No description
  • PowerShell 99.7%
  • Python 0.2%
Find a file
2026-04-19 14:22:50 -04:00
AD bulk upload to forgejo 2026-04-19 14:22:50 -04:00
Azure bulk upload to forgejo 2026-04-19 14:22:50 -04:00
DHCP bulk upload to forgejo 2026-04-19 14:22:50 -04:00
DNS bulk upload to forgejo 2026-04-19 14:22:50 -04:00
ExchangeOnline bulk upload to forgejo 2026-04-19 14:22:50 -04:00
GPOs bulk upload to forgejo 2026-04-19 14:22:50 -04:00
Hyper-V bulk upload to forgejo 2026-04-19 14:22:50 -04:00
Intune bulk upload to forgejo 2026-04-19 14:22:50 -04:00
LAPS bulk upload to forgejo 2026-04-19 14:22:50 -04:00
Office bulk upload to forgejo 2026-04-19 14:22:50 -04:00
Office365 bulk upload to forgejo 2026-04-19 14:22:50 -04:00
Powershell bulk upload to forgejo 2026-04-19 14:22:50 -04:00
Printers bulk upload to forgejo 2026-04-19 14:22:50 -04:00
RDP bulk upload to forgejo 2026-04-19 14:22:50 -04:00
SharePoint bulk upload to forgejo 2026-04-19 14:22:50 -04:00
.gitignore bulk upload to forgejo 2026-04-19 14:22:50 -04:00
Admark-All-GPOs.html bulk upload to forgejo 2026-04-19 14:22:50 -04:00
ATR-All-GPOs.html bulk upload to forgejo 2026-04-19 14:22:50 -04:00
CDF-All-GPOs.html bulk upload to forgejo 2026-04-19 14:22:50 -04:00
Copy-Files-With-WinSCP.bat bulk upload to forgejo 2026-04-19 14:22:50 -04:00
eval-to-standard.ps1 bulk upload to forgejo 2026-04-19 14:22:50 -04:00
exchange-online-smtp-auth.ps1 bulk upload to forgejo 2026-04-19 14:22:50 -04:00
LICENSE Initial commit 2026-04-19 14:15:14 -04:00
README.md bulk upload to forgejo 2026-04-19 14:22:50 -04:00
robocopy.bat bulk upload to forgejo 2026-04-19 14:22:50 -04:00
server-license-location.md bulk upload to forgejo 2026-04-19 14:22:50 -04:00
sftp-winscp-module.ps1 bulk upload to forgejo 2026-04-19 14:22:50 -04:00
test-smtp-app.ps1 bulk upload to forgejo 2026-04-19 14:22:50 -04:00
TP-All-GPOs.html bulk upload to forgejo 2026-04-19 14:22:50 -04:00
vss-commands.txt bulk upload to forgejo 2026-04-19 14:22:50 -04:00

Commonly used commandlets

Test-NetConnection IPADDRESS -port 636
Test-NetConnection -ConstrainInterface 3 10.50.4.10 -DiagnoseRouting
Get-NetIPInterface
Repadmin /replsummary
Repadmin /Showrepl
Repadmin /Queue
Repadmin /syncall
dfsrmig /getmigrationstate

Best Practices

Email


Mail flow best practices for Exchange Online and Office 365 - https://docs.microsoft.com/en-us/exchange/mail-flow-best-practices/mail-flow-best-practices
Best practices for configuring mail flow rules in Exchange Online - https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/configuration-best-practices
Best practices for configuring standalone EOP - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/best-practices-for-configuring-eop?view=o365-worldwide
Recommended settings for EOP and Defender for Office 365 security - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365-atp?view=o365-worldwide
Microsoft 365 and Office 365 email migration performance and best practices - https://docs.microsoft.com/en-us/Exchange/mailbox-migration/office-365-migration-best-practices
Best practices for public folder preparation before migrations - https://techcommunity.microsoft.com/t5/exchange-team-blog/best-practices-for-public-folder-preparation-before-migrations/ba-p/1909222
How to Combat Fake Emails using SPF, DKIM, DMARC - https://www.cyber.gov.au/acsc/view-all-content/publications/how-combat-fake-emails

