A Guide to Presenting Stuff, sort of
A semi-practical guide to how presenting better helps you learn, whether you're on stage, in a meeting, or just trying to explain a technical idea clearly.
Practical Microsoft Sentinel, Defender XDR, and MISP guides focused on detection engineering, log strategy, and automation.
Browse field-tested walkthroughs on security monitoring architecture, cost optimization, threat intelligence pipelines, and practical detection engineering.
These are currently the most visited posts on the site.
A practical breakdown of the Microsoft Sentinel to Defender XDR migration, including architecture impact, correlation behavior, and planning considerations.
Create and manage Defender XDR custom detection rules through Microsoft Graph API with payload patterns, limits, and caveats.
Use a PowerShell module to manage Defender XDR custom detection rules via Graph API with support for impacted assets, response actions, and SPN auth.
The three most recent posts from the site.
A semi-practical guide to how presenting better helps you learn, covering structure, storytelling, practice, and finding your own style as a speaker.
This Log Horizon tutorial teaches you how to evaluate Microsoft Sentinel tables by cost and detection coverage to identify waste, missing coverage, and optimization opportunities.
This Log Horizon update covers versions 0.2.1 to 0.5.0 with self-contained HTML reports, full KQL transform visibility, retention and correlation analysis, security fixes, and expanded Pester coverage.
Start here if you want a focused reading path by topic.
Cost control, retention choices, and data-tier planning for real-world Sentinel operations.
Detection design, custom rule operations, and Defender XDR execution patterns.
Threat intel ingestion, pipeline hardening, and MISP-to-Sentinel implementation patterns.
Everything on the blog, with tag filtering if you want to narrow it down.
Securing Windows Server - Chapter 3, Part 2