This guidance will help customers address threats taking advantage of the recently disclosed Microsoft Exchange Server on-premises vulnerabilities CVE-2021-26855, CVE-2021-26858, CVE-2021-26857, and CVE-2021-27065.
In this video, we provide an overview of these recent vulnerabilities and a walkthrough of all the steps needed to protect yourself against these threats. See Guidance for responders: Investigating and remediating on-premises Exchange Server vulnerabilities for additional details.
You can jump to specific topics by using the links below:
Understand the risks - • Responding to “ProxyLogon” Exchange C...
What is a web shell? - • Responding to “ProxyLogon” Exchange C...
Critical workflows - • Responding to “ProxyLogon” Exchange C...
Mitigations - • Responding to “ProxyLogon” Exchange C...
Investigation - • Responding to “ProxyLogon” Exchange C...
Remediation - • Responding to “ProxyLogon” Exchange C...
Active monitoring - • Responding to “ProxyLogon” Exchange C...
Resources - • Responding to “ProxyLogon” Exchange C...
Additional resources can be found at http://aka.ms/exchangevulns
This video and its contents are subject to the Microsoft Terms of Use. All code and scripts are subject to the applicable terms on Microsoft’s GitHub Repository (e.g., the MIT License).
► Subscribe to Microsoft Security on YouTube here: https://aka.ms/SubscribeMicrosoftSecu...
► Follow us on social:
LinkedIn: / microsoft-security
Twitter: / msftsecurity
► Join our Tech Community: https://aka.ms/SecurityTechCommunity
► For more about Microsoft Security: https://msft.it/6002T9HQY
#MicrosoftSecurity #MIcrosoftExchange
Watch video Responding to “ProxyLogon” Exchange CVE attacks online without registration, duration hours minute second in high quality. This video was added by user Microsoft Security 19 March 2021, don't forget to share it with your friends and acquaintances, it has been viewed on our site 7,828 once and liked it 52 people.