FortiAnalyzer CEF and the Case of the Missing Logs
How to fix FortiAnalyzer's non-compliant CEF messages that lack syslog PRI headers when ingesting to Microsoft Sentinel via Azure Monitor Agent, while reducing ingestion costs through intelligent filtering.Using Claude Code to Build a WordPress to Jekyll Migration Tool in Record Time
How I leveraged Claude and Claude Code CLI to rapidly develop a bespoke WordPress to Jekyll migration tool, turning what might have been days of work into a few hours of iterative development.Calling Claude Code from PowerShell via WSL — Without Breaking NVM or Losing Context
How to reliably call Claude Code CLI from Windows PowerShell when it's installed in WSL under Node.js via NVM, preserving context and working directory.Supported KQL Features in Azure Monitor Data Collection Rule (DCR) Transformations
A comprehensive reference guide to permitted and blocked KQL functions and operators in Azure Monitor Data Collection Rule transformations.UniFi Networking: Patterns and Antipatterns
A comprehensive guide to best practices and common pitfalls when designing and implementing UniFi network infrastructure, with practical examples for each pattern and antipattern.Command Reference for Linux-based AMA troubleshooting
Essential Linux commands for troubleshooting disk space, syslog, and Azure Monitor Agent connectivity issues, updated for May 2025.Blog Revival: Back in the Technical Trenches with AI as my sidekick
Thoughts on returning to blogging after a hiatus, how my return to hands-on technical work combined with the rise of LLMs has sparked a renewed enthusiasm for knowledge sharing and building things.Using Azure Log Analytics to retrieve logs for Report-Only Conditional Access Policies
How to use Azure Monitor and KQL queries to analyse sign-ins affected by report-only conditional access policies in Azure AD.Using Azure Blob Storage as a highly-available CDP and AIA location for your internal PKI
A practical guide to using Azure Blob Storage as a reliable, highly-available location for hosting your internal PKI's CDP and AIA components.Using your service desk system to track and schedule important & security-related tasks
Leveraging service desk systems to automate, track and schedule important security-related tasks like certificate renewals, password rotations, and domain registrations to ensure continuity regardless of staff turnover.
subscribe via RSS