<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft MVP Program Discussions topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/bd-p/mvp-forum</link>
    <description>Microsoft MVP Program Discussions topics</description>
    <pubDate>Fri, 01 May 2026 21:50:56 GMT</pubDate>
    <dc:creator>mvp-forum</dc:creator>
    <dc:date>2026-05-01T21:50:56Z</dc:date>
    <item>
      <title>MVP Enthusiast</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/mvp-enthusiast/m-p/4513054#M98</link>
      <description>&lt;P&gt;working professional more than 25 years of work exprience i do create videos on excel tutorial but never be earned pretigious award of MVP i dont know only if i post expertise on learn.microsoft.com then only my experience count as i am the expert ? my dream is dream to become MVP one just small desire have nice day all&amp;nbsp; dont want to spam but just this is my feeling thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 16:37:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/mvp-enthusiast/m-p/4513054#M98</guid>
      <dc:creator>Vinod_Sir</dc:creator>
      <dc:date>2026-04-20T16:37:02Z</dc:date>
    </item>
    <item>
      <title>MVP profile still associated with previous employer</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/mvp-profile-still-associated-with-previous-employer/m-p/4507375#M97</link>
      <description>&lt;P&gt;My old MVP profile is still associated with a previous employer’s work account.&lt;/P&gt;&lt;P&gt;I no longer have access to that account.&amp;nbsp; How can it be linked to my current account?&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 16:23:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/mvp-profile-still-associated-with-previous-employer/m-p/4507375#M97</guid>
      <dc:creator>Nigella</dc:creator>
      <dc:date>2026-03-31T16:23:51Z</dc:date>
    </item>
    <item>
      <title>MVP Nomination form for filling in community activities did not save</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/mvp-nomination-form-for-filling-in-community-activities-did-not/m-p/4491091#M89</link>
      <description>&lt;P&gt;Hi MVP team,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I have been nominated by another MVP.&lt;BR /&gt;I tried many times to create community activities, but the page didn't save my information.&lt;BR /&gt;I started from scratch on a different computer with a private web browser. But it still does not work.&amp;nbsp;&lt;BR /&gt;Can anyone help me investigate it, or does anyone else face the same problem as I do? I also sent an email to &lt;STRONG&gt;mvpga&lt;/STRONG&gt;&lt;BR /&gt;I'm waiting for them to reply, but my submission deadline is 12 Feb 2026. I hope to fill out the form before the deadline.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you for any suggestions.&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;/P&gt;&lt;P&gt;Piti&lt;/P&gt;</description>
      <pubDate>Sun, 01 Feb 2026 01:52:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/mvp-nomination-form-for-filling-in-community-activities-did-not/m-p/4491091#M89</guid>
      <dc:creator>pitichampeethong</dc:creator>
      <dc:date>2026-02-01T01:52:12Z</dc:date>
    </item>
    <item>
      <title>MVP membership</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/mvp-membership/m-p/4487028#M87</link>
      <description>&lt;P&gt;Good day,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to become a MVP - but I remember in the past you need to be sponsored and be active in the technical Microsoft forums ? I've got a MCSE. MSCD, MCDBA and MCT certifications under my belt. But not sure what the next step is ? I also my internship in the UK with the SRG team in Reading.... (and met the developer who designed and codes the old 'robocopy' console app :)&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Pieter Claassens&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2026 09:05:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/mvp-membership/m-p/4487028#M87</guid>
      <dc:creator>kopbeen</dc:creator>
      <dc:date>2026-01-19T09:05:52Z</dc:date>
    </item>
    <item>
      <title>Unable to Sign In - MVP Program Hub</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/unable-to-sign-in-mvp-program-hub/m-p/4458216#M65</link>
      <description>&lt;P&gt;When I sign in, the page seems to load with a spinning popup bar. However, after a while, I get the message:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"We couldn't sign you in. Please try again."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I have tried the following steps, but nothing worked:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Clearing the cache&lt;/LI&gt;&lt;LI&gt;Using an incognito tab&lt;/LI&gt;&lt;LI&gt;Changing my password&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;As a result, I cannot access the MVP Summit Scholarship page or the FAQ page, which is frustrating since I need the information. Could you please help me on that? Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2025 18:56:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/unable-to-sign-in-mvp-program-hub/m-p/4458216#M65</guid>
      <dc:creator>Nilufer-Dogan</dc:creator>
      <dc:date>2025-09-30T18:56:39Z</dc:date>
    </item>
    <item>
      <title>Understanding the Microsoft MVP Program: Seeking Clear Guidance</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/understanding-the-microsoft-mvp-program-seeking-clear-guidance/m-p/4439555#M62</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I’d like to start a discussion about the Microsoft Most Valuable Professional (MVP) Program. My main concern is understanding the process of becoming an MVP and the specific requirements involved.&lt;/P&gt;&lt;P&gt;I know the program recognizes exceptional community leaders and experts who share their knowledge and support others, but the actual path to nomination and selection seems a bit unclear.&lt;/P&gt;&lt;P&gt;Could anyone share clear guidance on the eligibility criteria, the nomination process, the types of contributions that are most valued, and practical tips to strengthen an application?&lt;/P&gt;&lt;P&gt;Your insights and experiences would be highly valuable, not just to me but also to others in the community who may be interested in pursuing this recognition.&lt;/P&gt;&lt;P&gt;Thank you so much for your attention and participation.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2025 03:22:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/understanding-the-microsoft-mvp-program-seeking-clear-guidance/m-p/4439555#M62</guid>
