Microsoft Learn Student Ambassador Voices: Big impacts, key skills, and small thrills

This article is contributed. See the original author and article here.

Microsoft Learn Student Ambassadors never stop learning and pushing themselves to reach the next step.


 


What do they hope to achieve while they’re in the program? What skills have they already learned, and what’s next as they chart their course? What keeps them going through long study sessions and coding sprints? They’re here to tell you.


 


“While you’re in the Learn Student Ambassador program, how do you plan to make a positive difference? What have you been working on already?”


 


Whether they’re working with their Leagues on big group projects, planning events, or making their impact more generally, this group of Student Ambassadors is passionate about making a difference in their communities.


 









“I will try to bring about a positive change by organizing events and forwarding and imparting my knowledge to others. I will try new Microsoft Learn paths so that I can enhance my knowledge. I am also starting to plan my first event for the beta milestone with a co-Ambassador.”


Eva Thakran, final-year student at Manav Rachna International Institute of Research and Studies



 









“I have organized events and represented Student Ambassadors (as mentor and judge) in Major League Hacking. I am planning to organize more events, reach out to more people, and learn.”


Sushant Gaurav, second-year student at the Lakshmi Narain College of Technology Bhopal



 









I have done many technical and non-technical events and organized a global AI gaming tournament with my team, and I’m currently running an initiative named Voice of Code (started in April 2020), which is a global technical blogging community that focuses on the importance of content creation and organizes global contests and events.”


Nancy, fourth-year student at KIET Group of Institutions



 









“The Microsoft Learn Student Ambassadors program provides you with ample opportunities to upskill yourself and make an impact in the community. Being a part of this program has given me a platform to make an impact in the lives of other students. I am continuously seeking to expand my knowledge with Microsoft technologies and become an expert with them. My future footprints as a Student Ambassador are to upskill the students with these technologies and provide them with learning resources so that every student grows and achieves more in their career.”


Rohit Yadav, third-year student at IMS UC Campus, Ghaziabad, Uttar Pradesh



 









“While I am part of the Microsoft Learn Student Ambassador program, I plan to make a positive difference by helping others find their place in tech. My motto is ‘Don’t Fear the Code,’ so I like to demystify tech through workshops—like Intro to Python and GitHub—to give people a strong start in their tech journey. What I am working on now is a series of events called ‘Microsoft Learn Parties,’ where I help participants go through my favorite Microsoft Learn modules as a community of avid learners.”


Darren Butler, third-year student at Philander Smith College



 









“The way I work is through events. I am currently organizing, together with my work team, a diploma based on the IC3 Certification that is focused on the student public. This will allow them to have a good base of the topics they should know in order to continue with their certifications, but already in more advanced topics.”


Leydi Rosmery Aylas Curi, tenth-round student at Universidad Peruana de las Américas



 


“What skills did you learn in school that have become important to you now? What do you want to learn next?”


 


One of the great things about the Student Ambassador program is that it helps participants bridge the gap between their formal education and the things they’re capable of as mentors and professionals. And with a group this passionate about technology, there’s always something new to learn. Here’s what they brought to the program and what they plan to dive into next.


 









“My school taught me discipline, time management, and leadership. I have anchored some school-level events, which helped me to develop public speaking skills and overcome stage fright.”


Sushant Gaurav, second-year student at the Lakshmi Narain College of Technology Bhopal, studying Computer Science (B.Tech)



 









“The skills that I got a good opportunity to showcase and practice now are leadership, teamwork, problem solving, communication skills, and many more. I have been working in cloud, web, and application development domains. I want to learn and explore more about Microsoft Power Platform. The whole idea of Power Apps is something that is really fascinating and interesting to explore.”


Nancy, fourth-year student at KIET Group of Institutions



 









“During my schooling, I have learned numerous skills which have become important to me now. I learned the basics of programming in languages like C and Java, and I learned numerous skills like managing my school’s Azure Active Directory and building Power Apps, which have helped me a lot now. In my next steps, I want to explore cloud-powered technologies like serverless computing, containers, and orchestration and deploy them on Microsoft Azure. I am exploring AI and am working towards deploying my code on Azure. In that step, I want to explore different cognitive services and use them in my projects.”