Security


Microsoft Security best practices - https://docs.microsoft.com/en-us/security/compass/compass
Microsoft Security Baselines - https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines
Azure Security best practices - https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/security/security-top-10
Azure Identity Management and access control security best practices - https://docs.microsoft.com/en-us/azure/security/fundamentals/identity-management-best-practices
Essential eight - https://www.cyber.gov.au/acsc/view-all-content/essential-eight
CISA - Microsoft 365 Recommendations - https://www.us-cert.gov/ncas/alerts/aa20-120a
Center for Internet Security (CIS) benchmarks - https://docs.microsoft.com/en-us/microsoft-365/compliance/offering-cis-benchmark?view=o365-worldwide
Cybersecurity best practices - https://www.cisecurity.org/cybersecurity-best-practices/
Configure your Microsoft 365 tenant for increased security - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/tenant-wide-setup-for-increased-security?view=o365-worldwide
Best practices for Conditional Access in Azure Active Directory - https://docs.microsoft.com/en-gb/azure/active-directory/conditional-access/best-practices
NIST Cybersecurity Framework - https://www.nist.gov/cyberframework
Small Business Cyber Security Guide - https://www.cyber.gov.au/acsc/small-and-medium-businesses/acsc-small-business-guide
Strategies to Mitigate Cyber Security Incidents Mitigation Details - https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-security-incidents-mitigation-details
Microsoft password policy recommendations - https://docs.microsoft.com/en-us/microsoft-365/admin/misc/password-policy-recommendations?view=o365-worldwide
Microsoft - Password Guidance - https://www.microsoft.com/en-us/research/publication/password-guidance/
Responding to a compromised email account - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account?view=o365-worldwide
Hardening Microsoft Office 365 ProPlus, Office 2019 and Office 2016 - https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-microsoft-office-365-proplus-office-2019-and-office-2016
Practical guide to securing remote work using Microsoft 365 Business Premium - https://techcommunity.microsoft.com/t5/small-and-medium-business-blog/practical-guide-to-securing-remote-work-using-microsoft-365/ba-p/1354772
Cyber Essentials: Requirements for IT infrastructure - https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-IT-infrastructure-2-1.pdf
Securing privileged access for hybrid and cloud deployments in Azure AD - https://docs.microsoft.com/en-us/azure/active-directory/roles/security-planning
Securing privileged access - https://docs.microsoft.com/en-us/security/compass/overview
Securing devices as part of the privileged access story - https://docs.microsoft.com/en-us/security/compass/concept-azure-managed-workstation
Top 10 ways to secure Microsoft 365 for business plans - https://docs.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/secure-your-business-data?view=o365-worldwide
End user device (EUD) security guidance - https://www.ncsc.gov.uk/collection/end-user-device-security/platform-specific-guidance
NSA Cybersecurity Advisories & Technical Guidance - https://www.nsa.gov/What-We-Do/Cybersecurity/Advisories-Technical-Guidance/
Operational Security Assurance - https://www.microsoft.com/en-us/securityengineering/osa/practices
Security Design principles - https://docs.microsoft.com/en-us/azure/architecture/framework/security/security-principles
Detect and block potentially unwanted applications - https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus
Four steps to a strong identity foundation with Azure Active Directory - https://docs.microsoft.com/en-us/azure/active-directory/hybrid/four-steps
IT checklist for securing work from anywhere using Microsoft 365 Business Premium - https://cloudpartners.transform.microsoft.com/download?assetname=assets/ITChecklistForSecuringWorkFromAnywhereUsingMicrosoft365BusinessPremium.docx&download=1
Use attack surface reduction rules to prevent malware infection - https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction
Protecting Microsoft 365 from on-premises attacks - https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/ba-p/1751754
Five steps to securing your identity infrastructure - https://docs.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity
Identity and device access configurations - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/microsoft-365-policies-configurations?view=o365-worldwide
Azure best practices for network security - https://docs.microsoft.com/en-us/azure/security/fundamentals/network-best-practices
Small Business Cyber Security Guide - https://www.cyber.gov.au/acsc/view-all-content/publications/small-business-cyber-security-guide
Australian Business Cyber Security Assessment Tool - https://digitaltools.business.gov.au/jfe/form/SV_cRMe9MTmaq6QmrA?ref=bga
Cyber security step by step guides - https://www.cyber.gov.au/acsc/small-and-medium-businesses/step-by-step-guides
National Cyber Security Centre UK Device Security Guidance Configuration - https://github.com/ukncsc/Device-Security-Guidance-Configuration-Packs
Securing access to Microsoft 365 - https://www.cert.govt.nz/it-specialists/guides/securing-access-to-microsoft-365/
Best Practices for Preventing Business Disruption from Ransomware Attacks - https://us-cert.cisa.gov/ncas/alerts/aa21-131a
Protected Utility Program - As Built As Configuration - https://desktop.gov.au/blueprint/abac.html
Protected Utility Program - Office 365 - https://desktop.gov.au/blueprint/office-365.html
Protected Utility Program - Security - https://desktop.gov.au/blueprint/security.html
Microsofts DART ransomware approach and best practices - https://docs.microsoft.com/en-us/security/compass/incident-response-playbook-dart-ransomware-approach
Microsoft Security alerts - a reference guide - https://docs.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference?azure-portal=true
Submit a driver for analysis - https://www.microsoft.com/en-us/wdsi/driversubmission
Known exploited vulnerabilities catalog - https://www.cisa.gov/known-exploited-vulnerabilities-catalog

