Pinned Repositories
architecture-center
Azure Architecture Center
AttackSurfaceAnalyzer
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
azure-docs
Open source documentation of Microsoft Azure
azure-quickstart-templates
Azure Quickstart Templates
Book-Summaries
Book Summaries that I have read and find interesting in my own words
ejazr83.github.io
github-pages-with-jekyll
jekyll-now
Build a Jekyll blog in minutes, without touching the command line.
microsoft-365-docs
This repo is used to host the source for the Microsoft 365 documentation on https://docs.microsoft.com.
Microsoft365DSC
Manages, configures, extracts and monitors Microsoft 365 tenant configurations
ejazr83's Repositories
ejazr83/architecture-center
Azure Architecture Center
ejazr83/AttackSurfaceAnalyzer
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
ejazr83/azure-docs
Open source documentation of Microsoft Azure
ejazr83/azure-quickstart-templates
Azure Quickstart Templates
ejazr83/Book-Summaries
Book Summaries that I have read and find interesting in my own words
ejazr83/ejazr83.github.io
ejazr83/github-pages-with-jekyll
ejazr83/jekyll-now
Build a Jekyll blog in minutes, without touching the command line.
ejazr83/microsoft-365-docs
This repo is used to host the source for the Microsoft 365 documentation on https://docs.microsoft.com.
ejazr83/Microsoft365DSC
Manages, configures, extracts and monitors Microsoft 365 tenant configurations
ejazr83/Mining-the-Social-Web-3rd-Edition
The official online compendium for Mining the Social Web, 3rd Edition (O'Reilly, 2018)
ejazr83/nodejs-docs-hello-world
A simple nodejs application for docs
ejazr83/og-aws
📙 Amazon Web Services — a practical guide
ejazr83/Portfolio
This is an initial Code portfolio
ejazr83/PowerShell
PowerShell for every system!
ejazr83/SecCon-Framework
Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns. The SECCON Baselines divide configuration into Productivity Devices and Privileged Access Workstations. This document will focus on Productivity Devices (SECCON 5, 4, and 3). Microsoft’s current guidance on Privileged Access Workstations can be found at http://aka.ms/cyberpaw and as part of the Securing Privileged Access roadmap found at http://aka.ms/privsec.