-
FortiAnalyzer CEF and the Case of the Missing Logs
How to fix FortiAnalyzer's non-compliant CEF messages that lack syslog PRI headers when ingesting to Microsoft Sentinel via Azure Monitor Agent, supporting both rsyslog and syslog-ng environments. -
Using Claude Code to Build a WordPress to Jekyll Migration Tool in Record Time
How I leveraged Claude and Claude Code CLI to rapidly develop a bespoke WordPress to Jekyll migration tool, turning what might have been days of work into a few hours of iterative development. -
Calling Claude Code from PowerShell via WSL — Without Breaking NVM or Losing Context
How to reliably call Claude Code CLI from Windows PowerShell when it's installed in WSL under Node.js via NVM, preserving context and working directory. -
Supported KQL Features in Azure Monitor Data Collection Rule (DCR) Transformations
A comprehensive reference guide to permitted and blocked KQL functions and operators in Azure Monitor Data Collection Rule transformations. -
UniFi Networking: Patterns and Antipatterns
A comprehensive guide to best practices and common pitfalls when designing and implementing UniFi network infrastructure, with practical examples for each pattern and antipattern. -
Command Reference for Linux-based AMA troubleshooting
Essential Linux commands for troubleshooting disk space, syslog, and Azure Monitor Agent connectivity issues, updated for May 2025. -
Blog Revival: Back in the Technical Trenches with AI as my sidekick
Thoughts on returning to blogging after a hiatus, how my return to hands-on technical work combined with the rise of LLMs has sparked a renewed enthusiasm for knowledge sharing and building things. -
Using Azure Log Analytics to retrieve logs for Report-Only Conditional Access Policies
How to use Azure Monitor and KQL queries to analyse sign-ins affected by report-only conditional access policies in Azure AD. -
Using Azure Blob Storage as a highly-available CDP and AIA location for your internal PKI
A practical guide to using Azure Blob Storage as a reliable, highly-available location for hosting your internal PKI's CDP and AIA components. -
Using your service desk system to track and schedule important & security-related tasks
Leveraging service desk systems to automate, track and schedule important security-related tasks like certificate renewals, password rotations, and domain registrations to ensure continuity regardless of staff turnover.
subscribe via RSS