iOS Security


Security Configuration Guide Apple iOS 14 Devices - https://www.cyber.gov.au/acsc/view-all-content/publications/security-configuration-guide-apple-ios-14-devices
iOS Hardening Configuration Guide - https://www.cyber.gov.au/sites/default/files/2019-03/iOS9_Hardening_Guide.pdf

Android Security


Security Configuration Guide Samsung Galaxy S10, S20 and Note 20 Devices - https://www.cyber.gov.au/acsc/view-all-content/publications/security-configuration-guide-samsung-galaxy-s10-s20-and-note-20-devices

Windows 10 Security


Hardening Microsoft Windows 10 version 21H1 Workstations - https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-microsoft-windows-10-version-21h1-workstations
Hardening Hardening Microsoft Windows 10 version 1909 Workstations - https://www.cyber.gov.au/sites/default/files/2020-06/PROTECT%20-%20Hardening%20Microsoft%20Windows%2010%20version%201909%20Workstations%20%28June%202020%29.pdf

Defender for Endpoint


Recommendations for defining exclusions - https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus#recommendations-for-defining-exclusions
Common mistakes to avoid when defining exclusions - https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/common-exclusion-mistakes-microsoft-defender-antivirus
Report ASR settings on Windows 10 - https://github.com/directorcia/Office365/blob/master/win10-asr-get.ps1
Report Defender settings on Windows 10 - https://github.com/directorcia/Office365/blob/master/win10-def-get.ps1
iOS/iPadOS Enterprise security configuration framework - https://docs.microsoft.com/en-us/mem/intune/enrollment/ios-ipados-configuration-framework
Data protection framework using app protection policies - https://docs.microsoft.com/en-us/mem/intune/apps/app-protection-framework
Android Enterprise security configuration framework - https://docs.microsoft.com/en-us/mem/intune/enrollment/android-configuration-framework
Android Enterprise fully managed security configurations - https://docs.microsoft.com/en-us/mem/intune/enrollment/android-fully-managed-security-settings
Android Enterprise personally-owned work profile security configurations - https://docs.microsoft.com/en-us/mem/intune/enrollment/android-work-profile-security-settings

Microsoft 365


Network connectivity test - https://connectivity.office.com/

MCAS


Cloud App Security best practices - https://docs.microsoft.com/en-us/cloud-app-security/best-practices

OneDrive


Recommended OneDrive sync app configuration - https://docs.microsoft.com/en-us/onedrive/ideal-state-configuration
Best practices for migrating to SharePoint and OneDrive - https://techcommunity.microsoft.com/t5/microsoft-onedrive-blog/best-practices-for-migrating-to-sharepoint-and-onedrive/ba-p/2221548

SharePoint


Branding guidance for SharePoint Online portals - https://docs.microsoft.com/en-us/sharepoint/dev/solution-guidance/portal-branding
Best practices for migrating to SharePoint and OneDrive - https://techcommunity.microsoft.com/t5/microsoft-onedrive-blog/best-practices-for-migrating-to-sharepoint-and-onedrive/ba-p/2221548

Azure AD


Azure Active Directory feature deployment guide - https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-deployment-checklist-p2

Azure


Resource naming and tagging decision guide - https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/decision-guides/resource-tagging/
Best practices for Azure AD roles - https://docs.microsoft.com/en-us/azure/active-directory/roles/best-practices
Security alerts, a reference guide - https://docs.microsoft.com/en-us/azure/security-center/alerts-reference