      <dc:creator>Khashayar Yazdani</dc:creator>
      <dc:date>2025-08-04T03:22:09Z</dc:date>
    </item>
    <item>
      <title>Feedback Request: Seamless Context Retention Between Voice and Text Modes in Copilot</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/feedback-request-seamless-context-retention-between-voice-and/m-p/4434980#M61</link>
      <description>&lt;P&gt;&lt;STRONG&gt;בקשת שיפור: שימור הקשר בין מצב קולי לצ'אט כתוב ב־&lt;/STRONG&gt;&lt;STRONG&gt;Copilot&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;מאת: מיכאל&lt;/STRONG&gt;&lt;STRONG&gt;, MS MVP (ישראל&lt;/STRONG&gt;&lt;STRONG&gt;)&lt;BR /&gt;נושא: שיחה רציפה והקשר נשמר בין קול לכתב&lt;/STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;תיוגים&lt;/STRONG&gt;&lt;STRONG&gt;: Copilot, VoiceChat, ContextRetention, CrossModeSync, AI usability, Excel integration, MS MVP, User Experience, Productivity, Accessibility&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Feedback Request: Seamless Context Retention Between Voice and Text Modes in Copilot&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;From: Michael, MS MVP (Israel)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Topic: Improve continuity and preserve context when switching between voice and text conversations in Copilot&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tags: Copilot, VoiceChat, ContextRetention, CrossModeSync, AI usability, Excel integration, MS MVP, User Experience, Productivity, Accessibility&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Currently, when transitioning between voice and text modes in Copilot, the ongoing conversation context is lost, resulting in a fresh and disconnected session. This poses challenges for users engaged in technical workflows (e.g., Excel functions, coding steps, formula exploration), where discussion begins in voice and requires visual follow-up in text — yet the system fails to remember what was just discussed.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Use Case:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A user verbally asks for help creating a complex Excel formula. After several minutes of voice dialog, they switch to text mode to view and refine the formula — only to discover that Copilot no longer remembers the earlier voice interaction, forcing redundant explanation and a break in continuity.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Suggested Improvements:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Enable persistent conversation memory across modes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Automatically bring recent voice summary into the next text session&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Introduce an intelligent switch that allows users to move from voice to text (and back) with full context preserved&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Support visual rendering (e.g., formulas, graphs) within voice sessions&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Value to Users:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;This improvement would dramatically boost workflow efficiency, reduce friction in technical tasks, and allow users to engage naturally — choosing the mode best suited to their needs without sacrificing consistency&lt;/STRONG&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;תיאור&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;BR /&gt;בעת מעבר בין שיחה קולית לצ'אט כתוב ב־&lt;/STRONG&gt;&lt;STRONG&gt;Copilot, לא נשמר ההקשר הקודם. השיחה מתחילה מחדש, דבר שמפריע במיוחד בשיח טכני בו מבקשים תוכן חזותי (למשל נוסחה או קוד) אחרי שדנים בו בקול&lt;/STRONG&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;מקרה שימוש&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;BR /&gt;המשתמש שואל בקול איך ליצור נוסחה מורכבת באקסל. לאחר שיחה קולית ארוכה, הוא עובר לצ'אט כדי לראות אותה בכתב — אך מגלה ש־&lt;/STRONG&gt;&lt;STRONG&gt;Copilot שכח את השיחה הקודמת. צריך לחזור על הכול מחדש&lt;/STRONG&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;הצעות לשיפור&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;שימור הקשר מלא במעבר בין קול לכתב&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;סיכום קולי אוטומטי שיופיע בצ'אט כתוב&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;מעבר חכם בין המצבים תוך שמירת רצף&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;אפשרות להציג תוכן טכני גם בשיחה קולית&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;ערך למשתמשים&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;BR /&gt;חוויית שימוש חכמה, טבעית ורציפה ללא הפרעות. מתאים במיוחד למשתמשים טכניים, אנשי מקצוע, תלמידים וכל מי שעובד באופן דינמי ומעמיק&lt;/STRONG&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Feel free to reach out if you'd like to explore this idea further. I’d be happy to help.&lt;BR /&gt;Best regards,&lt;BR /&gt;&amp;nbsp;(micky) Avidan Michael&lt;BR /&gt;Microsoft MVP – OFFICE 365 EXCEL&lt;BR /&gt;Email: email address removed for privacy reasons&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Relevant tags: Copilot, VoiceChat, ContextRetention, Excel integration, MS MVP, User Experience, Productivity, Accessibility&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jul 2025 09:24:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/feedback-request-seamless-context-retention-between-voice-and/m-p/4434980#M61</guid>
      <dc:creator>Michael_Avidan</dc:creator>
      <dc:date>2025-07-21T09:24:08Z</dc:date>
    </item>
    <item>
      <title>Pour Windows11  pour voir le Débloquer  pour le Compte pro</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/pour-windows11-pour-voir-le-d%C3%A9bloquer-pour-le-compte-pro/m-p/4192828#M57</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Bonjour&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Commentaire&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 14:52:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/pour-windows11-pour-voir-le-d%C3%A9bloquer-pour-le-compte-pro/m-p/4192828#M57</guid>
