PS> Get-Knowledge | Out-Blog
About Me
  • May 14, 2025

    UniFi Networking: Patterns and Antipatterns

    A comprehensive guide to best practices and common pitfalls when designing and implementing UniFi network infrastructure, with practical examples for each pattern and antipattern.
    unifiubiquitivlanwirelessnetwork-designsecurityai-generated
    Read more
  • May 9, 2025

    Command Reference for Linux-based AMA troubleshooting

    Essential Linux commands for troubleshooting disk space, syslog, and Azure Monitor Agent connectivity issues, updated for May 2025.
    azure-monitor-agentsyslogdisk-spacenetworkingcommands
    Read more
  • May 1, 2025

    Blog Revival: Back in the Technical Trenches with AI as my sidekick

    Thoughts on returning to blogging after a hiatus, how my return to hands-on technical work combined with the rise of LLMs has sparked a renewed enthusiasm for knowledge sharing and building things.
    bloggingllmsai-assistedtechnical-writing
    Read more
  • Apr 30, 2020

    Using Azure Log Analytics to retrieve logs for Report-Only Conditional Access Policies

    How to use Azure Monitor and KQL queries to analyse sign-ins affected by report-only conditional access policies in Azure AD.
    azureazureadazure-monitorconditional-accesskqllog-analytics
    Read more
  • Oct 6, 2018

    Using Azure Blob Storage as a highly-available CDP and AIA location for your internal PKI

    A practical guide to using Azure Blob Storage as a reliable, highly-available location for hosting your internal PKI's CDP and AIA components.
    pkiwindowsazure-storagecertificatesblob-storage
    Read more
  • Sep 19, 2018

    Using your service desk system to track and schedule important & security-related tasks

    Leveraging service desk systems to automate, track and schedule important security-related tasks like certificate renewals, password rotations, and domain registrations to ensure continuity regardless of staff turnover.
    securityservice-desk
    Read more
  • Oct 24, 2017

    Mitigate commodity malware attacks with Windows Firewall rules

    Using built-in Windows Firewall rules to prevent common malware and ransomware attacks by blocking network access for script hosts and command interpreters while still allowing internal network communication.
    powershellsecuritywindows-firewall
    Read more
  • May 18, 2016

    Correct Horse Battery Staple for PowerShell, AKA Random Memorable Password Generator

    Creating a PowerShell function to generate memorable passwords based on the XKCD 'correcthorsebatterystaple' concept - a simple approach to generating random but memorable passwords using common words.
    invoke-webrequestpasswordspowershellsystems-administration
    Read more
  • Nov 23, 2015

    String Concatenation in PowerShell

    Learn more efficient ways to concatenate strings in PowerShell using expanding strings and the format operator instead of the traditional concatenation method.
    powershellstring-formatting
    Read more
  • Aug 14, 2015

    Reading the Windows DHCP Server logs with PowerShell

    A PowerShell function to read and parse Windows DHCP server logs for troubleshooting IP assignment issues across various VLANs.
    dhcppowershellserver-2012-r2windows
    Read more
« Previous Page 4 of 6 Next »
Daniel Streefkerk
  • dstreefkerk
  • egosumdns
  • RSS

My collection of useful content that's worth sharing with the world. Windows Security, Cloud Security, PowerShell, AI, Model Context Protocol, and more.