{"id":7536,"date":"2021-12-16T04:46:01","date_gmt":"2021-12-16T04:46:01","guid":{"rendered":"https:\/\/www.insentragroup.com\/gb\/?p=7536"},"modified":"2023-08-01T11:51:01","modified_gmt":"2023-08-01T11:51:01","slug":"mitigation-and-patching-for-hafnium","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/gb\/insights\/geek-speak\/cloud-and-modern-data-center\/mitigation-and-patching-for-hafnium\/","title":{"rendered":"Mitigation and Patching for HAFNIUM"},"content":{"rendered":"\n<p>If you are operating on-premises Exchange Servers, then you will be aware of the recent HAFNUIM campaign to exploit vulnerabilities in internet-facing servers. Microsoft is strongly urging customers to immediately update their on-premises Exchange Server systems.<\/p>\n\n\n\n<p>Excerpt from \u2018<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HAFNIUM targeting Exchange Servers with 0-day exploits<\/a>\u2019<\/p>\n\n\n\n<p><em>Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to email accounts and allowed the installation of additional malware to facilitate long-term access to victim environments. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to HAFNIUM, a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics, and procedures.<\/em><\/p>\n\n\n\n<p><em>The vulnerabilities recently being exploited were CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065, all of which were addressed by the Microsoft Security Response Center (MSRC) release \u2013 Multiple Security Updates Released for Exchange Server.<\/em><\/p>\n\n\n\n<p>This article outlines the steps to detect and mitigate the exploit, then patch the servers using the latest Cumulative Updates (CU).<\/p>\n\n\n\n<p>The scripts and activities outlined in this article are only for the following supported versions of Exchange Server:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exchange Server 2013<\/li>\n\n\n\n<li>Exchange Server 2016<\/li>\n\n\n\n<li>Exchange Server 2019<\/li>\n<\/ul>\n\n\n\n<p>Note: Microsoft did release a Defense in Depth Update for Exchange Server 2010 which can be found <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>. Many of the principles and best practices in this document can be applied when updating Exchange Server 2010<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #F37237; color: #F37237;\"><span>PREPARATION AND PRE-CHECKS<\/span><\/h3>\n\n\n\n<p>There is an old military adage which states, \u201cProper Preparation Prevents Poor Performance\u201d. Preparation is essential to minimize risk. It is advisable you review and\/ or enact each preparation or pre-check item before executing the mitigation and upgrade activities.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>1. EXCHANGE SUPPORTABILITY MATRIX<\/span><\/h3>\n\n\n\n<p>Refer to the \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/plan-and-deploy\/supportability-matrix?view=exchserver-2019#:~:text=The%20Exchange%20Server%20supportability%20matrix%20provides%20a%20central,component%20for%20supported%20versions%20of%20Microsoft%20Exchange%20Server.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Exchange Server supportability matrix<\/a>\u2019 to locate information about the level of support available for any configuration or required component for supported versions of Microsoft Exchange Server.<\/p>\n\n\n\n<p>Key components which should be closely investigated are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Supported operating system platforms<\/li>\n\n\n\n<li>Supported Active Directory environments<\/li>\n\n\n\n<li>Microsoft .NET Framework<\/li>\n<\/ul>\n\n\n\n<p><strong>Important!<\/strong>&nbsp; Many clients may be running outdated Exchange Server Cumulative Updates and .NET Framework Versions. Microsoft displays the following disclaimer regarding the upgrade from outdated CUs that are using older .NET versions. <em>If you&#8217;re upgrading Exchange Server from an unsupported CU to the current CU and no intermediate CUs are available, you should first upgrade to the latest version of .NET which is supported by your version of Exchange Server and then immediately upgrade to the current CU. This method doesn&#8217;t replace the need to keep your Exchange servers up to date and on the latest supported CU. Microsoft makes no claim an upgrade failure will not occur using this method, which may result in the need to contact Microsoft Support Services.<\/em><\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>1.1 BACKUP<\/span><\/h3>\n\n\n\n<p>Please ensure you have a recently tested, reliable and working full backup of both Active Directory and the Exchange Server(s).<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>1.2 MICROSOFT ARTICLE \u2013 \u2018UPGRADE EXCHANGE TO THE LATEST CUMULATIVE UPDATE\u2019<\/span><\/h3>\n\n\n\n<p>Review Microsoft\u2019s documented recommendations and instructions for upgrading Exchange Server to the latest CU in the article, \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/plan-and-deploy\/install-cumulative-updates?view=exchserver-2019\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Upgrade Exchange to the latest Cumulative Update<\/a>\u2019.<\/p>\n\n\n\n<p>Key sections and instructions which should be closely investigated include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>What do you need to know before you begin?