• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa encourages everyone to follow updated guidance for microsoft exchange

CISA encourages everyone to follow updated guidance for Microsoft Exchange fixes

You are here: Home / General Cyber Security News / CISA encourages everyone to follow updated guidance for Microsoft Exchange fixes
April 1, 2021

CISA encourages all businesses to deal with Microsoft Exchange vulnerabilities in the wake of huge exploitation strategies targeting the application. (Coolcaesar, CC BY-SA 4. https://creativecommons.org/licenses/by-sa/4., by using Wikimedia Commons)

The Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday issued a supplemental route to Unexpected emergency Directive (ED) 21-02, which lays out hardening, forensic triage and reporting needs made to mitigate vulnerabilities identified in the wake of the significant Microsoft Exchange vulnerability hacks that have afflicted tens of countless numbers of organizations.

The update directs federal departments and companies to run recently made equipment to examine whether or not their Microsoft Exchange servers have been compromised: Microsoft’s Test-ProxyLogon.ps1 script and Basic safety Scanner MSERT. Agencies must also assure their exchange servers are provisioned with a firewall, fully up-to-date, supported by Microsoft, and safeguarded by anti-malware programs, among the other listed protections.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Even though ED 21-02 mainly applies to federal civilian executive branch organizations, CISA encourages state and local governments, critical infrastructure corporations and other personal-sector businesses to evaluate the discover and consult with the following methods for further information and facts:

  • CISA Unexpected emergency Directive 21-02: Mitigate Microsoft Exchange On-Premises Merchandise Vulnerabilities
  • CISA Notify AA21-062A: Mitigate Microsoft Trade Server Vulnerabilities
  • CISA web page: Remediating Microsoft Trade Vulnerabilities
  • Microsoft’s EOMT.ps1 blog site publish

“If there at any time was a query of the impression and risk involved with these vulnerabilities, it should really clearly be answered now,” explained Tim Wade, technical director of the CTO Crew at Vectra. “CISA has instructed businesses with inadequate cybersecurity experience to fully disconnect their on-premises Trade infrastructure right up until such a time as instructions for rebuilding and reprovisioning are offered. Given the relevance of email for present day organization, these directives suggest that there are companies that may possibly be implicitly instructed to stand down from the full execution of their primary functionality except if and right until remediation happens.”


Some sections of this article are sourced from:
www.scmagazine.com

Previous Post: «legacy qnap nas devices vulnerable to zero day attack Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack
Next Post: 80% of Global Enterprises Report Firmware Cyberattacks 80% of global enterprises report firmware cyberattacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.