M365-Assess
Read-only Microsoft 365 security assessment for IT consultants and administrators
Cybersecurity compliance automation, framework mapping, and security assessment tools
★ 95+ stars on GitHub Explore on GitHubRead-only Microsoft 365 security assessment for IT consultants and administrators
Automatically stamps Azure resources with creator identity and configurable metadata tags via Event Grid-triggered Azure Function
More tools in development
Azure activity logs expire after 90 days. When an auditor asks who created a resource, you need a better answer. Az-Stamper solves this with automatic resource tagging.
CISA issued urgent guidance on Intune hardening after the Stryker breach. Here's what happened and the specific steps to lock down your tenant.
A step-by-step guide to running a read-only security assessment on your M365 tenant using M365-Assess.
These tools are free and open source. If they save you time, consider sponsoring to help fund continued development and new compliance tools.
Sponsor on GitHub