Reports


Ransomware Demands continue to rise as Data Exfiltration becomes common, and Maze subdues (Corewave) - https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report

Publications


Australian Cyber Security Centre Publications - https://www.cyber.gov.au/acsc/view-all-content/publications

URLs

Office 365 / Microsoft 365

https://portal.office.com - Office 365 Home page
https://login.microsoftonline.com - Office 365 Home page
https://devicemanagement.microsoft.com - Device management portal
https://protection.office.com/devicev2 - Office 365 Mobile device management
https://endpoint.microsoft.com/ - Endpoint Manager
https://admin.microsoft.com - Administration portal
https://portal.office.com/commerce/manage.aspx?empty=1 - Subscriptions view
https://myapps.microsoft.com/ - End user web application portal
https://portal.cloudappsecurity.com - Cloud app security portal
https://outlook.office.com/owa - Outlook Web Access
https://outlook.office365.com/ecp - Exchange admin center
https://admin.exchange.microsoft.com - Exchange admin center
https://to-do.office.com/ - To-do
http://teamsdemo.office.com/ - Microsoft Teams Demo
https://teams.microsoft.com/ - Microsoft Teams
https://admin.teams.microsoft.com/ - Teams Administration
https://whiteboard.microsoft.com - Microsoft Whiteboard
https://myanalytics.microsoft.com/ - MyAnalytics
https://mysignins.microsoft.com/ - MFA setup and login audit for account
https://myaccess.microsoft.com - My access portal
https://myapplications.microsoft.com/ - My applications portal
https://myworkaccount.microsoft.com - My work account portal
https://myprofile.microsoft.com - Profile information
https://compliance.microsoft.com - Microsoft Compliance center
https://servicetrust.microsoft.com - Compliance manager
https://forms.office.com - Microsoft Forms
https://flow.microsoft.com - Microsoft Flow
https://powerapps.microsoft.com - Microsoft PowerApps
https://admin.microsoft.com/Adminportal/Home?source=applauncher#/setupwizard - Microsoft 365 Business Set up wizard
https://-admin.sharepoint.com/_layouts/15/online/SiteCollections.aspx - Classic SharePoint Administration portal
https://-admin.sharepoint.com/_layouts/15/online/AdminHome.aspx# - Modern SharePoint Administration portal
https://config.office.com - App Admin Center
https://.sharepoint.com/sites/sitecollection/_layouts/15/StorMan.aspx - SharePoint Site Storage metrics
https://workplaceanalytics.office.com/ - Workplace Analytics
https://portal.microsoft.com/adminportal/home#/networkperformance - Network performance
https://admin.microsoft.com/AdminPortal/Home#/servicehealth - Service Health
https://admin.microsoft.com/AdminPortal/Home#/MessageCenter - Message center
https://portal.microsoft.com/adminportal/home#/networkperformance - Network performance
https://admin.microsoft.com/sharepoint - SharePoint Admin Center
https://admin.onedrive.com - OneDrve Admin Center
https://admin.powerplatform.microsoft.com/ - Power Platform Admin Center
https://web.microsoftstream.com/admin - Stream Admin Center
https://businessstore.microsoft.com/ - Microsoft Store for Business
https://educationstore.microsoft.com/ - Microsoft Store for Education
https://testconnectivity.microsoft.com - Microsoft Remote Connectivity Analyzer
https://connectivity.office.com/ - Microsoft 365 network connectivity test
https://cqd.teams.microsoft.com/ - Microsoft Call Quality Dashboard
https://mystaff.microsoft.com - Management portal for first line workers
https://protection.office.com/reportv2?dltarget=report&dlstorage=url&dljson=%7B%22reportId%22:%22TPSMessageOverrideReportATP%22,%22startDate%22:%222021-02-14T00:00:00.000Z%22,%22endDate%22:%222021-02-20T23:59:59.000Z%22,%22target%22:%22report%22,%22storage%22:%22Url%22,%22source%22:%22%2Freportv2%22%7D - Threat protection status (Message Override)
https://security.microsoft.com/threatanalytics3 - Threat Analytics
https://lighthouse.microsoft.com/ - Microsoft 365 lighthouse
https://admin.microsoft.com/Adminportal/Home?source=applauncher#/Settings/Services/:/Settings/L1/DataLocationList - Data location
https://admin.microsoft.com/Adminportal/Home?#/modernonboarding/microsoftedgedeploymentadvisor - Microsoft Edge advisor
https://windows365.microsoft.com - Windows 365
https://cloudpc.microsoft.com - Windows 365
https://compliance.microsoft.com/m365appprotection - App governance
https://windows365.microsoft.com/ - Windows 365
https://cloudpc.microsoft.com - Windows 365