      <dc:creator>Coisy1520</dc:creator>
      <dc:date>2024-07-16T14:52:00Z</dc:date>
    </item>
    <item>
      <title>Cloud Forensics investigations in Azure</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/cloud-forensics-investigations-in-azure/m-p/4029288#M53</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;BR /&gt;How to apply the principles and methods of digital forensics within the cloud environment to investigate a security incident?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cloud forensics seeks to apply the principles and methods of digital forensics within the cloud environment to investigate any security incident. To obtain digital evidence in a cloud environment, investigators must know the data location and the access level exercised by a specific organization on that data.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Cloud forensics has many uses:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Investigation&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Cloud forensics helps in finding the source of different cloud-based crimes and solving organized cloud crimes, policy violations in a public environment, and suspicious activities in a cloud environment. In the investigation process, all sources, including manual and mechanical, are analyzed and the results are revealed. This helps the clients and service providers to secure their cloud services.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Troubleshooting&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Cloud forensic techniques assist users in troubleshooting by determining the data and hosts that are physically and virtually present in a cloud environment. They allow users to find and resolve any errors or security issues in the cloud. They help in understanding the trends of past security attacks to tackle any incident in the future.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Log monitoring&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Cloud forensic techniques include processes for generating, storing, analyzing, and correlating the massive volumes of log data created within a cloud environment. These data help the users and service providers to audit, analyze, and calculate various aspects of the cloud environment; they also help security officials in checking whether a cloud system complies with the regulatory standards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Data and system recovery&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Cloud forensics involves recovery procedures that help forensic practitioners in recovering lost, accidentally deleted, corrupted, and inaccessible data. It also enables the data acquisition of cloud systems and the creation of a forensic copy of the data that can be used by the service providers as back up; forensic experts can use this copy as evidence in the court of law.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Due diligence/regulatory compliance&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Cloud forensics also deals with the security aspects of an organization in securing critical data, maintaining necessary records for auditing purposes, and notifying the concerned team when any suspicious activity is reported; for instance, if private data have been misused or exposed. It also helps in finding the sections that miss a regulatory compliance and fixes.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;Cyber Kill Chain&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Security Center’s threat protection includes fusion kill-chain analysis, which automatically correlates alerts in your environment based on cyber kill-chain analysis, to help you better understand the full story of an attack campaign, where it started and what kind of impact it had on your resources. Security Center’s supported kill chain intents are based on the MITRE ATT&amp;amp;CK™ framework.&lt;/P&gt;&lt;P&gt;As illustrated below, the typical steps that trace the stages of a cyberattack&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;UL&gt;&lt;LI&gt;Reconnaissance:&amp;nbsp;The observation stage where attackers assess your network and services to identify possible targets and techniques to gain entry.&lt;/LI&gt;&lt;LI&gt;Intrusion:&amp;nbsp;Attackers use knowledge gained in the reconnaissance phase to get access to a part of your network. This often involves exploring a flaw or security hole.&lt;/LI&gt;&lt;LI&gt;Exploitation:&amp;nbsp;This phase involves exploiting vulnerabilities and inserting malicious code onto the system to get more access.&lt;/LI&gt;&lt;LI&gt;Privilege Escalation: Attackers often try to gain administrative access to compromised systems so they can get access to more critical data and move into other connected systems.&lt;/LI&gt;&lt;LI&gt;Lateral Movement: This is the act of moving laterally to connected servers and gain greater access to potential data.&lt;/LI&gt;&lt;LI&gt;Obfuscation / Anti-forensics:&amp;nbsp;To successfully pull off a cyberattack, attackers need to cover their entry. They will often compromise data and clear audit logs to try to prevent detection by any security team.&lt;/LI&gt;&lt;LI&gt;Denial of Service:&amp;nbsp;This phase involves disruption of normal access for users and systems to keep the attack from being monitored, tracked, or blocked.&lt;/LI&gt;&lt;LI&gt;Exfiltration:&amp;nbsp;The final extraction stage: getting valuable data out of the compromised systems.&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;Threat Hunting Tools and Methodology&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;To ensure maximum visibility of the attack chain, hunters use data sourced from proprietary incident response tooling for&amp;nbsp;point-in-time deep scanning&amp;nbsp;on endpoints, as well as bespoke forensic triage tools on devices of interest.&lt;/P&gt;&lt;P&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;point-in-time deep scanning&lt;/SPAN&gt;, for forensic investigations uses:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Proprietary incident response tooling for Windows and Linux.