Rohit Yadav, third-year student at IMS UC Campus, Ghaziabad, Uttar Pradesh



 









“The skill that I have learned in school that has become most important to me is working with data structures, algorithms, and problem solving. Next, I want to learn how to apply machine learning and artificial intelligence solutions to mobile apps to create useful or entertaining apps.”


Darren Butler, third-year student at Philander Smith College



 









“I have learned several things in school, but the one that has always helped me to be encouraged, to learn, and to perform is teamwork. Every time, while we do a task, it has given me a new viewpoint and has given me multiple possibilities to learn and grow my skills. Every time, the next thing I want to learn is from my mistakes. I look for the ways through which I can avoid past mistakes and can give better results each time.”


Aditi Tewari, third-year student at the Birla Institute of Applied Sciences, Bhimtal



 


“What’s your favorite snack to eat or music to listen to while you study?”


 


It’s not all a grind, but when these Student Ambassadors hunker down to get some work done, most of them have go-to treats and tunes to help them stay focused. Of course, for some of them music is distracting, so they prefer to keep it off. It’s important to find what works for you and embrace it.


 









“I love eating chocolates and Lays chips in between my studies. Singing is my hobby, so I listen to music and sing a lot. Music makes me smile every time. :smiling_face_with_smiling_eyes:”


Sushant Gaurav, second-year student at the Lakshmi Narain College of Technology Bhopal, studying Computer Science (B.Tech)



 









“Music has always been among the most important parts of my life. I prefer to listen to soft, soothing kinds of music that help keep the mind calm. Occasionally some rock music works as well. Considering the fact that I am quite a foodie and always need something to eat, any spicy snacks would work.”


Nancy, fourth-year student at KIET Group of Institutions



 









“My favorite music to listen to while I study is lo-fi music. Occasionally, during intensive coding sessions, rap and pop helps as well.”


Rohit Yadav, third-year student at IMS UC Campus, Ghaziabad, Uttar Pradesh



 









“Actually, I am a very easily distracted person, so when I study, I prefer not to listen to music. As for food, with good alfajores (a sandwich cookie), I’m able to study happily.”


Leydi Rosmery Aylas Curi, tenth-round student at Universidad Peruana de las Américas



 









“I like listening to house music when I study, but most of the time it makes me sleepy, so I compromise and listen to rap.”


Ilias Eleta, fourth-year student at the University of Macedonia



 









“My favorite snack to eat between studying topics is a cookie. I just love to eat chocolate or chocolate cookies and I also listen to music in between, such as my favorite artist, Maluma (Colombian artist), and to walk around.”


Eva Thakran, final-year student at Manav Rachna International Institute of Research and Studies, studying Computer Science (B.Tech)



 









“I’m from the Bahamas and I love jazzy sounds, so my favorite snack and music to enjoy while studying are plantain chips and lo-fi hip hop.”


Darren Butler, third-year student at Philander Smith College



 


Your turn! As a Student Ambassador, how would you build your skills and pay it forward?


 


Students in the Microsoft Learn Student Ambassador program gain access to all kinds of opportunities to learn and grow. As you become an expert in the technology that sparks your passion, how would you share that knowledge with your community?


 

Get email notifications on new incidents from Microsoft 365 Defender

Get email notifications on new incidents from Microsoft 365 Defender

This article is contributed. See the original author and article here.

A new Microsoft 365 Defender feature now lets you receive notification emails directly to your mailbox for each new incident or incident update, this will help you to stay on top of the incident queue.


Get notifications based on incident severity or by device group. You can also choose to only be notified on the first update for each incident.


 

 

 

 

 

 

Screenshot 2020-12-23 165410.png


 


The notification email contains important details like the incident name, severity, and category.


