Filter By
Displaying results 1 - 11 of 11 (Page 1 of 1)
|
By:
|
58,471 downloads
|
Last Updated: 2/16/2026
|
Latest Version: 3.9.0
The preqrequisites installation scripts for Microsoft security assessments |
|
By:
|
7,689 downloads
|
Last Updated: 5/20/2025
|
Latest Version: 1.0.16
Module to review the Microsoft 365 tenant settings |
|
|
|
By:
|
287 downloads
|
Last Updated: 7/22/2025
|
Latest Version: 2.0.1
Microsoft Purview Configuration Analyser - Automated compliance assessment for Sensitivity Labels, Auto-labeling, and Data Loss Prevention policies with comprehensive reporting capabilities. |
|
By:
|
226 downloads
|
Last Updated: 3/17/2026
|
Latest Version: 2.0.0
POA Module - Microsoft Purview Optimization Assessment Tool. Conducts comprehensive analysis of Microsoft 365 Purview implementation with interactive HTML reports and Excel remediation plans. |
|
By:
|
180 downloads
|
Last Updated: 3/5/2026
|
Latest Version: 0.3.3-Beta3
MCS Assessment module for evaluating and analyzing Mission Critical Services for Azure Workloads. |
|
By:
|
107 downloads
|
Last Updated: 10/16/2024
|
Latest Version: 0.22
Powershell module to assess security of Azure tenants |
|
By:
|
95 downloads
|
Last Updated: 7/31/2024
|
Latest Version: 1.0.2
This module evaluates Microsoft Defender for Endpoint configurations against best practices and exports the results to a CSV file. |
|
By:
|
54 downloads
|
Last Updated: 8/3/2025
|
Latest Version: 1.0
Gets WaaS Assessment Platform information. |
|
By:
|
30 downloads
|
Last Updated: 2/16/2026
|
Latest Version: 1.0.0
Exchange to Microsoft 365 migration pre-assessment toolkit. Inventories mailboxes, distribution groups, mail flow rules, and public folders. Identifies migration blockers and generates HTML dashboard reports. |
|
By:
|
5 downloads
|
Last Updated: 2/19/2026
|
Latest Version: 0.4.0-rc1
Comprehensive Windows security posture analysis and attack surface assessment tool. Covers 23 security categories including hardware security (TPM/VBS/Secure Boot), BitLocker, Microsoft Defender ASR rules, exploit protection, privacy settings, network security, remote access, WSL, PowerShell security, authentication policy, scheduled tasks, and Win... More info |