trust

November 21, 2025 Andy
In the first two posts of this Zero Trust series, we established that identity is the new perimeter and devices are the frontline of defence. By verifying every user and...
Read More

Identity: The New Perimeter in Zero Trust

October 31, 2025 Andy
Welcome to the first deep dive in my Zero Trust blog series. If you’ve read the series introduction, you’ll know that Zero Trust isn’t a single product or a quick...
Read More

Virtual PAW – Part 4 – Completing the basic setup

March 23, 2025 Andy
So this is part 4 of my multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW.. Introduction In this part I'll go...
Read More

Virtual PAW – Part 3 – Deploying the session hosts

February 27, 2025 Andy
So this is the 3rd part of a multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW.. Introduction Welcome to the 3rd...
Read More

Virtual PAW – Part 2 – Core Components

February 18, 2025 Andy
So this is the 2nd part of a multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW. Part One was the high...
Read More

Virtual PAW – Part 1 – A high level overview

February 14, 2025 Andy
I have decided to create this as a multi part post to hopefully make it easier to understand. Introduction So Following on from my last post I thought I'd share...
Read More

Securing my privileged access with AVD

January 15, 2025 Andy
I'm trying to "lead by example" (I use that term loosely), when it comes to privileged access. A bit of background For a long time my regular Microsoft 365 account...
Read More

Privileged Identity Management and Access Tiers

July 2, 2024 Andy
I've been working with a customer recently assisting with sorting out their privileged access and assisting them with their adoption of PIM (Privileged Identity Manager) Whilst I'd argue that PIM...
Read More

Archives

    • πŸ“„December (1)
    • πŸ“„November (2)
    • πŸ“„October (2)
    • πŸ“„August (2)
    • πŸ“„July (2)
    • πŸ“„June (1)
    • πŸ“„May (7)
    • πŸ“„April (2)
    • πŸ“„March (1)
    • πŸ“„February (4)
    • πŸ“„January (1)
    • πŸ“„July (1)
    • πŸ“„June (1)
    • πŸ“„May (6)

Apache App Protection Policies automation AVD Azure azure-automation Azure Virtual Desktop BYOD certificate-authentication Cloud Security Strategy Compliance Conditional Access cron Cyber Security Data Security Devices DLP (Data Loss Prevention) dns-management EDR Elgato Keylight Air Encryption entra-id Entra ID home-networking Hosting Intune LAMP linux Microsoft Microsoft Graph Microsoft Purview Networking PowerShell Privileged Access Privileged Identity python Scripting self-hosting Sensitivity Labels Shadow IT storage Ubuntu Virtual Wordpress Zero Trust

© 2025 Andy Kemp. All rights reserved.

Solutions, not theory