DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

Microsoft urges removal of antivirus exclusions for Exchange servers to boost security

February 24, 2023
Reading Time: 2 mins read
in Alerts

 

Microsoft has recommended that administrators remove antivirus exclusions that target Temporary ASP.NET Files and Inetsrv folders, as well as the PowerShell and w3wp processes, for better security in Exchange servers. Although these exclusions were previously suggested, they are no longer necessary, according to Microsoft.

The Exchange Team advised admins to scan these locations and processes, as they are commonly targeted in attacks to distribute malware. Keeping the exclusions may prevent detection of IIS webshells and backdoor modules, which are the most common security issues, the team added. Removing these exclusions has been verified to have no impact on performance or stability, according to the team.

This recommendation comes as malicious actors have been using harmful IIS web server extensions and modules to backdoor unpatched Microsoft Exchange servers globally. In addition to removing antivirus exclusions, Microsoft advises keeping Exchange servers updated and deploying anti-malware and security solutions, restricting access to IIS virtual directories, prioritizing alerts, and inspecting configuration files and bin folders regularly.

Moreover, Microsoft has urged customers to keep on-premises Exchange servers up to date by applying the latest Cumulative Update (CU) to prepare for emergency security updates. After deploying updates, it is recommended to run the Exchange Server Health Checker script to identify and address any configuration or other issues.

Despite these warnings, tens of thousands of Internet-exposed Microsoft Exchange servers remain vulnerable to ProxyNotShell exploits, as discovered by security researchers at the Shadowserver Foundation in January. According to Shodan, thousands of Exchange servers are exposed online, with many defenseless against attacks targeting the ProxyShell and ProxyLogon flaws, which were two of the most frequently exploited vulnerabilities in 2021.

Read More

Tags: AlertsAlerts 2023AntivirusExchange serversFebruary 2023MicrosoftSecurity Advisory
0
VIEWS
ADVERTISEMENT

Related Posts

Unpatched IBM file transfer software at Risk

Unpatched IBM file transfer software at Risk

March 31, 2023
Osprey Pump Controller Vulnerabilities

Osprey Pump Controller Vulnerabilities

March 31, 2023
Super FabriXss vulnerability in Azure

Super FabriXss vulnerability in Azure

March 31, 2023
Tool for Cloud Credential Harvesting

Tool for Cloud Credential Harvesting

March 31, 2023

More Articles

Alerts

Fertility Clinic Hacking Incident Affected Nearly 80,000

January 7, 2022

How to become a penetration tester

July 15, 2022
Entertainment

Paul’s Security Weekly

January 3, 2022
Incidents

India’s foreign ministry leaks expat passport details

December 12, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.