ejazr83's repositories

architecture-center

Azure Architecture Center

Language:LiquidLicense:CC-BY-4.0Stargazers:0Issues:0Issues:0

AttackSurfaceAnalyzer

Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.

Language:C#License:MITStargazers:0Issues:0Issues:0

azure-docs

Open source documentation of Microsoft Azure

Language:PowerShellStargazers:0Issues:0Issues:0

azure-quickstart-templates

Azure Quickstart Templates

Language:PowerShellLicense:MITStargazers:0Issues:0Issues:0

Book-Summaries

Book Summaries that I have read and find interesting in my own words

Stargazers:0Issues:0Issues:0
License:MITStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

jekyll-now

Build a Jekyll blog in minutes, without touching the command line.

Language:CSSLicense:MITStargazers:0Issues:0Issues:0

microsoft-365-docs

This repo is used to host the source for the Microsoft 365 documentation on https://docs.microsoft.com.

Language:PowerShellLicense:CC-BY-4.0Stargazers:0Issues:0Issues:0

Microsoft365DSC

Manages, configures, extracts and monitors Microsoft 365 tenant configurations

Language:PowerShellLicense:MITStargazers:0Issues:0Issues:0

Mining-the-Social-Web-3rd-Edition

The official online compendium for Mining the Social Web, 3rd Edition (O'Reilly, 2018)

License:NOASSERTIONStargazers:0Issues:0Issues:0

nodejs-docs-hello-world

A simple nodejs application for docs

Language:JavaScriptLicense:MITStargazers:0Issues:0Issues:0

og-aws

📙 Amazon Web Services — a practical guide

Language:ShellLicense:CC-BY-4.0Stargazers:0Issues:0Issues:0

Portfolio

This is an initial Code portfolio

License:MITStargazers:0Issues:0Issues:0

PowerShell

PowerShell for every system!

Language:C#License:NOASSERTIONStargazers:0Issues:0Issues:0

SecCon-Framework

Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuration into Productivity Devices and Privileged Access Workstations. This document will focus on Productivity Devices (SECCON 5, 4, and 3). Microsoft’s current guidance on Privileged Access Workstations can be found at http://aka.ms/cyberpaw and as part of the Securing Privileged Access roadmap found at http://aka.ms/privsec.

License:CC-BY-4.0Stargazers:0Issues:0Issues:0