&lt;/LI&gt;&lt;LI&gt;Forensic triage tool on devices of interest.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://azure.microsoft.com/services/active-directory/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Microsoft Azure Active Directory&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;(Azure AD) security and configuration assessment.&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;continuous monitoring&lt;/SPAN&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://azure.microsoft.com/services/microsoft-sentinel/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Microsoft Sentinel&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;— Provides centralized source of event logging. Uses machine learning and artificial intelligence.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Microsoft Defender for Endpoint&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;— For behavioral, process-level detection. Uses machine learning and artificial intelligence to quickly respond to threats while working side-by-side with third-party antivirus vendors.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-for-identity" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Microsoft Defender for Identity&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;— For detection of common threats and analysis of authentication requests. It examines authentication requests to Azure AD from all operating systems and uses machine learning and artificial intelligence to quickly report many types of threats, such as pass-the-hash, golden and silver ticket, skeleton key, and many more.&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-cloud-apps" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Microsoft Defender for Cloud Apps&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;— Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services.&lt;/LI&gt;&lt;LI&gt;Deep scan includes proprietary endpoint scanners such as ASEP, Fennec, LIFE, and FoX&lt;/LI&gt;&lt;LI&gt;Enterprise data includes Active Directory Configuration and Antivirus logs.&lt;/LI&gt;&lt;LI&gt;Global telemetry includes the Intelligent Security Graph, the largest sensor network in the world.&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Continuous monitoring includes the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Microsoft Defender for Office 365, which monitors spoofing impersonation, and content analysis.&lt;/LI&gt;&lt;LI&gt;Microsoft Defender for Cloud Apps, which monitors app discovery, access management, and data loss prevention.&lt;/LI&gt;&lt;LI&gt;Microsoft Defender for Endpoint, which monitors exploitation, installation, and command and control channel.&lt;/LI&gt;&lt;LI&gt;Microsoft Defender for Identity, which monitors reconnaissance, lateral movement, and domain dominance.&lt;/LI&gt;&lt;LI&gt;Microsoft 365 Defender, Microsoft Sentinel, and Microsoft Defender for Cloud, which include advanced hunting, alerting, and correlation across data sources.&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;img /&gt;&lt;P&gt;&lt;SPAN&gt;This is example Hunting through the Attach chain:&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;img /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;Starting with IOCs (“known bads”)&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;The hunting cycle starts with hunting for indicators or “known bads,” ranging from the smallest unit of indicators to behavioral indicators that may define the actor.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;An incident response investigation is more manageable when you start off with an initial indicator of compromise (IOC) trigger, or a “known bad,” to take you to any additional findings. We typically begin with data reduction techniques to limit the data we’re looking at. One example is data stacking, which helps us filter and sort out forensic artifacts by indicator across the enterprise environment until we’ve determined that several machines across the same environment have been confirmed with that same IOC trigger. We then enter the hunting flow and rinse and repeat this process.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;When a security incident is detected on the Azure cloud platform, investigators must examine the log data collected from various sources. If a VM is found to be affected, it is important to take a snapshot of the OS disk of the VM for further investigation. This section discusses the forensic acquisition methodology of an Azure VM and discusses an assumed scenario to divide the whole process into multiple steps.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Virtual machine acquisition on the Azure cloud platform includes the following steps:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create a snapshot of the OS disk of the suspect VM via Azure portal or Azure CLI&lt;/LI&gt;&lt;LI&gt;Copy the snapshot to a storage account under different resource groups where it can be stored for forensic analysis&lt;/LI&gt;&lt;LI&gt;Delete the snapshot from the source resource group and create a backup copy&lt;/LI&gt;&lt;LI&gt;Mount the snapshot onto the forensic workstation&lt;/LI&gt;&lt;/OL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;DFIR Scenario:&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;In my environment I created two resource group in the same Azure Subscription:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Uros-PROD for production enviroment&lt;/LI&gt;&lt;LI&gt;SECURITY-UROS for DFIR investigations&lt;/LI&gt;&lt;LI&gt;Under Uros-PROD resource group there is VM called Ubuntu-Uros which is suspected to be compromised&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;As a forensics investigator I need to take snapshot of the OS disk of the suspected VM Ubuntu -Uros for further DIFR investigations:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;SPAN&gt;Step 1:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Create Snapshot of the OS disk of the affected VM in Azure Portal&lt;/P&gt;&lt;P&gt;Shut down th VM Ubuntu-Uros whose snapshot needs to be created&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;SPAN&gt;Step 2:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;Locate Ubuntu