Reading Time: 7 minutes4 So this is part 4 of my multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW.. Introduction In this part I’ll go through what I did to complete the basic setup, this will then enable you to log on to the Azure Virtual Desktop PAW’s from the […]
Continue readingTag Archives: Microsoft
Virtual PAW – Part 3 – Deploying the session hosts
Reading Time: 10 minutes7 So this is the 3rd part of a multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW.. Introduction Welcome to the 3rd installment of my multipart series on using a virtual/cloud PAW. By now you have hopefully deployed the core components for AVD, the Host pool, the […]
Continue readingVirtual PAW – Part 2 – Core Components
Reading Time: 10 minutes9 So this is the 2nd part of a multi part series on my journey with Bicep and ARM Templates and deploying AVD as a PAW. Part One was the high level overview of what I have done. Introduction Welcome to the 2nd installment of my posts on using AVD as a PAW. It is probably […]
Continue readingVirtual PAW – Part 1 – A high level overview
Reading Time: 11 minutes7 I have decided to create this as a multi part post to hopefully make it easier to understand. Introduction So Following on from my last post I thought I’d share how I actually went about deploying my AVD environment as a PAW. This post is a high level overview of what I have done. The […]
Continue readingWhy use a PAW?
Reading Time: 6 minutes4 Introduction Following on from my previous post I have been asked why I use a PAW for my own tenant, and or why not just use a conditional access policy to ensure that a compliant device for the tenant is used by the privileged user. So, I reply with the question, why wouldn’t you want […]
Continue readingSecuring my privileged access with AVD
Reading Time: 3 minutes2 I’m trying to “lead by example” (I use that term loosely), when it comes to privileged access. A bit of background For a long time my regular Microsoft 365 account was also my GA account in my own tenant, I know, I know thats top of the no no’s when it comes to Entra, but, […]
Continue readingPrivileged Identity Management and Access Tiers
Reading Time: 7 minutes5 Introduction I’ve been working with a customer recently assisting with sorting out their privileged access and assisting them with their adoption of PIM (Privileged Identity Manager) Whilst I’d argue that PIM is not essential to secure you access to Entra, it is, in my view good practice and reduces the attack surface. You can use […]
Continue readingCost effective IPSec Site to Site VPN with Azure and UDM
Reading Time: 14 minutes9 Introduction There are many ways to establish a VPN between my UDM and Azure andI’ve tried them all, but, for the best result I would still recommend using an Azure Virtual Network Gateway. However, that does come with a price tag! Sure, there is the basic Virtual Network Gateway SKU that you can use which […]
Continue readingCreating Multiple Security Groups in Microsoft Entra
Reading Time: 4 minutes3 I was recently asked if there was a quick way to create 180 plus Security Groups in Microsoft Entra. I used to do a lot of PowerShell Scripting but not done much in recent years. Also with the switch to Microsoft Graph for management now I was treading in new territory. Previously I would have […]
Continue reading