- PowerShell 99.7%
- Python 0.2%
| AD | ||
| Azure | ||
| DHCP | ||
| DNS | ||
| ExchangeOnline | ||
| GPOs | ||
| Hyper-V | ||
| Intune | ||
| LAPS | ||
| Office | ||
| Office365 | ||
| Powershell | ||
| Printers | ||
| RDP | ||
| SharePoint | ||
| .gitignore | ||
| Admark-All-GPOs.html | ||
| ATR-All-GPOs.html | ||
| CDF-All-GPOs.html | ||
| Copy-Files-With-WinSCP.bat | ||
| eval-to-standard.ps1 | ||
| exchange-online-smtp-auth.ps1 | ||
| LICENSE | ||
| README.md | ||
| robocopy.bat | ||
| server-license-location.md | ||
| sftp-winscp-module.ps1 | ||
| test-smtp-app.ps1 | ||
| TP-All-GPOs.html | ||
| vss-commands.txt | ||
Commonly used commandlets
Test-NetConnection IPADDRESS -port 636
Test-NetConnection -ConstrainInterface 3 10.50.4.10 -DiagnoseRouting
Get-NetIPInterface
Repadmin /replsummary
Repadmin /Showrepl
Repadmin /Queue
Repadmin /syncall
dfsrmig /getmigrationstate
Best Practices
Mail flow best practices for Exchange Online and Office 365 - https://docs.microsoft.com/en-us/exchange/mail-flow-best-practices/mail-flow-best-practices
Best practices for configuring mail flow rules in Exchange Online - https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/configuration-best-practices
Best practices for configuring standalone EOP - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/best-practices-for-configuring-eop?view=o365-worldwide
Recommended settings for EOP and Defender for Office 365 security - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365-atp?view=o365-worldwide
Microsoft 365 and Office 365 email migration performance and best practices - https://docs.microsoft.com/en-us/Exchange/mailbox-migration/office-365-migration-best-practices
Best practices for public folder preparation before migrations - https://techcommunity.microsoft.com/t5/exchange-team-blog/best-practices-for-public-folder-preparation-before-migrations/ba-p/1909222
How to Combat Fake Emails using SPF, DKIM, DMARC - https://www.cyber.gov.au/acsc/view-all-content/publications/how-combat-fake-emails
Security
Microsoft Security best practices - https://docs.microsoft.com/en-us/security/compass/compass
Microsoft Security Baselines - https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines
Azure Security best practices - https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/security/security-top-10
Azure Identity Management and access control security best practices - https://docs.microsoft.com/en-us/azure/security/fundamentals/identity-management-best-practices
Essential eight - https://www.cyber.gov.au/acsc/view-all-content/essential-eight
CISA - Microsoft 365 Recommendations - https://www.us-cert.gov/ncas/alerts/aa20-120a
Center for Internet Security (CIS) benchmarks - https://docs.microsoft.com/en-us/microsoft-365/compliance/offering-cis-benchmark?view=o365-worldwide
Cybersecurity best practices - https://www.cisecurity.org/cybersecurity-best-practices/
Configure your Microsoft 365 tenant for increased security - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/tenant-wide-setup-for-increased-security?view=o365-worldwide
Best practices for Conditional Access in Azure Active Directory - https://docs.microsoft.com/en-gb/azure/active-directory/conditional-access/best-practices
NIST Cybersecurity Framework - https://www.nist.gov/cyberframework
Small Business Cyber Security Guide - https://www.cyber.gov.au/acsc/small-and-medium-businesses/acsc-small-business-guide
Strategies to Mitigate Cyber Security Incidents – Mitigation Details - https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-security-incidents-mitigation-details
Microsoft password policy recommendations - https://docs.microsoft.com/en-us/microsoft-365/admin/misc/password-policy-recommendations?view=o365-worldwide
Microsoft - Password Guidance - https://www.microsoft.com/en-us/research/publication/password-guidance/
Responding to a compromised email account - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/responding-to-a-compromised-email-account?view=o365-worldwide
Hardening Microsoft Office 365 ProPlus, Office 2019 and Office 2016 - https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-microsoft-office-365-proplus-office-2019-and-office-2016
