Microsoft has produced a resolve for a trouble with Exchange Server that led to corporate emails being remaining undelivered at the start of the new year.
In an update on January 1 2022, the computing huge revealed that messages were being stuck in transportation queues of on-premises Trade Server 2016 and Exchange Server 2019.
Though the issue was traced back again to a “date check out failure” in Trade Server’s malware scanning engine, the function was in any other case unaffected, Microsoft stated.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
“The difficulty relates to a day look at failure with the alter of the new year and not a failure of the AV motor by itself,” it stated.
“This is not an issue with malware scanning or the malware engine, and it is not a security-relevant issue. The edition examining performed from the signature file is resulting in the malware engine to crash, ensuing in messages staying caught in transportation queues.”
Microsoft declared two methods for admins to correct the problem: an automatic and a guide solution. The former calls for them to download a script to every single Trade mailbox server that downloads the anti-malware update.
The handbook option demands IT groups to validate the impacted Exchange Server version is installed, remove the present anti-malware motor and metadata, update to the latest model and validate engine update data.
Microsoft warned that even the automatic resolution “will just take some time” to distinct information queues, while the script has the advantage of staying ready to run on many servers in parallel.
“Please be client and monitor these queues are draining (variety of messages are decreasing) by making use of Get-queue command,” it included.
The incident marks an inauspicious get started to the yr immediately after a festive period throughout which lots of IT groups were being compelled into additional time to detect and patch Log4j situations across their corporation.
Due to the fact the discovery of the initially vulnerability in the popular Java logging utility, rated CVSS 10., a further 4 bugs have been revealed. The most modern (CVE-2021-44832) was explained as a “moderate” severity distant code execution flaw in version 2.17.
Some components of this write-up are sourced from:
www.infosecurity-magazine.com