Ubuntu-Uros_OsDisk from Uros-PROD resource group&lt;/SPAN&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;SPAN&gt;Step 3:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;Click on Snapshot button&lt;/SPAN&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;Step 4: Create snapshot of the OS disk on the Affected VM Ubuntu -UrosGive desired name of OS snapshot (urosubuntudisksnap)storage type standard HDD&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;SPAN&gt;Step 5:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;urosubuntudisksnap snapshot is successfully created&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;Step 6:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Mount the snapshot onto the forensic workstation:&lt;/P&gt;&lt;P&gt;Open File Explorer from the Start Menu or press Win+E key togetherSelect This PC from the left-side menu, click on Computer, and select Map Network DriveSelect the drive letter and provide the UNC path in file shareIf prompted, provide the storage account name as username and storage key as passwordThe file share chfishare is now mounted under Network Locations . Double-click on the mounted share to view the dd file&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;SPAN&gt;Step 7:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Analyze the Snapshot via Autopsy&lt;/P&gt;&lt;P&gt;Once the file share containing the disksnapshot.dd file is mounted on the Forensic workstation, you can conduct forensic examination on the contents of the OS disk of the affected VM via tools like Autopsy&lt;/P&gt;&lt;img /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;RECOMMENDATIONS AND BEST PRACTICES:&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;Recommendations for devices&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Active Directory Hardening&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;You should review the&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material" target="_blank" rel="noopener"&gt;Active Directory Administrative Tier model&amp;nbsp;&lt;/A&gt;&lt;/SPAN&gt;(0/1/2), Restrict Service Accounts from interactive logins.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Use MSA or GMSA for Service Accounts&lt;/P&gt;&lt;P&gt;Standardize DCs and reduce attack surface&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Microsoft Defender for Endpoint&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Enroll 100% of devices in Microsoft Defender for Endpoint&lt;/P&gt;&lt;P&gt;Actively monitor alerts and quickly take action on issues in the console&lt;/P&gt;&lt;P&gt;Leverage Microsoft Threat Experts for help monitoring advanced attacks&lt;/P&gt;&lt;P&gt;Regularly review Threat and Vulnerability Management and follow remediation steps, starting with most critical to your organization&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Patching&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Implement a comprehensive patching strategy across all systems, for both Microsoft and 3rd party products.&amp;nbsp;This is critical.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Windows 10 Hygiene&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Tighten up&amp;nbsp;&lt;A href="https://securitycenter.windows.com/software-inventory/microsoft-_-windows_10/versions" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Windows 10 build to N-1&lt;/SPAN&gt;.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Enable Credential/Device/Exploit Guard, Windows Hello for Business, SmartScreen, Application Control, Controlled Folder Access, Attack Surface Reduction, BitLocker, Secure Boot, etc.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Windows Firewall&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Ensure this is enabled on 100% of computers via Group Policy.&amp;nbsp;This greatly reduces lateral movement attack surface&lt;/P&gt;&lt;P&gt;Block all the incoming connection on the clients (manage the exceptions for Help Desk access)&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;Recommendations for identity&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Manage Legacy protocols&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Inventory &amp;amp; Disable SMBv1&lt;/P&gt;&lt;P&gt;Inventory &amp;amp; Disable NTLM&lt;/P&gt;&lt;P&gt;Inventory &amp;amp; Discontinue use of TLS 1.0 and 1.1 (EOL ‘Spring 2021’)&lt;/P&gt;&lt;P&gt;Update&amp;nbsp;all&amp;nbsp;services &amp;amp; apps which use SMTP, Telnet, FTP, IMAP, etc. to modern non-clear-text alternatives. This is&amp;nbsp;required&amp;nbsp;to disable Legacy Authentication in Office 365, which is required for Conditional Access&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Strong Authentication&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;A username and password is no longer enough. Use technologies such as Passwordless, Hello for Business, FIDO, Azure AD MFA or OATH tokens to enforce Strong Authentication for all signings.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Centralize Logging&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Ensure that sign in data flows to a central location for detailed analysis and enrichment&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Just-in-time administration&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Where possible, enforce just-in-time access for administration, using solutions like Privileged Identity Management for Azure AD or Privileged Access Management for Active Directory&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Credential Hygiene&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Continue Credential Hygiene Best Practices&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.aka.ms/tier0" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;www.aka.ms/tier0&lt;/SPAN&gt;&amp;nbsp;&lt;/A&gt;for reference materials&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;Recommendations for access&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Risk based access&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Consider using the risk level of users and devices as a condition for accessing corporate systems&lt;/P&gt;&lt;P&gt;Block access or require higher level of confidence for users and/or devices