<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Blog on Jeremiah Windle</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/</link><description>Recent content in Blog on Jeremiah Windle</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 01 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://7f57629a.jeremiahwindle.pages.dev/blog/index.xml" rel="self" type="application/rss+xml"/><item><title>MSP to Enterprise: Skills That Transfer and Gaps You Need to Close</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/msp-to-enterprise-skills/</link><pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/msp-to-enterprise-skills/</guid><description>Four years in an MSP seat gives you something that&amp;rsquo;s genuinely hard to get in enterprise IT: breadth under pressure. When you&amp;rsquo;re responsible for network infrastructure across 40 different organizations simultaneously — each with different tools, different configurations, and different stakes — you develop a kind of situational awareness that pure deep-dive engineers often don&amp;rsquo;t have.
But it also leaves gaps. Real ones. This post is an honest accounting of both.</description></item><item><title>SIEM Platforms Compared: Kibana vs Perch vs Splunk From an MSP Seat</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/siem-platforms-compared/</link><pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/siem-platforms-compared/</guid><description>Most SIEM comparisons are written by vendors or analysts who&amp;rsquo;ve seen the demos. This one is written by someone who&amp;rsquo;s used these platforms in production — ingesting real logs, tuning real alerts, and investigating real incidents across dozens of client environments. Here&amp;rsquo;s what actually matters.
The Three Platforms I&amp;rsquo;ve had meaningful production time with:
Kibana (ELK Stack) — primary SIEM at my current MSP for security operations across municipal government clients Perch Security — co-managed SIEM platform purpose-built for MSPs, used across 40+ client organizations Splunk — exposure through client environments and hands-on study; included here for completeness against the standard that everyone measures against Kibana (ELK Stack) Kibana is the visualization layer on top of Elasticsearch and Logstash — the &amp;ldquo;K&amp;rdquo; in ELK.</description></item><item><title>Entra ID Conditional Access: Real Policies, Real Scenarios, What to Actually Enforce</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/conditional-access-policies/</link><pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/conditional-access-policies/</guid><description>Conditional Access is one of those features where the gap between &amp;ldquo;we have it enabled&amp;rdquo; and &amp;ldquo;we have it configured correctly&amp;rdquo; is wide enough that attackers drive through it regularly. I&amp;rsquo;ve managed CA policies across 100+ organizations at two MSPs. Here&amp;rsquo;s the framework I&amp;rsquo;ve landed on.
The Foundation: What CA Actually Is Conditional Access is Entra ID&amp;rsquo;s policy engine. Every sign-in attempt hits it, and the policy evaluates conditions — who is signing in, from where, on what device, to what application — and makes a decision: allow, block, or allow with requirements (MFA, compliant device, etc.</description></item><item><title>My CCNA Study Plan: Resources, Schedule, and How I'm Using Physical Lab Gear</title><link>https://7f57629a.jeremiahwindle.pages.dev/blog/ccna-study-plan/</link><pubDate>Thu, 15 Jan 2026 00:00:00 +0000</pubDate><guid>https://7f57629a.jeremiahwindle.pages.dev/blog/ccna-study-plan/</guid><description>Target date: June 2026. Here&amp;rsquo;s the actual plan — resources, schedule, lab setup, and where I&amp;rsquo;m struggling.
Why the CCNA Matters for Me Specifically I&amp;rsquo;ve been managing Cisco Meraki, Fortinet, and UniFi networks across 40+ client organizations for four years. I can configure a FortiGate firewall policy, troubleshoot a VLAN trunk, set up a site-to-site VPN, and triage a flapping BGP session at 2am. The CCNA doesn&amp;rsquo;t teach me most of this — I&amp;rsquo;m already doing it.</description></item></channel></rss>