Practical guide to securing remote work using Microsoft 365 Business Premium - https://techcommunity.microsoft.com/t5/small-and-medium-business-blog/practical-guide-to-securing-remote-work-using-microsoft-365/ba-p/1354772
Cyber Essentials: Requirements for IT infrastructure - https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-IT-infrastructure-2-1.pdf
Securing privileged access for hybrid and cloud deployments in Azure AD - https://docs.microsoft.com/en-us/azure/active-directory/roles/security-planning
Securing privileged access - https://docs.microsoft.com/en-us/security/compass/overview
Securing devices as part of the privileged access story - https://docs.microsoft.com/en-us/security/compass/concept-azure-managed-workstation
Top 10 ways to secure Microsoft 365 for business plans - https://docs.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/secure-your-business-data?view=o365-worldwide
End user device (EUD) security guidance - https://www.ncsc.gov.uk/collection/end-user-device-security/platform-specific-guidance
NSA Cybersecurity Advisories & Technical Guidance - https://www.nsa.gov/What-We-Do/Cybersecurity/Advisories-Technical-Guidance/
Operational Security Assurance - https://www.microsoft.com/en-us/securityengineering/osa/practices
Security Design principles - https://docs.microsoft.com/en-us/azure/architecture/framework/security/security-principles
Detect and block potentially unwanted applications - https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus
Four steps to a strong identity foundation with Azure Active Directory - https://docs.microsoft.com/en-us/azure/active-directory/hybrid/four-steps
IT checklist for securing work from anywhere using Microsoft 365 Business Premium - https://cloudpartners.transform.microsoft.com/download?assetname=assets/ITChecklistForSecuringWorkFromAnywhereUsingMicrosoft365BusinessPremium.docx&download=1
Use attack surface reduction rules to prevent malware infection - https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction
Protecting Microsoft 365 from on-premises attacks - https://techcommunity.microsoft.com/t5/azure-active-directory-identity/protecting-microsoft-365-from-on-premises-attacks/ba-p/1751754
Five steps to securing your identity infrastructure - https://docs.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity
Identity and device access configurations - https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/microsoft-365-policies-configurations?view=o365-worldwide
Azure best practices for network security - https://docs.microsoft.com/en-us/azure/security/fundamentals/network-best-practices
Small Business Cyber Security Guide - https://www.cyber.gov.au/acsc/view-all-content/publications/small-business-cyber-security-guide
Australian Business Cyber Security Assessment Tool - https://digitaltools.business.gov.au/jfe/form/SV_cRMe9MTmaq6QmrA?ref=bga
Cyber security step by step guides - https://www.cyber.gov.au/acsc/small-and-medium-businesses/step-by-step-guides
National Cyber Security Centre UK Device Security Guidance Configuration - https://github.com/ukncsc/Device-Security-Guidance-Configuration-Packs
Securing access to Microsoft 365 - https://www.cert.govt.nz/it-specialists/guides/securing-access-to-microsoft-365/
Best Practices for Preventing Business Disruption from Ransomware Attacks - https://us-cert.cisa.gov/ncas/alerts/aa21-131a
Protected Utility Program - As Built As Configuration - https://desktop.gov.au/blueprint/abac.html
Protected Utility Program - Office 365 - https://desktop.gov.au/blueprint/office-365.html
Protected Utility Program - Security - https://desktop.gov.au/blueprint/security.html
Microsoft’s DART ransomware approach and best practices - https://docs.microsoft.com/en-us/security/compass/incident-response-playbook-dart-ransomware-approach
Microsoft Security alerts - a reference guide - https://docs.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference?azure-portal=true
Submit a driver for analysis - https://www.microsoft.com/en-us/wdsi/driversubmission
Known exploited vulnerabilities catalog - https://www.cisa.gov/known-exploited-vulnerabilities-catalog
iOS Security