based on risky activities&lt;/P&gt;&lt;P&gt;Requires Azure AD Identity Protection and / or Intune and MDE enrolment&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Remote Tools &amp;amp; VPN&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Remote access tools were identified. Ensure that 100% of these are managed &amp;amp; monitored for legitimate usage&lt;/P&gt;&lt;P&gt;Ensure VPN clients are legitimate &amp;amp; monitored, and MFA is required&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Monitor &amp;amp; Audit MSSP&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Perform regular audits of any external vendors management and activity&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Privileged Access Workstation (PAW)&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Securing privileged access is a critical first step to establishing security assurances for business assets in a modern organization. The security of most or all business assets in an IT organization depends on the integrity of the privileged accounts used to administer, manage, and develop.&lt;/P&gt;&lt;P&gt;This above figure shows how reversing the control relationship and accessing user apps from an admin workstation gives the attacker no path to the targeted object. The user jump box is still exposed to risk so appropriate protective controls, detective controls, and response processes should still be applied for that internet-facing computer.&lt;/P&gt;&lt;img /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Securing privileged access is a critical first step to establishing security assurances for business assets in a modern organization. The security of most or all business assets in an IT organization depends on the integrity of the privileged accounts used to administer, manage, and develop.&lt;/P&gt;&lt;P&gt;Plan deployment of Privileged Admin Workstation (PAW) for EA/DA T0, T1, and Azure admins.&lt;/P&gt;&lt;P&gt;Monitor T0 accounts and audit usage regularly.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;Recommendations for cloud&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;User Entity Behavioral Analytics (UEBA)&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Use Cloud App Security and Azure AD Identity Protection to identify anomalous user activity.&lt;/P&gt;&lt;P&gt;Manage and respond to alerts regularly to help train the systems.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Azure Security Center&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Monitor and manage IaaS and PaaS security configurations to protect cloud workloads. Use Insights and Recommendations to prioritize and plan remediation activities&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Azure Monitor + Defender for Cloud + Sentinel+XDR&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Microsoft Sentinel is a cloud-native SIEM tool; Microsoft 365 Defender provides XDR capabilities for end-user environments (email, documents, Microsoft Teams, identity, apps, and endpoint); and Microsoft Defender for Cloud provides XDR capabilities for infrastructure and multicloud platforms including virtual machines, databases, containers, storage, and IoT. Altogether, the security operations team gets a fully integrated solution to prevent, detect, respond to, and protect against attacks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Microsoft 365 security center&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Benefit from a combined incident queue, correlation of signals across cloud services and configuration management for multiple platforms in one place.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://security.microsoft.com/" target="_blank" rel="noopener"&gt;https://security.microsoft.com&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Microsoft Defender for Office 365&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Use behavioral analysis of emails, attachments and files to protect Office 365 from zero day or polymorphic threats.&lt;/P&gt;&lt;P&gt;Anti-Phishing policies help protect against user or domain impersonation.&lt;/P&gt;&lt;P&gt;Regularly review and respond to alerts in the Microsoft 365 security center and train end-users with Attack Simulation training modules.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;SMB — Preventing SMB traffic&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Because SMB is a remote file system, it requires protection from attacks where a Windows computer might be tricked into contacting a malicious server running inside a trusted network or to a remote server outside the network perimeter. Firewall best practices and configurations can enhance security preventing malicious traffic from leaving the computer or its network.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Impact of changes&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Blocking connectivity to SMB may prevent various applications or services from functioning. For a list of Windows and Windows Server applications and services that may stop functioning, review&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://support.microsoft.com/help/832017/service-overview-and-network-port-requirements-for-windows" target="_blank" rel="noopener"&gt;Service overview and network port requirements for Windows&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;Weak Passwords&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Enable Azure AD Password Protection&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Detects and blocks known weak passwords and their variants and can also block additional weak terms that are specific to your organization.&lt;/P&gt;&lt;P&gt;On-premises deployment of Azure AD Password Protection uses the same global and custom banned password lists that are stored in Azure AD and does the same checks for on-premises password changes as Azure AD does for cloud-based changes.&lt;/P&gt;&lt;P&gt;These checks are performed during password changes and password reset events against on-premises Active Directory Domain Services (AD DS) domain controllers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;H2&gt;Password Leak&lt;/H2&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Azure Identity Protection&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Azure AD works by calculating a user risk level for each user.