<\/em>\n<ul class=\"wp-block-list\">\n<li>The account you will use to install the CU requires membership in the Exchange Organization Management role group. If the CU requires Active Directory schema updates or domain preparation, the account will likely require additional permissions<\/li>\n\n\n\n<li>Check the Release notes before you install the CU<\/li>\n\n\n\n<li>Backup all customizations. They will not survive the update (e.g., web.config files, EdgeTransport.exe.config file, OWA theme customizations)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Best Practices<\/em><\/li>\n<\/ul>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>1.3 WINDOWS POWERSHELL SCRIPT EXECUTION POLICY<\/span><\/h3>\n\n\n\n<p>Ensure the Windows PowerShell Script Execution Policy is set to Unrestricted on the server(s) being updated.<\/p>\n\n\n\n<p>To verify the policy settings, run the <em>Get-ExecutionPolicy<\/em> cmdlet from PowerShell on the machine being upgraded.<\/p>\n\n\n\n<p>If the server is subject to a GPO which controls the Windows PowerShell Script Execution Policy, refer to the Microsoft article \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/plan-and-deploy\/deployment-ref\/ms-exch-setupreadiness-powershellexecutionpolicycheckset?view=exchserver-2019\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ExecutionPolicy GPO is defined<\/a>\u2018 to temporarily remove any definition of MachinePolicy or UserPolicy in the ExecutionPolicy GPO.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>1.4 DISABLE ANTIVIRUS SOFTWARE<\/span><\/h3>\n\n\n\n<p>Temporarily disable any anti-virus software prior to the update process.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>1.5 WINDOWS EVENT LOGS<\/span><\/h3>\n\n\n\n<p>Check Windows Event Logs for any Warning or Errors which may need to be addressed prior to conducting any change activities on the server(s).<\/p>\n\n\n\n<p>Check Exchange-specific crimson channel event logs located under Applications and Services for any Warning or Errors that may need to be addressed prior to conducting any change activities on the server(s).<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>1.6 ACTIVE DIRECTORY HEALTH<\/span><\/h3>\n\n\n\n<p>Ensure Active Directory is healthy before conducting any change activities. This may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Review Domain Controller Event Logs<\/li>\n\n\n\n<li>Inventory the FSMO roles\n<ul class=\"wp-block-list\">\n<li>DCDIAG \/test:FSMOCHECK<\/li>\n\n\n\n<li>netdom query FSMO<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Validate Forest wide replication\n<ul class=\"wp-block-list\">\n<li>repadmin \/replsum \/bysrc \/bydest \/sort:delta<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>1.7 SPARE HARDWARE<\/span><\/h3>\n\n\n\n<p>Verify whether you have spare hardware (or enough resources in a Virtual environment) for the RecoverServer process in the event the installation will not complete successfully, and the server is in a state which cannot be reverted.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #F37237; color: #F37237;\"><span>2. DOWNLOADS<\/span><\/h3>\n\n\n\n<p>Download the following scripts and software which will either be executed against or installed on the Exchange server(s).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/aka.ms\/ExchangeHealthChecker\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HealthChecker Script<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/tree\/main\/Security#exchange-on-premises-mitigation-tool-eomt\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">One-Click Microsoft Exchange On-Premises Mitigation Tool (EOMT.ps1)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/tree\/main\/Security#test-proxylogonps1\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Test-ProxyLogon.ps1<\/a><\/li>\n\n\n\n<li>The latest CU version for the Exchange version\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/cumulative-update-9-for-exchange-server-2019-c8ee8bf0-2f1b-3183-6600-33fb005bc281\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cumulative Update 9 for Exchange Server 2019<\/a> (Released: March 16, 2021)<\/li>\n\n\n\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/cumulative-update-20-for-exchange-server-2016-98964463-f7df-4131-6b8c-4f46dafc748e\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cumulative Update 20 for Exchange Server 2016<\/a> (Released: March 16, 2021)<\/li>\n\n\n\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/cumulative-update-23-for-exchange-server-2013-d3664482-52d4-b36b-6426-0485271070b5\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cumulative Update 23 for Exchange Server 2013<\/a> (Released: June 18, 2019)\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=102775\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Update For Exchange Server 2013 CU23 (KB5000871)<\/a> (Released: March 2, 2021)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Microsoft .NET Framework version according to the <a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/plan-and-deploy\/supportability-matrix?view=exchserver-2019#:~:text=The%20Exchange%20Server%20supportability%20matrix%20provides%20a%20central,component%20for%20supported%20versions%20of%20Microsoft%20Exchange%20Server.