Security Configuration Guide – Apple iOS 14 Devices - https://www.cyber.gov.au/acsc/view-all-content/publications/security-configuration-guide-apple-ios-14-devices
iOS Hardening Configuration Guide - https://www.cyber.gov.au/sites/default/files/2019-03/iOS9_Hardening_Guide.pdf
Android Security
Security Configuration Guide – Samsung Galaxy S10, S20 and Note 20 Devices - https://www.cyber.gov.au/acsc/view-all-content/publications/security-configuration-guide-samsung-galaxy-s10-s20-and-note-20-devices
Windows 10 Security
Hardening Microsoft Windows 10 version 21H1 Workstations - https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-microsoft-windows-10-version-21h1-workstations
Hardening Hardening Microsoft Windows 10 version 1909 Workstations - https://www.cyber.gov.au/sites/default/files/2020-06/PROTECT%20-%20Hardening%20Microsoft%20Windows%2010%20version%201909%20Workstations%20%28June%202020%29.pdf
Defender for Endpoint
Recommendations for defining exclusions - https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus#recommendations-for-defining-exclusions
Common mistakes to avoid when defining exclusions - https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/common-exclusion-mistakes-microsoft-defender-antivirus
Report ASR settings on Windows 10 - https://github.com/directorcia/Office365/blob/master/win10-asr-get.ps1
Report Defender settings on Windows 10 - https://github.com/directorcia/Office365/blob/master/win10-def-get.ps1
iOS/iPadOS Enterprise security configuration framework - https://docs.microsoft.com/en-us/mem/intune/enrollment/ios-ipados-configuration-framework
Data protection framework using app protection policies - https://docs.microsoft.com/en-us/mem/intune/apps/app-protection-framework
Android Enterprise security configuration framework - https://docs.microsoft.com/en-us/mem/intune/enrollment/android-configuration-framework
Android Enterprise fully managed security configurations - https://docs.microsoft.com/en-us/mem/intune/enrollment/android-fully-managed-security-settings
Android Enterprise personally-owned work profile security configurations - https://docs.microsoft.com/en-us/mem/intune/enrollment/android-work-profile-security-settings
Microsoft 365
Network connectivity test - https://connectivity.office.com/
MCAS
Cloud App Security best practices - https://docs.microsoft.com/en-us/cloud-app-security/best-practices
OneDrive
Recommended OneDrive sync app configuration - https://docs.microsoft.com/en-us/onedrive/ideal-state-configuration
Best practices for migrating to SharePoint and OneDrive - https://techcommunity.microsoft.com/t5/microsoft-onedrive-blog/best-practices-for-migrating-to-sharepoint-and-onedrive/ba-p/2221548
SharePoint
Branding guidance for SharePoint Online portals - https://docs.microsoft.com/en-us/sharepoint/dev/solution-guidance/portal-branding
Best practices for migrating to SharePoint and OneDrive - https://techcommunity.microsoft.com/t5/microsoft-onedrive-blog/best-practices-for-migrating-to-sharepoint-and-onedrive/ba-p/2221548
Azure AD
Azure Active Directory feature deployment guide - https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-deployment-checklist-p2
Azure
Resource naming and tagging decision guide - https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/decision-guides/resource-tagging/
Best practices for Azure AD roles - https://docs.microsoft.com/en-us/azure/active-directory/roles/best-practices
Security alerts, a reference guide - https://docs.microsoft.com/en-us/azure/security-center/alerts-reference
Reports
Ransomware Demands continue to rise as Data Exfiltration becomes common, and Maze subdues (Corewave) - https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report
Publications
Australian Cyber Security Centre Publications - https://www.cyber.gov.au/acsc/view-all-content/publications
URLs
Office 365 / Microsoft 365
https://portal.office.com - Office 365 Home page
https://login.microsoftonline.com - Office 365 Home page
https://devicemanagement.microsoft.com - Device management portal
https://protection.office.com/devicev2 - Office 365 Mobile device management
https://endpoint.microsoft.com/ - Endpoint Manager
https://admin.microsoft.com - Administration portal