&lt;/P&gt;&lt;P&gt;The risks identified by Azure AD Identity Protection are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Leaked credentials&lt;/LI&gt;&lt;LI&gt;Impossible travel to atypical locations&lt;/LI&gt;&lt;LI&gt;Sign-ins from infected devices&lt;/LI&gt;&lt;LI&gt;Sign-ins from anonymous IP addresses&lt;/LI&gt;&lt;LI&gt;Sign-ins from IP addresses with suspicious activity&lt;/LI&gt;&lt;LI&gt;Signs in from unfamiliar locations&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;SPAN&gt;Companies must guarantee that digital evidence they provide in response to legal requests demonstrates a valid&amp;nbsp;Chain of Custody&amp;nbsp;(CoC) throughout the evidence acquisition, preservation, and access process. To ensure a valid CoC, digital evidence storage must demonstrate adequate access control, data protection and integrity, monitoring and alerting, and logging and auditing.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 14 Jan 2024 20:18:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/cloud-forensics-investigations-in-azure/m-p/4029288#M53</guid>
      <dc:creator>urosbabic1975</dc:creator>
      <dc:date>2024-01-14T20:18:12Z</dc:date>
    </item>
    <item>
      <title>We need to stop bullying in gaming and make it safe for everyone</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/we-need-to-stop-bullying-in-gaming-and-make-it-safe-for-everyone/m-p/4017132#M52</link>
      <description>&lt;P&gt;I help in my community we have a church outreach program where the goal is to better society by helping youth navigate the horrible situation with online bullying especially in gaming i plan to help Xbox/microsoft in this idea because as with my community I believe everyone should treat one another fairly and without discrimination I have been a proud member of our tech outreach program at the church for 4 years and plan on making more progroms like it so that society can move forward without discrimination as someone who has been discriminated against for being disabled this is very important to me&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sincerely&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jake Cramer&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 17:28:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/we-need-to-stop-bullying-in-gaming-and-make-it-safe-for-everyone/m-p/4017132#M52</guid>
      <dc:creator>JakeCramer1998</dc:creator>
      <dc:date>2023-12-27T17:28:23Z</dc:date>
    </item>
    <item>
      <title>Change in my tagging from super contributor to Regular contributor</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/change-in-my-tagging-from-super-contributor-to-regular/m-p/3900559#M50</link>
      <description>&lt;P&gt;I was ranked Super contributor on July 18-2023 today when i check I become a regular contributor wondering why that happened&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2023 07:02:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/change-in-my-tagging-from-super-contributor-to-regular/m-p/3900559#M50</guid>
      <dc:creator>Chandrasekhar_Arya</dc:creator>
      <dc:date>2023-08-16T07:02:25Z</dc:date>
    </item>
    <item>
      <title>Can you help me finding the link to apply for an MVP award?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/can-you-help-me-finding-the-link-to-apply-for-an-mvp-award/m-p/3875027#M44</link>
      <description>&lt;P&gt;Dear Madam/Sir&amp;nbsp;@TechCommunity,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope all is going well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand that you can apply for an MVP award or be nominated by someone else, but I am having trouble finding the link to do it myself. Can you help me with that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I really appreciate any help you can provide.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Peace and blessings,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bekim&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jul 2023 22:10:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/can-you-help-me-finding-the-link-to-apply-for-an-mvp-award/m-p/3875027#M44</guid>
      <dc:creator>BekimDauti</dc:creator>
      <dc:date>2023-07-14T22:10:26Z</dc:date>
    </item>
    <item>
      <title>Microsoft MVP Summit</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/microsoft-mvp-summit/m-p/3407015#M43</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello greetings to all members. I have to discuss something very important as you know it's be very good feelings when we became MVP and you guys also know that one of the most important &amp;amp; favorite part that we can attend mvp summit physically &amp;amp; visit Microsoft campus hq at Redmond/ Bellevue it's like our dream come true coz visit Microsoft Redmond campus is everyone wish who love Microsoft. But 2020 to 2022 due to covid it's all become virtual which is heartbreaking coz almost all mvp want to attend mvp summit in real.. It's my request that Microsoft should resume it's MVP summit from next year so we can visit Microsoft campus in Redmond &amp;amp; Bellevue in real &amp;amp; now almost everything become normal, all physical activities resumed so Microsoft also resume the MVP summit &amp;amp; invite those mvp who are vaccinated.. I am very excited for 2023 mvp summit coz I am sure it will be all physical not virtual.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2022 17:01:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/microsoft-mvp-summit/m-p/3407015#M43</guid>
      <dc:creator>AliZamin</dc:creator>
      <dc:date>2022-05-20T17:01:53Z</dc:date>
    </item>
    <item>