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Exchange Server supportability matrix<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/plan-and-deploy\/supportability-matrix?view=exchserver-2019#exchange-2019\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Exchange Server 2019<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/plan-and-deploy\/supportability-matrix?view=exchserver-2019#exchange-2016\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Exchange Server 2016<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/plan-and-deploy\/supportability-matrix?view=exchserver-2019#exchange-2013\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Exchange Server 2013<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #F37237; color: #F37237;\"><span>3. UPGRADE ORDER OF PRECENDENCE<\/span><\/h3>\n\n\n\n<p>Install the updates in the following order based on server role.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>Exchange Client Access servers exposed and published to the Internet (e.g., servers publishing Outlook on the web, OWA and ECP)<\/li>\n\n\n\n<li>Internal Client Access Servers<\/li>\n\n\n\n<li>Hub Transport Servers<\/li>\n\n\n\n<li>Mailbox Servers\n<ul class=\"wp-block-list\">\n<li>a. If Mailbox Servers in a Database Availability Group (DAG) configuration\n<ul class=\"wp-block-list\">\n<li>i. Passive Mailbox Servers<\/li>\n\n\n\n<li>ii. Active Mailbox Servers<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #F37237; color: #F37237;\"><span>4. DETECTION AND REMEDIATION PROCEDURE<\/span><\/h3>\n\n\n\n<p>The following procedure is represented more as a checklist of activities to be completed and does not provide step-by-step instructions for each activity being performed. Please refer to the Microsoft-specific documentation for step-by-step instructions for execution.<\/p>\n\n\n\n<p><strong>Important!<\/strong>&nbsp;Please be sure to execute all scripts and apply all updates from an <strong><u>elevated<\/u><\/strong> command prompt (<a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2008-R2-and-2008\/cc947813(v=ws.10)?redirectedfrom=MSDN\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Start a Command Prompt as an Administrator<\/a>). Although the scripts and updates may appear to run successfully when executing from a non-elevated command prompt, some services may not start, or certain settings may not be applied properly.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>4.1 EXECUTE HEALTHCHECKER SCRIPT<\/span><\/h3>\n\n\n\n<p>Run the HealthChecker Script to get an inventory of the update-level status of the on-premises Exchange server(s)<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>4.2 ONE-CLICK MICROSOFT EXCHANGE ON-PREMISES MITIGATION TOOL<\/span><\/h3>\n\n\n\n<p>Run the One-Click Microsoft Exchange On-Premises Mitigation Tool (EOMT.ps1) to detect, protect and mitigate CVE-2021-26855<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>4.3 TEST-PROXYLOGON SCRIPT<\/span><\/h3>\n\n\n\n<p>Run Test-ProxyLogon.ps1 script to check for HAFNIUM indicators of compromise (IOCs) to address performance and memory concerns.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #F37237; color: #F37237;\"><span>5. UPGRADE PROCEDURE<\/span><\/h3>\n\n\n\n<p>The following procedure is represented more as a checklist of activities to be completed and does not provide step-by-step instructions for each activity being performed. Please refer to the Microsoft-specific documentation for step-by-step instructions for execution.<\/p>\n\n\n\n<p><strong>Important!<\/strong> Please be sure to execute all scripts and apply all updates from an <strong><u>elevated<\/u><\/strong> command prompt (<a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2008-R2-and-2008\/cc947813(v=ws.10)?redirectedfrom=MSDN\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Start a Command Prompt as an Administrator<\/a>). Although the scripts and updates may appear to run successfully when executing from a non-elevated command prompt, some services may not start, or certain settings may not be applied properly.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>5.1 PREPARE ACTIVE DIRECTORY AND DOMAINS FOR EXCHANGE SERVER<\/span><\/h3>\n\n\n\n<p>Although the CU may not require a Schema update, it is best practice to execute the preparation commands to confirm no errors and ensure a proper and consistent configuration. Refer to the Microsoft article \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/plan-and-deploy\/prepare-ad-and-domains?view=exchserver-2019\" rel=\"nofollow noopener\" target=\"_blank\">Prepare Active Directory and domains for Exchange Server<\/a>\u2019 for the proper procedure.<\/p>\n\n\n\n<p>Execute each preparation command individually. Check AD Replication after each switch is run.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\/PrepareSchema<\/li>\n\n\n\n<li>\/PrepareAD<\/li>\n\n\n\n<li>\/PrepareAllDomains or \/PrepareDomain[:&lt;DomainFQDN&gt;]<\/li>\n<\/ul>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>5.2 DAG SERVER \u2013 START MAINTENANCE MODE<\/span><\/h3>\n\n\n\n<p>If the Exchange Server is a member of a DAG, you should first put the DAG member in maintenance mode.