Security

https://portal.msrc.microsoft.com/en-us/engage/cars - Submit Abuse report. This form is to report suspected cyberattacks or abuse originating from Microsoft Online Services, such as Microsoft Azure, Bing, Outlook, One Drive, and Office 365. This includes malicious network activity originating from a Microsoft IP address. It also includes distribution of malicious content or other illicit or illegal material through a Microsoft Online Service.
https://servicetrust.microsoft.com/ - Service trust portal. Review the available independent audit reports for Microsoft's Cloud services, which provide information about compliance with data protection standards and regulatory requirements, such as International Organization for Standardization (ISO), Service Organization Controls (SOC), National Institute of Standards and Technology (NIST), Federal Risk and Authorization Management Program (FedRAMP), and the General Data Protection Regulation (GDPR)
https://www.microsoft.com/en-us/trustcenter - Trust center
https://protection.office.com - Office 365 Security portal
https://admin.microsoft.com/AdminPortal/Home?#/modernonboarding/mfasetupguide - Configure and enforce multifactor authentication
https://security.microsoft.com/securescore - Microsoft Secure Score
https://portal.cloudappsecurity.com - Office 365 Cloud App security
https://security.microsoft.com/ - Microsoft 365 Security Center
https://protection.office.com/gdprdashboard - GDPR Dashbaord
https://securitycenter.windows.com - Microsoft Defender for Endpoint Security Center
https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/SignIns - Azure AD Sign ins
https://sender.office.com/ - Office 365 Anti-Spam IP Delist Portal
https://protection.office.com/managealerts - Activity Alerts
https://protection.office.com/alertpolicies - Protection Alerts
https://protection.office.com/reportsubmission - Submit security report
https://passwordreset.microsoftonline.com - Azure AD Password reset
https://protection.office.com/antispam - Exchange Anti spam console
https://account.activedirectory.windowsazure.com/usermanagement/mfasettings.aspx - MFA Settings
https://compliance.microsoft.com/compliancescore - Compliance Score
http://protection.office.com/quarantine - View quantined emails and files
https://protection.office.com/insightdashboard - Security and Compliance report dashboard
https://protection.office.com/unifiedauditlog - Audit logs
https://protection.office.com/campaigns - Email spam campaigns dashboard
https://protection.office.com/configurationAnalyzer - Configuration Analyzer
https://security.microsoft.com/restrictedusers - Restricted users portal
https://o365atp.com/ - Office 365 ATP Safe Links Decoder
https://mha.azurewebsites.net/ - Message Header Analyzer
https://security.microsoft.com/antimalwarev2 - Malware filter
https://security.microsoft.com/antispam - Connection Filter, Spam Filter, Outbound Spam Filter
https://security.microsoft.com/quarantine - Quarantine
https://security.microsoft.com/dkimv2 - DKIM
https://security.microsoft.com/safeattachmentv2 - Safe Attachments
https://security.microsoft.com/safelinksv2 - Safe Links
https://security.microsoft.com/restrictedusers - Action Center
https://security.microsoft.com/cloudapps/app-governance - App governance
https://security.microsoft.com/tenantAllowBlockList - Tenat Allow/Block lists

Azure

https://portal.azure.com - Azure portal home page
https://preview.portal.azure.com - Preview Azure portal home page
https://shell.azure.com - Azure Cloud shell
https://aad.portal.azure.com/ - Azure AD Administration
https://account.activedirectory.windowsazure.com/ - User Azure AD portal
https://portal.atp.azure.com - Azure ATP
https://status.azure.com - Azure Status
https://www.qnamaker.ai/ - Q and A Maker
https://portal.atp.azure.com/ - Microsoft Defender for Identity
https://portal.azurerms.com/#/admin - Azure Information Protection portal

Microsoft Management Agent

https://go.microsoft.com/fwlink/?LinkId=828603 - Windows 64-bit agent
https://go.microsoft.com/fwlink/?LinkId=828604 - Windows 32-bit agent