 


This notification email enables you to review your incidents effectively, without requiring any trouble ticketing system or API integrations.  It can be a big help in transitioning your security operations processes and leveraging the great efficiency improvements provided through the incident’s alert correlation capabilities


 


Once you get the notification, you can go directly to the incident and start your investigation right away. For more information on investigating incidents, see Investigate incidents in Microsoft 365 Defender.


 


If you are looking for more information on how to set up incident email notification in Microsoft 365 Defender, see the full instructions.


 


 


 


 

Log Analytics UI – Visualization control menu upgraded

Log Analytics UI – Visualization control menu upgraded

This article is contributed. See the original author and article here.

Intro:


Visualizing your data is a great way to gain insight and quickly learn what you need from your logs.


We have improved our chart tab in Log Analytics offering a new way to control your visualization making it easier for you to reach the exact visualization you need.


The new control pane:


The new control pane for visualization is located to the right hand side of the visual:


New visualization controls Pie chart V2.png


 


 


The new pane offers a clean, modern look and offers a more intuitive way to manage your visual.


The new pane may also be collapsed to allow focus on the visualization and save screen real-estate.


Feedback


We appreciate your feedback! comment on this blog post and let us know what you think of the new visualizations control pane.

Calling REST API service using JSON object with fixed order of elements

Calling REST API service using JSON object with fixed order of elements

This article is contributed. See the original author and article here.

When calling a REST API service with a JSON payload from Logic Apps, Logic Apps reorders JSON elements alphabetically, while some services expects the elements to be in a fixed order causing the service call to fail with an error.


 


This behavior happens when constructing the JSON payload inside a compose action or the HTTP action body field; after save, the elements are automatically reordered alphabetically.


 


The standard definition of a JSON object is:


An object is an unordered collection of zero or more name/value pairs, where a name is a string and a value is a string, number, boolean, null, object, or array.


 


For Example:


A service expects the following JSON object: 


{


“Name”: “XXX XXXX”,


“Age”: “XX”


}


Logic Apps reorder the elements of the JSON object to become as follows:


{


“Age”: “XX”,


“Name”: “XXX XXXX”


}


 


To workaround this, please use the following steps:



  1. Use Variables – initialize variable action to initialize a string variable setting the value to the JSON object string.

  2. Use the initialized variable as the body for the HTTP action calling the service.


Your workflow should look as follows:


talsaifi_0-1608628998684.png

The Mysterious Case of the Self-Moving FSMO Roles

The Mysterious Case of the Self-Moving FSMO Roles

This article is contributed. See the original author and article here.

 


Hello all This is Chris Cartwright from Directory Services I had a coworker, Eric Jansen, reach out to me from the field and ask about an incident on site he was looking into a scenario where “the PDCE (Primary Domain Controller Emulator) and DNM (Domain Naming Master) mysteriously moved…” to a DC in another site He said what was weird was who the logs said performed it He also said that the other site used their own procedures to build their DCs, which apparently included using Windows Servers Essentials for the base OS Now, I have never heard of anyone doing that in an enterprise environment, but it got us curious… 


 


Administrators are running the beautiful, pristine Contoso domain forest, (with 2 DCs of course…because two is one, and one is none!).  They were built with Windows Server 2012 R2 Datacenter.  They know that the FSMOs are still on the first DCs built, and can see that by running “netdom query fsmo“:    


 


EJansen_0-1608667230286.png 


 


One day, Contoso-HQ has a new subsidiary, Tailspin Toys that needs Active Directory services for their store.  Per Contoso’s Organizational Policy, this company will exist on the same domain, and they have authorized admins at that site to promote the new DCs for that site.  In preparation for this, the Contoso admins create the site and subnets for the new company’s location.   


 


EJansen_1-1608667230289.png


 


30 days go by and the admins at Contoso notice something odd: 


 


EJansen_2-1608667230292.png


 


  


The problem is…nobody authorized that change.  They call the admins at Tailspin Toys and asked if they knew anything about this, and they didn’t…. Not good.   