      <title>Error on the link to the MVP Nomination form for filling in community activities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/error-on-the-link-to-the-mvp-nomination-form-for-filling-in/m-p/2436333#M37</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been nominated for the MVP consideration by another MVP, due to that I received an email to fill in the community activities using a link to a form.&amp;nbsp;I’ve tried to access the form to submit further details, it prompted for a User ID and password to which I have entered my Microsoft live account credentials. After the login, it gives the following error message&lt;/P&gt;&lt;P&gt;Sorry, an error occurred while processing your request. (500)&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’ve tried the link in different browsers &amp;amp; devices, there is no change. I am not sure if this is the correct forum to ask this question. If you could advise the correct support team, it would be great. Thanks much for your help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;P.S: I have sent an email to&amp;nbsp;&lt;A href="mailto:mvpga@microsoft.com" target="_blank" rel="noopener"&gt;mvpga@microsoft.com&lt;/A&gt;&amp;nbsp;with the error message details, yet to see a response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mohamed Ashiq Faleel&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 18:13:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/error-on-the-link-to-the-mvp-nomination-form-for-filling-in/m-p/2436333#M37</guid>
      <dc:creator>AshiqFaleel</dc:creator>
      <dc:date>2021-06-10T18:13:35Z</dc:date>
    </item>
    <item>
      <title>Scholar World for top Teens</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/scholar-world-for-top-teens/m-p/2338881#M36</link>
      <description>&lt;P&gt;Almost many teens are ready for global leadership,necking out from the past programs teens will have lots of input&lt;img class="lia-deferred-image lia-image-emoji" src="https://techcommunity.microsoft.com/t5/s/html/@7C3DD6040F950CF276CFDB3C1D92ABBC/images/emoticons/stareyes_40x40.gif" alt=":stareyes:" title=":stareyes:" /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 09 May 2021 12:44:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/scholar-world-for-top-teens/m-p/2338881#M36</guid>
      <dc:creator>aprilpal</dc:creator>
      <dc:date>2021-05-09T12:44:40Z</dc:date>
    </item>
    <item>
      <title>To become an MVP, shall I need to contribute on particular area?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/to-become-an-mvp-shall-i-need-to-contribute-on-particular-area/m-p/2247555#M34</link>
      <description>I have few queries :&lt;BR /&gt;&lt;BR /&gt;1) I have been actively involved in MSDN and Technet Forums. I have a query here. Suppose, I'm helping the community under ". NET" Category. Again under this we have 3 more subcategories : dotnetcore, dorltnet framework and dotnet runtime core. So each of these have leaderboards?&lt;BR /&gt;&lt;BR /&gt;2) If I move top by contributing on the leaderboard in any of the platform, is someone has to nominate or Microsoft will give me MVP?&lt;BR /&gt;&lt;BR /&gt;3) Is contribution to one domain suffice for MVP?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Kindly help me on the same. Thanks for your time!</description>
      <pubDate>Wed, 31 Mar 2021 18:42:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/to-become-an-mvp-shall-i-need-to-contribute-on-particular-area/m-p/2247555#M34</guid>
      <dc:creator>PranamBhat</dc:creator>
      <dc:date>2021-03-31T18:42:20Z</dc:date>
    </item>
    <item>
      <title>I am interested to get MVP award</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/i-am-interested-to-get-mvp-award/m-p/2150652#M26</link>
      <description>&lt;P&gt;I am with Microsoft technology almost 10 years, participating in microsoft community support and posting blogs in personal website.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure how i will get nominated in MVP Award no updates received.&lt;/P&gt;&lt;P&gt;How to get nominated in MVP?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 22:32:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/i-am-interested-to-get-mvp-award/m-p/2150652#M26</guid>
      <dc:creator>rogercarias</dc:creator>
      <dc:date>2021-02-19T22:32:30Z</dc:date>
    </item>
    <item>
      <title>I am interested to get MVP award</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/i-am-interested-to-get-mvp-award/m-p/2017453#M22</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am with Microsoft technology almost 10 years, participating in microsoft community support and posting blogs in personal website.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure how i will get nominated in MVP Award no updates received.&lt;/P&gt;&lt;P&gt;How to get nominated in MVP?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Dec 2020 07:32:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/i-am-interested-to-get-mvp-award/m-p/2017453#M22</guid>
      <dc:creator>learn2skills</dc:creator>
      <dc:date>2020-12-28T07:32:38Z</dc:date>
    </item>
    <item>
      <title>Virtual Workshop or Training</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/virtual-workshop-or-training/m-p/1537216#M21</link>
      <description>&lt;P&gt;I can not sign in to the&amp;nbsp;&lt;SPAN&gt;Virtual Workshop or Training.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 21:50:50 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/virtual-workshop-or-training/m-p/1537216#M21</guid>
      <dc:creator>CMEIHUANG</dc:creator>
      <dc:date>2020-07-21T21:50:50Z</dc:date>
    </item>
    <item>
      <title>Can I become MVP ? Looking for Newbie Guide to path to MVP</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/can-i-become-mvp-looking-for-newbie-guide-to-path-to-mvp/m-p/1504496#M17</link>
      <description>&lt;P&gt;Would love to contribute to this community . Is there any path I can take to become MVP ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any Suggestions , Ideas , Discussion and tips would be highly Welcome &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chirag&lt;/P&gt;&lt;P&gt;&lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="717107" data-lia-user-login="chiragsukhija" class="lia-mention lia-mention-user"&gt;chiragsukhija&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2020 19:19:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-mvp-program/can-i-become-mvp-looking-for-newbie-guide-to-path-to-mvp/m-p/1504496#M17</guid>
      <dc:creator>chiragsukhija</dc:creator>
      <dc:date>2020-07-04T19:19:24Z</dc:date>
    </item>
  </channel>
</rss>