Partner

https://partner.microsoft.com/en-au/community/australia-partner-hub - Microsoft Australia Partner Hub

Other

https://developer.microsoft.com/en-us/graph/graph-explorer - Microsoft Graph explorer
https://www.whatismytenantid.com/ - What is my Microsoft Azure and Office 365 tenant ID?
https://o365.rocks/ - Tenant Availability Check
https://adoption.microsoft.com/extensibility-look-book - Microsoft 365 Extensibility look book gallery
https://lookbook.microsoft.com/ - SharePoint look book

Twitter

https://twitter.com/Windows - Windows
https://twitter.com/msuspartner - Microsoft US Partner
https://twitter.com/msPartner - Microsoft Partner
https://twitter.com/MSFTnews - Microsoft stories and news
https://twitter.com/msdev - Microsoft developer
https://twitter.com/Microsoft - Microsoft
https://twitter.com/MicrosoftMTP - Microsoft Threat Protection
https://twitter.com/MicrosoftToDo - Microsoft To-do
https://twitter.com/IntuneSuppTeam - Intune Support teamsdemo
https://twitter.com/MS_ITPro - Microsoft IT Pro
https://twitter.com/docsmsft - Microsoft docs
https://twitter.com/msftsecresponse - Microsoft Security Response
https://twitter.com/MicrosoftHelps - Microsoft Support
https://twitter.com/msonenote - Microsoft OneNote
https://twitter.com/SkypeBusiness - Skype for Business
https://twitter.com/MS_Ignite - Microsoft Ignite
https://twitter.com/MsftSecIntel - Microsoft Security Intelligence
https://twitter.com/OfficeSmallBiz - Office small biz
https://twitter.com/MicrosoftAUDev - Microsoft AU developer
https://twitter.com/MSWindowsITPro - Windows IT Pro
https://twitter.com/AzureBackup - Azure backup
https://twitter.com/MSTCommunity - Microsoft Tech Community
https://twitter.com/AzurePortal - Azure portal
https://twitter.com/AzureSupport - Azure Support
https://twitter.com/Microsoft365 - Microsoft 365
https://twitter.com/OfficeSupport - Office Support
https://twitter.com/MSFT365Status - Microsoft 365 Status
https://twitter.com/msftsecurity - Microsoft Security
https://twitter.com/MSIntune - Microsoft Intune
https://twitter.com/MSFTMobility - Micosoft mobility
https://twitter.com/azurestorage - Azure storage
https://twitter.com/MicrosoftTeams - Microsoft Teams
https://twitter.com/PowerApps - Microsoft PowerApps
https://twitter.com/MicrosoftFlow - Microsoft Flow
https://twitter.com/onedrive - Onedrive
https://twitter.com/Office365 - Office 365
https://twitter.com/MSCloud - Microsoft Cloud
https://twitter.com/azuread - Azure AD
https://twitter.com/Azure - Microsoft Azure
https://twitter.com/MSPowerBI - Microsoft PowerBI
https://twitter.com/Office365_Tech - Office 365 Community
https://twitter.com/SharePoint - Microsoft SharePoint
https://twitter.com/AndroidAtMsft - Andoid at Microsoft
https://twitter.com/windowsATP - Microsoft Defender ATP
https://twitter.com/MicrosoftGraph - Microsoft Graph
https://twitter.com/W365community - Windows 365 community
https://twitter.com/msftadoption - Microsoft 365 Adoption resources

Podcasts

http://ciaops.podbean.com/ - CIAOPS Need to Know
https://intrazone.libsyn.com/ - The Intrazone
http://syncup.mpsn.libsynpro.com/ - Sync Up, A OneDrive Podcast
https://www.messagecentershow.com/ - The Message Center Show
https://podcasts.apple.com/us/podcast/microsoft-mechanics-podcast/id1181810899 - Microsoft Mechanics
http://modernworkplace.mpsn.libsynpro.com/ - Modern workplace
https://uncoveringhiddenrisks.libsyn.com/ - Uncovering hidden risk
https://securityunlockedpodcast.com/ - Security unlocked
https://podcast.allabout365.com/ - All about 365 with Jay and Steve
https://www.office365distilled.com/ - Office 365 distilled

Blogs

Security, Compliance, and Identity - https://techcommunity.microsoft.com/t5/security-compliance-and-identity/bg-p/MicrosoftSecurityandCompliance