 


So, the first thing that they did was figure out when the change occurred.  To do that they used Repadmin.exe with the /ShowObjMeta switch, to see when the FSMORoleOwner attribute changed for the roles that they were interested in.   The timestamp for the last modification to that attribute can be found by looking at the object metadata for that attribute at the following DN locations (for each respective role): 


 



  • RID Master – “cn=Rid Manager$,cn=system,dc=contoso,dc=com”

  • Infrastructure Master – “cn=infrastructure, dc=contoso,dc=com”

  • PDC Emulator – “dc=contoso,dc=com

  • Domain Naming Master – “cn=partitions,dc=configuration, dc=contoso,dc=com

  • Schema Master – “cn=schema,dc=configuration, dc=contoso,dc=com


 


In this case, they were interested in the Domain Naming Master, and the PDCE Emulator role movements operations. 


 


EJansen_3-1608667230214.png


 


Once the Contoso Admins figured out when the role was moved and where the change originated from, they now know where to start their search in the event logs.  With that said, the Contoso admins transfer the roles back, and then start digging through the logs.   


 


They find these two events in the Directory Services logs on ContosoDC1: 


 


(PDC) 


 


EJansen_4-1608667230315.png 


 


(Domain Naming Master) 


 


EJansen_5-1608667230317.png


 


So, the change did come from ContosoDC3, but the admins know that they can look at the logs on DC3 to see what user account initiated this, because it’s listed with “User.” 


 


So, they take a look at ContosoDC3…but what they see isn’t exactly what they expected: 


 


EJansen_6-1608667230306.png


 


 


EJansen_7-1608667230308.png


  


The user is SYSTEM.  Has ContosoDC3 become self-aware?  Should we expect robots from the future?  The administrators continue digging, now focusing on the security logs during the same timeframe.  At 8:54:35 PM, the same time that they saw the roles move in the Directory Services log, they now find the following in the security logs on ContosoDC3: 


 


Note the Login ID… 


 


EJansen_8-1608667230310.png


 


 


EJansen_9-1608667230303.png


 


This log entry continued… 


 


EJansen_10-1608667230295.png


 


 


This event looks interesting.  “An operation was performed on an object.”  The operation in this case was a “Change PDC Operation” (https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/99dd371d-9ede-417f-beb1-a065c10ef68f) 


 


EJansen_11-1608667230311.png


 


This just goes to show how important it is to have proper auditing in place...you DO have proper auditing setupenabled, and verified in your environment, don’t you?  If not, I suggest you take a look at Michael Hildebrand’s blog that discusses this in more detail, here.     


 


So, what happened?  Well, answering that would have taken a little more logging.  Procmon, for example, would have shown that the source port used above came from the silsvc.exe process on the same server.   


 


EJansen_12-1608667230313.png


 


So, what is this silsvc.exe you ask?  That’s the Server Infrastructure Licensing Service, and fortunately, it has its own log: 


 


EJansen_13-1608667230319.png


 


And the final nail in the coffin is the very next event – “The Correction” 


 


EJansen_14-1608667230299.png


 


To sum everything up, do not put Windows Server Essentials into an existing large enterprise – it was never meant to co-exist, and all of the folks (at least that I talked to in both CSS and PFE) had never seen this scenario before.  In the real-world scenario where this happened, those remote ‘spoke site’ DC’s were only meant to be stood up temporarily, and they were.  They were stood up just long enough for the compliance threshold to be met, which moved the roles unknowingly to the ‘spoke site’, and the next day those DC’s were taken offline permanently.  It just happened that those DC’s were removed on a Friday afternoon and the repercussions weren’t felt until the following week. 


 


We tested this with Server 2012 R2 Essentials and Server 2016 Essentials while manually moving the time forward and saw the same results.  Server 2019 Essentials has the same warning, however we were unable to reproduce the issue just by simply moving the time 30 days into the future: 


 


EJansen_15-1608667230252.png


 


So, it’s being tested the old-fashioned way, and we’ll update on that later in 2021!