https://portal.office.com/commerce/manage.aspx?empty=1 - Subscriptions view
https://myapps.microsoft.com/ - End user web application portal
https://portal.cloudappsecurity.com - Cloud app security portal
https://outlook.office.com/owa - Outlook Web Access
https://outlook.office365.com/ecp - Exchange admin center
https://admin.exchange.microsoft.com - Exchange admin center
https://to-do.office.com/ - To-do
http://teamsdemo.office.com/ - Microsoft Teams Demo
https://teams.microsoft.com/ - Microsoft Teams
https://admin.teams.microsoft.com/ - Teams Administration
https://whiteboard.microsoft.com - Microsoft Whiteboard
https://myanalytics.microsoft.com/ - MyAnalytics
https://mysignins.microsoft.com/ - MFA setup and login audit for account
https://myaccess.microsoft.com - My access portal
https://myapplications.microsoft.com/ - My applications portal
https://myworkaccount.microsoft.com - My work account portal
https://myprofile.microsoft.com - Profile information
https://compliance.microsoft.com - Microsoft Compliance center
https://servicetrust.microsoft.com - Compliance manager
https://forms.office.com - Microsoft Forms
https://flow.microsoft.com - Microsoft Flow
https://powerapps.microsoft.com - Microsoft PowerApps
https://admin.microsoft.com/Adminportal/Home?source=applauncher#/setupwizard - Microsoft 365 Business Set up wizard
https://-admin.sharepoint.com/_layouts/15/online/SiteCollections.aspx - Classic SharePoint Administration portal
https://-admin.sharepoint.com/_layouts/15/online/AdminHome.aspx# - Modern SharePoint Administration portal
https://config.office.com - App Admin Center
https://.sharepoint.com/sites/sitecollection/_layouts/15/StorMan.aspx - SharePoint Site Storage metrics
https://workplaceanalytics.office.com/ - Workplace Analytics
https://portal.microsoft.com/adminportal/home#/networkperformance - Network performance
https://admin.microsoft.com/AdminPortal/Home#/servicehealth - Service Health
https://admin.microsoft.com/AdminPortal/Home#/MessageCenter - Message center
https://portal.microsoft.com/adminportal/home#/networkperformance - Network performance
https://admin.microsoft.com/sharepoint - SharePoint Admin Center
https://admin.onedrive.com - OneDrve Admin Center
https://admin.powerplatform.microsoft.com/ - Power Platform Admin Center
https://web.microsoftstream.com/admin - Stream Admin Center
https://businessstore.microsoft.com/ - Microsoft Store for Business
https://educationstore.microsoft.com/ - Microsoft Store for Education
https://testconnectivity.microsoft.com - Microsoft Remote Connectivity Analyzer
https://connectivity.office.com/ - Microsoft 365 network connectivity test
https://cqd.teams.microsoft.com/ - Microsoft Call Quality Dashboard
https://mystaff.microsoft.com - Management portal for first line workers
https://protection.office.com/reportv2?dltarget=report&dlstorage=url&dljson=%7B%22reportId%22:%22TPSMessageOverrideReportATP%22,%22startDate%22:%222021-02-14T00:00:00.000Z%22,%22endDate%22:%222021-02-20T23:59:59.000Z%22,%22target%22:%22report%22,%22storage%22:%22Url%22,%22source%22:%22%2Freportv2%22%7D - Threat protection status (Message Override)
https://security.microsoft.com/threatanalytics3 - Threat Analytics
https://lighthouse.microsoft.com/ - Microsoft 365 lighthouse
https://admin.microsoft.com/Adminportal/Home?source=applauncher#/Settings/Services/:/Settings/L1/DataLocationList - Data location
https://admin.microsoft.com/Adminportal/Home?#/modernonboarding/microsoftedgedeploymentadvisor - Microsoft Edge advisor
https://windows365.microsoft.com - Windows 365
https://cloudpc.microsoft.com - Windows 365
https://compliance.microsoft.com/m365appprotection - App governance
https://windows365.microsoft.com/ - Windows 365
https://cloudpc.microsoft.com - Windows 365
Security
https://portal.msrc.microsoft.com/en-us/engage/cars - Submit Abuse report. This form is to report suspected cyberattacks or abuse originating from Microsoft Online Services, such as Microsoft Azure, Bing, Outlook, One Drive, and Office 365. This includes malicious network activity originating from a Microsoft IP address. It also includes distribution of malicious content or other illicit or illegal material through a Microsoft Online Service.