<\/p>\n\n\n\n<p>Refer to the Microsoft article \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/high-availability\/manage-ha\/manage-dags?view=exchserver-2019#performing-maintenance-on-dag-members\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Performing maintenance on DAG members<\/a>\u2019 for the proper procedure.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>5.3 REBOOT SERVER<\/span><\/h3>\n\n\n\n<p>Reboot server prior to installing software updates to ensure no reboots are pending or any prior updates applied.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>5.4 .NET INSTALL<\/span><\/h3>\n\n\n\n<p>Install the correct new .Net version.<\/p>\n\n\n\n<p>Note:&nbsp;Keep in mind this step can take up to 40 minutes or longer, therefore do not stop the installation and keep waiting until it ends successfully.<\/p>\n\n\n\n<p><strong>Important!<\/strong>&nbsp;After the .Net installation completes, <strong><u>reboot<\/u><\/strong> the server.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>5.5 CU INSTALL<\/span><\/h3>\n\n\n\n<p>Install the Cumulative Update for Exchange.<\/p>\n\n\n\n<p>Important! After the CU installation completes, <strong><u>reboot<\/u><\/strong> the server.<\/p>\n\n\n\n<p>Perform post-install integrity checking and updates, which includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure all Exchange services are in their normal start Mode and started<\/li>\n\n\n\n<li>Review Event Logs<\/li>\n\n\n\n<li>Re-apply customizations<\/li>\n<\/ul>\n\n\n\n<p>If you run into issues after installation, please see \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/troubleshoot\/client-connectivity\/exchange-security-update-issues\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Repair failed installations of Exchange Cumulative and Security updates<\/a>\u2019 for resolution instructions.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>5.6 DAG SERVER \u2013 STOP MAINTENANCE MODE<\/span><\/h3>\n\n\n\n<p>If the Exchange Server is a member of a DAG and was placed in maintenance mode, take the DAG member out of maintenance mode.<\/p>\n\n\n\n<p>Refer to the Microsoft article \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/high-availability\/manage-ha\/manage-dags?view=exchserver-2019#performing-maintenance-on-dag-members\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Performing maintenance on DAG members<\/a>\u2019 for the proper procedure.<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>5.7 VERIFY<\/span><\/h3>\n\n\n\n<p>Verify full functionality of server and any dependency applications connecting to Exchange (Backup, Archiving, Monitoring, Mail Relay, etc.)<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 0px solid #F37237; color: #F37237; font-size: 20px;\"><span>5.8 BACKUP<\/span><\/h3>\n\n\n\n<p>Initiate a full backup of both the Active Directory and the Exchange Server(s).<\/p>\n\n\n\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #F37237; color: #F37237;\"><span>REFERENCES<\/span><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HAFNIUM targeting Exchange Servers with 0-day exploits<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/16\/guidance-for-responders-investigating-and-remediating-on-premises-exchange-server-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Guidance for responders: Investigating and remediating on-premises Exchange Server vulnerabilities<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/15\/one-click-microsoft-exchange-on-premises-mitigation-tool-march-2021\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">One-Click Microsoft Exchange On-Premises Mitigation Tool \u2013 March 16, 2021<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/webcastdiag864.blob.core.windows.net\/2021presentationdecks\/March%202021%20Exchange%20Server%20Security%20Update%20-%20EN.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">02 March 2021 &#8211; Exchange Server Security Update &#8211; Updated March 17, 2021<\/a><\/p>\n\n\n\n<p>Released: March 2021 Quarterly Exchange Updates &#8211; Updated March 16, 2021<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you are operating on-premises Exchange Servers, then you will be aware of the recent HAFNUIM campaign to exploit vulnerabilities in internet-facing servers.<\/p>\n","protected":false},"author":117,"featured_media":7822,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[21],"tags":[228,227,59,229,73,226,146,230],"class_list":["post-7536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-and-modern-data-center","tag-exchange-server","tag-hafnium","tag-microsoft","tag-microsoft-vulnerability","tag-patch-management","tag-patching","tag-windows","tag-windows-patching","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/7536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/comments?post=7536"}],"version-history":[{"count":7,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/7536\/revisions"}],"predecessor-version":[{"id":18671,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/7536\/revisions\/18671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/media\/7822"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/media?parent=7536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/categories?post=7536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/tags?post=7536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}