HAFNIUM exploit: Microsoft releases updates for older Exchange versions

Due to the severity of the HAFNIUM exploit, Microsoft has released further updates for older Exchange Server versions. However, the updates cannot be obtained via Windows Update, but must be downloaded and installed manually. Further information on the updates can be found here: March 2021 Exchange Server Security Updates for older Cumulative Updates of Exchange Server Some ... Read more

Exchange Server: Reinstallation without data loss (e.g. after an attack)

Many admins are currently reporting a successful attack on their Exchange server. Many are finding evidence of unauthorized access or even an installed web shell. Many are now unsure what to do or how to proceed. Some are now implementing IIS rewrite rules or deactivating the UM services, for example, as described in this article by ... Read more

Exchange Server: New security updates (March 2021)

Microsoft has released new security updates for Exchange Server 2013, 2016 and 2019. The prompt installation of the security updates for the affected Exchange versions is recommended by Microsoft, as the vulnerabilities are already being exploited: As active exploitation of related vulnerabilities in the wild is known (limited targeted attacks), our recommendation is to install these updates immediately to prevent ... Read more

HowTo: Zevenet Community Loadbalancer for Exchange 2019

Zevenet Loadbalancer is the successor to Zen Loadbalancer, for which I wrote a howto some time ago. Zevenet Loadbalancer is particularly suitable for test environments as it is quick to install and configure and is also free of charge. So here is an updated how-to on Zevenet and Exchange 2019. The Zevenet load balancer ... Read more

New security updates for Exchange Server 2016 - 2019 (February 2021)

Microsoft has released new security updates for Exchange Server 2016 - 2019. This is a fix for the following vulnerability: CVE-2021-24085: Microsoft Exchange Server Spoofing Vulnerability However, the vulnerability is listed as "Low" severity and an attacker must have Exchange Server credentials to exploit the vulnerability: An ... Read more

Exchange Server: Which transport rules are applied to a mail?

Exchange transport rules can be used to perform certain actions when receiving or sending emails. For example, mails can be redirected, rejected or provided with a disclaimer using a transport rule. There are many ways to implement certain actions for mails using transport rules, but with many transport rules it can quickly become a little confusing and it is not always clear which ... Read more

Exchange Server: New updates available (December 2020)

The latest CUs for Exchange Server for 2020 were released by Microsoft today. They fix the problem that no attachments can be downloaded from other mailboxes via OWA and that Outlook only displayed a maximum of 175 results in cached mode. This limit has now been raised to 1000 results. The previous security updates are ... Read more

Exchange Server: New security updates for all Exchange versions

Microsoft has released security updates for a number of vulnerabilities in Exchange Server today, and there is also an update for Exchange 2010. The following vulnerabilities are closed for Exchange 2016 and Exchange 2019: CVE-2020-17117 | Microsoft Exchange Remote Code Execution Vulnerability CVE-2020-17132 | Microsoft Exchange Remote Code Execution Vulnerability CVE-2020-17141 | Microsoft Exchange Remote Code ... Read more

Exchange: Channel 36888 / 36871 error after renewing the BackEnd certificate

After renewing the Exchange backend certificate, frequent channel error messages may appear in the event log if the POP3 service of the Exchange server is used. The following two error messages may appear after the certificate has been changed: Source: Schannel Event ID: 36871 Level: Error Fatal error while creating the client credentials for TLS. The internal error status ... Read more