https://servicetrust.microsoft.com/ - Service trust portal. Review the available independent audit reports for Microsoft's Cloud services, which provide information about compliance with data protection standards and regulatory requirements, such as International Organization for Standardization (ISO), Service Organization Controls (SOC), National Institute of Standards and Technology (NIST), Federal Risk and Authorization Management Program (FedRAMP), and the General Data Protection Regulation (GDPR)
https://www.microsoft.com/en-us/trustcenter - Trust center
https://protection.office.com - Office 365 Security portal
https://admin.microsoft.com/AdminPortal/Home?#/modernonboarding/mfasetupguide - Configure and enforce multifactor authentication
https://security.microsoft.com/securescore - Microsoft Secure Score
https://portal.cloudappsecurity.com - Office 365 Cloud App security
https://security.microsoft.com/ - Microsoft 365 Security Center
https://protection.office.com/gdprdashboard - GDPR Dashbaord
https://securitycenter.windows.com - Microsoft Defender for Endpoint Security Center
https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/SignIns - Azure AD Sign ins
https://sender.office.com/ - Office 365 Anti-Spam IP Delist Portal
https://protection.office.com/managealerts - Activity Alerts
https://protection.office.com/alertpolicies - Protection Alerts
https://protection.office.com/reportsubmission - Submit security report
https://passwordreset.microsoftonline.com - Azure AD Password reset
https://protection.office.com/antispam - Exchange Anti spam console
https://account.activedirectory.windowsazure.com/usermanagement/mfasettings.aspx - MFA Settings
https://compliance.microsoft.com/compliancescore - Compliance Score
http://protection.office.com/quarantine - View quantined emails and files
https://protection.office.com/insightdashboard - Security and Compliance report dashboard
https://protection.office.com/unifiedauditlog - Audit logs
https://protection.office.com/campaigns - Email spam campaigns dashboard
https://protection.office.com/configurationAnalyzer - Configuration Analyzer
https://security.microsoft.com/restrictedusers - Restricted users portal
https://o365atp.com/ - Office 365 ATP Safe Links Decoder
https://mha.azurewebsites.net/ - Message Header Analyzer
https://security.microsoft.com/antimalwarev2 - Malware filter
https://security.microsoft.com/antispam - Connection Filter, Spam Filter, Outbound Spam Filter
https://security.microsoft.com/quarantine - Quarantine
https://security.microsoft.com/dkimv2 - DKIM
https://security.microsoft.com/safeattachmentv2 - Safe Attachments
https://security.microsoft.com/safelinksv2 - Safe Links
https://security.microsoft.com/restrictedusers - Action Center
https://security.microsoft.com/cloudapps/app-governance - App governance
https://security.microsoft.com/tenantAllowBlockList - Tenat Allow/Block lists
Azure
https://portal.azure.com - Azure portal home page
https://preview.portal.azure.com - Preview Azure portal home page
https://shell.azure.com - Azure Cloud shell
https://aad.portal.azure.com/ - Azure AD Administration
https://account.activedirectory.windowsazure.com/ - User Azure AD portal
https://portal.atp.azure.com - Azure ATP
https://status.azure.com - Azure Status
https://www.qnamaker.ai/ - Q and A Maker
https://portal.atp.azure.com/ - Microsoft Defender for Identity
https://portal.azurerms.com/#/admin - Azure Information Protection portal
Microsoft Management Agent
https://go.microsoft.com/fwlink/?LinkId=828603 - Windows 64-bit agent
https://go.microsoft.com/fwlink/?LinkId=828604 - Windows 32-bit agent
Partner
https://partner.microsoft.com/en-au/community/australia-partner-hub - Microsoft Australia Partner Hub
Other
https://developer.microsoft.com/en-us/graph/graph-explorer - Microsoft Graph explorer
https://www.whatismytenantid.com/ - What is my Microsoft Azure and Office 365 tenant ID?
https://o365.rocks/ - Tenant Availability Check
https://adoption.microsoft.com/extensibility-look-book - Microsoft 365 Extensibility look book gallery
https://lookbook.microsoft.com/ - SharePoint look book
https://twitter.com/Windows - Windows
https://twitter.com/msuspartner - Microsoft US Partner
https://twitter.com/msPartner - Microsoft Partner
https://twitter.com/MSFTnews - Microsoft stories and news
https://twitter.com/msdev - Microsoft developer
https://twitter.com/Microsoft - Microsoft
https://twitter.com/MicrosoftMTP - Microsoft Threat Protection
https://twitter.com/MicrosoftToDo - Microsoft To-do
https://twitter.com/IntuneSuppTeam - Intune Support teamsdemo
https://twitter.com/MS_ITPro - Microsoft IT Pro
https://twitter.com/docsmsft - Microsoft docs
https://twitter.com/msftsecresponse - Microsoft Security Response
https://twitter.com/MicrosoftHelps - Microsoft Support
https://twitter.com/msonenote - Microsoft OneNote
https://twitter.com/SkypeBusiness - Skype for Business
https://twitter.com/MS_Ignite - Microsoft Ignite
https://twitter.com/MsftSecIntel - Microsoft Security Intelligence
https://twitter.com/OfficeSmallBiz - Office small biz
https://twitter.com/MicrosoftAUDev - Microsoft AU developer
https://twitter.com/MSWindowsITPro - Windows IT Pro
https://twitter.com/AzureBackup - Azure backup
https://twitter.com/MSTCommunity - Microsoft Tech Community
https://twitter.com/AzurePortal - Azure portal
https://twitter.com/AzureSupport - Azure Support
https://twitter.com/Microsoft365 - Microsoft 365
https://twitter.com/OfficeSupport - Office Support
https://twitter.com/MSFT365Status - Microsoft 365 Status
https://twitter.com/msftsecurity - Microsoft Security
https://twitter.com/MSIntune - Microsoft Intune
https://twitter.com/MSFTMobility - Micosoft mobility
https://twitter.com/azurestorage - Azure storage
https://twitter.com/MicrosoftTeams - Microsoft Teams
https://twitter.com/PowerApps - Microsoft PowerApps
https://twitter.com/MicrosoftFlow - Microsoft Flow
https://twitter.com/onedrive - Onedrive
https://twitter.com/Office365 - Office 365
https://twitter.com/MSCloud - Microsoft Cloud
https://twitter.com/azuread - Azure AD
https://twitter.com/Azure - Microsoft Azure
https://twitter.com/MSPowerBI - Microsoft PowerBI
https://twitter.com/Office365_Tech - Office 365 Community
https://twitter.com/SharePoint - Microsoft SharePoint
https://twitter.com/AndroidAtMsft - Andoid at Microsoft
https://twitter.com/windowsATP - Microsoft Defender ATP
https://twitter.com/MicrosoftGraph - Microsoft Graph
https://twitter.com/W365community - Windows 365 community
https://twitter.com/msftadoption - Microsoft 365 Adoption resources
Podcasts
http://ciaops.podbean.com/ - CIAOPS Need to Know
https://intrazone.libsyn.com/ - The Intrazone
http://syncup.mpsn.libsynpro.com/ - Sync Up, A OneDrive Podcast
https://www.messagecentershow.com/ - The Message Center Show
https://podcasts.apple.com/us/podcast/microsoft-mechanics-podcast/id1181810899 - Microsoft Mechanics
http://modernworkplace.mpsn.libsynpro.com/ - Modern workplace
https://uncoveringhiddenrisks.libsyn.com/ - Uncovering hidden risk
https://securityunlockedpodcast.com/ - Security unlocked
https://podcast.allabout365.com/ - All about 365 with Jay and Steve
https://www.office365distilled.com/ - Office 365 distilled
Blogs
Security, Compliance, and Identity - https://techcommunity.microsoft.com/t5/security-compliance-and-identity/bg-p/MicrosoftSecurityandCompliance