<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Jeremiah Windle</title><link>https://7f57629a.jeremiahwindle.pages.dev/</link><description>Recent content on Jeremiah Windle</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 01 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://7f57629a.jeremiahwindle.pages.dev/index.xml" rel="self" type="application/rss+xml"/><item><title>MSP to Enterprise: Skills That Transfer and Gaps You Need to Close</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/msp-to-enterprise-skills/</link><pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/msp-to-enterprise-skills/</guid><description>Four years in an MSP seat gives you something that&amp;rsquo;s genuinely hard to get in enterprise IT: breadth under pressure. When you&amp;rsquo;re responsible for network infrastructure across 40 different organizations simultaneously — each with different tools, different configurations, and different stakes — you develop a kind of situational awareness that pure deep-dive engineers often don&amp;rsquo;t have.
But it also leaves gaps. Real ones. This post is an honest accounting of both.</description></item><item><title>SIEM Platforms Compared: Kibana vs Perch vs Splunk From an MSP Seat</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/siem-platforms-compared/</link><pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/siem-platforms-compared/</guid><description>Most SIEM comparisons are written by vendors or analysts who&amp;rsquo;ve seen the demos. This one is written by someone who&amp;rsquo;s used these platforms in production — ingesting real logs, tuning real alerts, and investigating real incidents across dozens of client environments. Here&amp;rsquo;s what actually matters.
The Three Platforms I&amp;rsquo;ve had meaningful production time with:
Kibana (ELK Stack) — primary SIEM at my current MSP for security operations across municipal government clients Perch Security — co-managed SIEM platform purpose-built for MSPs, used across 40+ client organizations Splunk — exposure through client environments and hands-on study; included here for completeness against the standard that everyone measures against Kibana (ELK Stack) Kibana is the visualization layer on top of Elasticsearch and Logstash — the &amp;ldquo;K&amp;rdquo; in ELK.</description></item><item><title>Network Config Backup</title><link>https://7f57629a.jeremiahwindle.pages.dev/tools/network-config-backup/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/tools/network-config-backup/</guid><description>Pulls running configurations from multiple Cisco IOS devices over SSH and saves them as timestamped files. Reads device inventory from a YAML file — no hardcoded credentials, no hardcoded hostnames.
What It Does Reads device list from devices.yaml (hostname, IP, credentials, device type) SSHs into each device using Netmiko Runs show running-config and captures output Saves each config as {hostname}_{YYYY-MM-DD_HH-MM}.txt Logs success/failure per device to backup.log Sends an email summary when complete (optional) Built initially to run nightly via cron across MSP client sites.</description></item><item><title>Entra ID Conditional Access: Real Policies, Real Scenarios, What to Actually Enforce</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/conditional-access-policies/</link><pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/conditional-access-policies/</guid><description>Conditional Access is one of those features where the gap between &amp;ldquo;we have it enabled&amp;rdquo; and &amp;ldquo;we have it configured correctly&amp;rdquo; is wide enough that attackers drive through it regularly. I&amp;rsquo;ve managed CA policies across 100+ organizations at two MSPs. Here&amp;rsquo;s the framework I&amp;rsquo;ve landed on.
The Foundation: What CA Actually Is Conditional Access is Entra ID&amp;rsquo;s policy engine. Every sign-in attempt hits it, and the policy evaluates conditions — who is signing in, from where, on what device, to what application — and makes a decision: allow, block, or allow with requirements (MFA, compliant device, etc.</description></item><item><title>Ping Sweep</title><link>https://7f57629a.jeremiahwindle.pages.dev/tools/ping-sweep/</link><pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/tools/ping-sweep/</guid><description>Simple subnet scanner. Pass it a CIDR range, get back a list of live hosts.
1python sweep.py 10.0.10.0/24</description></item><item><title>My CCNA Study Plan: Resources, Schedule, and How I'm Using Physical Lab Gear</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/ccna-study-plan/</link><pubDate>Thu, 15 Jan 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/ccna-study-plan/</guid><description>Target date: June 2026. Here&amp;rsquo;s the actual plan — resources, schedule, lab setup, and where I&amp;rsquo;m struggling.
Why the CCNA Matters for Me Specifically I&amp;rsquo;ve been managing Cisco Meraki, Fortinet, and UniFi networks across 40+ client organizations for four years. I can configure a FortiGate firewall policy, troubleshoot a VLAN trunk, set up a site-to-site VPN, and triage a flapping BGP session at 2am. The CCNA doesn&amp;rsquo;t teach me most of this — I&amp;rsquo;m already doing it.</description></item><item><title>About</title><link>https://7f57629a.jeremiahwindle.pages.dev/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/about/</guid><description>The Story I&amp;rsquo;ve spent the last four-plus years working as an L2 Helpdesk Technician at MSPs — which is a title that dramatically understates what the job actually is.
Managing infrastructure for 100+ organizations and 3,000+ endpoints means you don&amp;rsquo;t get to have a &amp;ldquo;this isn&amp;rsquo;t my job&amp;rdquo; mindset. You deal with network outages, security incidents, identity issues, firewall misconfigurations, and failed backups — often simultaneously, often at 2am, always with a client on the phone.</description></item><item><title>The Lab</title><link>https://7f57629a.jeremiahwindle.pages.dev/lab/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/lab/</guid><description>Philosophy Everything on this site gets tested on real gear before it&amp;rsquo;s published. I don&amp;rsquo;t write about how something should work — I write about how it actually works, including what breaks and how I fixed it.
The software stack is entirely free and open source. Proxmox VE instead of vSphere (for the cluster), OPNsense instead of commercial firewalls (for software firewall labs), TrueNAS Scale for storage, GNS3 and EVE-NG for network topologies.</description></item></channel></rss>