CVE-2024-21410: Exchange vulnerability is actively exploited

The critical vulnerability CVE-2024-21410 in Exchange Server, which was made public on February 13, 2024, is now being actively exploited. The vulnerability CVE-2024-21410 allows attackers to perform an NTLM relay attack (pass the hash). In this case, attackers can trick a client such as Outlook into logging on to a malicious relay in order to obtain the NTLM credentials. The ... Read more

Exchange security updates (November 2023)

Microsoft has released new security updates for Exchange Server 2016 and 2019. The updates fix the following vulnerabilities, which are all marked as "Important": Click here to download the updates directly: With the November security updates, the "Certificate signing of PowerShell serialization payload" feature is enabled by default. Before installing the November update ... Read more

Exchange Server: New security updates (October 2023)

Microsoft today released new security updates for Exchange Server 2016 and Exchange Server 2019. The update closes the remote execution vulnerability CVE-2023-36778 and provides a better solution for the vulnerability CVE-2023-21709 from August. There were problems with the August security update and the update was temporarily recalled. The update from October for CVE-2023-36434 ... Read more

Exchange Server and HSTS (HTTP Strict Transport Security)

Microsoft has recently officially supported HSTS (HTTP Strict Transport Security). However, HSTS is not activated by default and must therefore be activated by the user. But first a few words about HSTS and how it works. What is HSTS and how does it work? HTTP Strict Transport Security (HSTS) is a guideline ... Read more

Attention: Next Exchange CU activates Extended Protection

Microsoft has announced that the next Exchange CU will enable Extended Protection (EP) for Exchange Server 2019 by default. Extended Protection was introduced for Exchange 2016 and Exchange 2019 in August 2022 and previously had to be activated manually. However, anyone who has not yet activated Extended Protection may need to start with the installation of the ... Read more

New security updates for Exchange Server (August 2023)

After the first version of the security update was withdrawn by Microsoft, a bug-fixed version has now been released. According to initial reports, this update can now be installed on non-English Exchange servers without any problems. Click here to download the update: Microsoft has also published a list of instructions on the Exchange Team Blog: On non-English ... Read more

New security updates for Exchange Server (August 2023)

Microsoft has released new security updates for Exchange Server 2016 and 2019. The update fixes 6 vulnerabilities that are marked as important. In addition, further adjustments are necessary after installing the updates. There are currently no indications that the vulnerabilities are being exploited. Click here to download the updates: The following vulnerabilities are fixed: ... Read more

Exchange Server: Inherited permissions on databases and mailboxes

On an Exchange 2019 server, I noticed inherited permissions that were deliberately not set in this way. I suspect that these are standard permissions that are set when Exchange servers are installed. In this case, an account that was used for installation has quite extensive permissions at mailbox and database level. I noticed ... Read more

Exchange Extended Protection and HAProxy

A reader, who wishes to remain anonymous, has kindly sent me his scripts and configuration for Let's Encrypt, HAProxy and Exchange 2019 in conjunction with Extended Protection so that I can publish them here. First of all, I would like to thank you very much, because I think this configuration (HAProxy as a reverse proxy for Exchange, certificates via Let's ... Read more