top of page
Search


Identifying Over-Privileged Identities Using Microsoft Graph
All code for this blog can be found here . I keep hearing more and more interest by customers I work with in exploring Cloud...

Shannon
Sep 266 min read
Â
Â
Â


More Home Networking Wrestling!
One of the joys of running a homelab is the constant reminder that technology never sits still. I'm currently in the middle of a massive...

Shannon
Sep 14 min read
Â
Â
Â
APIs Aren't Just For Devs Pt. 10 - AuthN and AuthZ Plus REST APIs Explained!
If you're just joining me at this post, I now have 9 previous blogs that cover APIs in hopes of demystifying developer technology a bit....

Shannon
Aug 21, 20235 min read
Â
Â
Â


Switch Log Analytics Permissions Model
So far, this series has consisted of the previous blog posts: Log Analytics Design and Access Create Inventory of Existing Log Analytics...

Shannon
Mar 21, 20214 min read
Â
Â
Â


Log Analytics Design and Access
In the last 2 years, an entirely new permissions and access model came to Log Analytics. Prior to these permission changes, enterprises...

Shannon
Mar 6, 20214 min read
Â
Â
Â


Rusty vSphere skills: VCSA root password expired...Part 2
With my first blog post inside this series (affectionately named the same title as above, except with "Part 1" being the focus), I...

Shannon
Jan 23, 20212 min read
Â
Â
Â


Rusty vSphere skills: VCSA root password expired...Part 1
...stay with me here...I know I have many years of managing VMware infrastructure as part of my technical career. Guess what changed in...

Shannon
Jan 18, 20213 min read
Â
Â
Â
bottom of page