Running this script will tell you if you are behind on your on-premises Exchange Server updates (note that the script does not support Exchange Server 2010).You can use the Exchange Server Health Checker script, which can be downloaded from GitHub (use the latest release). To patch these vulnerabilities, you should move to the latest Exchange Cumulative Updates and then install the relevant security updates on each Exchange Server. The first priority being servers which are accessible from the Internet ( e.g., servers publishing Outlook on the web/OWA and ECP). Specifically, to minimize or avoid impacts of this situation, Microsoft highly recommends that you take immediate action to apply the patches for any on-premises Exchange deployments you have or are managing for a customer or advise your customer of the steps they need to take. We wanted to ensure you were aware of the situation and would ask that you help drive immediate remediation steps. The vulnerabilities exist in on-premises Exchange Servers 2010, 2013, 2016, and 2019. This post is to alert you to Microsoft’s release of patches for multiple different on-premises Microsoft Exchange Server zero-day vulnerabilities that are being exploited by a nation-state affiliated group.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |