Welcome to MS Cloud Ninja

Your go-to resource for Microsoft cloud services, automation and security insights

About Ofir Gavish

Ofir Gavish

Cloud Infrastructure Team Lead

Microsoft MVP in Security

Expert in Azure, Intune and Microsoft 365 security and automation

As a Microsoft MVP and Cloud Infrastructure Team Lead, I specialize in empowering IT professionals and organizations with the knowledge and tools they need to effectively manage their cloud environments. With years of experience managing skilled Microsoft Cloud infrastructure teams, I focus on creating innovative solutions that simplify the complexities of cloud management.

Areas of Expertise

Microsoft Azure

Cloud infrastructure, automation and security

Microsoft Intune

Device management and compliance

Microsoft 365

User lifecycle management and Exchange Online

PowerShell & Graph API

Automation and custom solutions

Security

Zero Trust, Endpoint Security, Conditional Access, Identity and Access

Featured Projects

Innovative solutions and tools built to simplify Microsoft cloud management

Entra ID Group Membership Manager Extension

A secure Microsoft Edge extension that allows Entra ID administrators to efficiently copy group memberships between users using the Microsoft Graph API.

JavaScript Microsoft Graph API OAuth 2.0 + PKCE Browser Extension
View on GitHub

MS Cloud Ninja User Management Tool

A comprehensive Windows desktop application for streamlining user offboarding and onboarding processes in Microsoft 365 environments.

.NET 8.0 Microsoft Graph API WPF Azure AD
View on GitHub

MS Cloud Ninja Scripts Repository

A collection of PowerShell scripts and solutions for enhancing the management and automation of Microsoft Cloud services.

PowerShell Azure Automation Microsoft Graph Intune
View on GitHub

Latest Articles

In-depth guides and tutorials for Microsoft cloud technologies

Active Directory Restoration from Entra

How I Restored a Lost Active Directory from Entra Objects

Rising from the ashes: A complete guide to rebuilding your Active Directory forest using Entra ID as the source of truth after ransomware destruction.

Read More
Calendar Automation

Building Production-Grade Calendar Automation with PowerShell and Microsoft Graph

Learn how built solutions with Azure Automation, Microsoft Graph and PowerShell.

Read More
Intune Kiosk

Auto Logon & Intune Kiosk Policy Deployment Guide

Learn how to configure Auto Logon & Intune Kiosk Policy

Read More
Logic Apps

Recursively Copy Files Between OneDrive Accounts Using Azure Logic Apps

Deep dive on building a OneDrive-to-OneDrive file copier using Azure Logic Apps

Read More
Updates Automation

Deep-Dive: Automating Windows Updates Remediation Using Microsoft Intune

This deep-dive demonstrates building robust automation through detailed Graph API interactions.

Read More
SharePoint Permissions

How to Create a Custom Permission in SharePoint

Learn the process of setting up a unique permission level that allows users to edit documents without downloading.

Read More
BitLocker

BitLocker setup and key backup using Intune

Configure BitLocker using Microsoft Intune and back up the recovery keys to Azure Key Vault.

Read More
Entra Migration

Active Directory to Entra ID Migration Guide

Complete guide for migrating from on-premises Active Directory to Microsoft Entra ID with best practices.

Read More
Azure Key Vault Search

Advanced Azure Key Vault Search and Management

Master Azure Key Vault with advanced search techniques and automation for enterprise security.

Read More
Intune Alerts

Microsoft Intune Alerts and Monitoring Setup

Set up comprehensive monitoring and alerting for your Microsoft Intune environment.

Read More
Disable SMBv2 for Enhanced Security

Disable SMBv2 for Enhanced Security

Learn how to disable SMBv2 for enhanced security using Microsoft Intune with comprehensive configuration steps.

Read More
SharePoint Download Monitoring

SharePoint Download Monitoring

Modern dashboard solution for monitoring SharePoint downloads with Azure Storage and interactive reporting capabilities.

Read More

Recommended InfoSec Blog

Check out this excellent cybersecurity resource for additional insights and expertise

Visit CYBERDOM BLOG