Skip to content

Cloudcooks-M365Cooking – A spicy collection of Microsoft 365 recipes for Intune, Entra ID, Defender, and beyond. From PowerShell scripts and Graph API hacks to deployment blueprints and security hardening “dishes,” this repo serves up ready-to-use automation and configuration guides for IT pros who like their cloud well-seasoned.

License

Notifications You must be signed in to change notification settings

CLOUDCOOKCH/Cloudcooks-M365Cooking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🍳 Cloudcooks-M365Cooking

Welcome to Cloudcooks-M365Cooking — a buffet of automation scripts, Graph API tricks, and Microsoft 365 configuration recipes. Whether you’re looking to harden your tenant, deploy apps at scale, or automate repetitive admin work, this repo has something tasty for your IT kitchen.


📜 What’s on the Menu

This repository serves as a collection of:

  • PowerShell Scripts – Prepped and ready for Intune, Entra ID, and Microsoft Defender.
  • Graph API Recipes – Quick calls and complete scripts to supercharge your M365 automation.
  • Configuration Blueprints – Tested Intune policies, Conditional Access templates, and security baselines.
  • Proactive Remediations – Intune detection + remediation scripts to keep your environment clean.
  • Security Garnishes – Small tweaks and hardening steps to spice up your tenant security.

🛠 Requirements

Before you start cooking:

  • Windows PowerShell 5.1 or PowerShell 7+

  • Installed Microsoft.Graph PowerShell module

    Install-Module Microsoft.Graph -Scope CurrentUser
  • Appropriate M365 admin permissions (PIM-ready recommended)

  • Some scripts may require AzureAD or other legacy modules


🚀 Getting Started

  1. Clone the repo

    git clone https://github.com/CLOUDCOOKCH/Cloudcooks-M365Cooking.git
  2. Navigate to the recipe you need

  3. Read the ingredients (parameters, permissions, and notes in the script header)

  4. Run it — preferably in a test tenant before production


🧑‍🍳 Example Recipe

# Example: Get all devices missing a compliance policy
Connect-MgGraph -Scopes "DeviceManagementConfiguration.Read.All"
Get-MgDeviceManagementManagedDevice | Where-Object { -not $_.ComplianceState }

🧠 Why This Repo Exists

M365 admins often reinvent the wheel — or worse, Google random scripts with zero documentation. This repo aims to change that by providing documented, tested, and security-conscious scripts that you can actually trust.


🤝 Contributing

Pull requests are welcome! If you’ve cooked up a new recipe, just:

  1. Fork this repo

  2. Add your script in the correct category

  3. Include a comment header with:

    • Script purpose
    • Requirements
    • Parameters
    • Expected output
  4. Submit a PR 🍽


📜 License

This project is licensed under the MIT License — do whatever you want, but please don’t serve undercooked security.


⚡ Author

CloudCook – Serving spicy M365 automation, one dish at a time. Follow me for more cloud recipes: • Blog

About

Cloudcooks-M365Cooking – A spicy collection of Microsoft 365 recipes for Intune, Entra ID, Defender, and beyond. From PowerShell scripts and Graph API hacks to deployment blueprints and security hardening “dishes,” this repo serves up ready-to-use automation and configuration guides for IT pros who like their cloud well-seasoned.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors