Webサイトを快適にご利用いただくためには、IE11以降、Chrome、Firefox、またはSafariをご使用ください。

HAFNIUM Exchange Server Hack: Why Patching Isn't Enough & Where to Start Hunting

HAFNIUM Exchange Server Hack
録画版
  • 録画日:Mar. 12, 2021
  • イベント:録画版
HAFNIUM Exchange Server Hack
Microsoft wants you to know that patching the four critical security flaws in Microsoft Exchange Server listed in CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065 does not remediate existing compromised systems. Organizations need to patch, and then they need to investigate and, if compromised, stop the attack. Like most other attacks, this exploit is an avenue for an attacker to gain access to the rest of your network, meaning the investigation must widen beyond Exchange.
 
Join our panel of Microsoft Certified Masters, MVPs, and Quest experts share with you how they are advising clients to spot and stop existing Exchange Server compromises, including:

How and where to spot key indicators of compromise
Practical guidance on next steps to take if you’ve been compromised
Ways to proactively start protecting yourself against future attacks

This panel discussion is for any organization with an on-premises Exchange Server, even if that one server is only there to help manage hybrid Active Directory. The panel will discuss what you can do natively and what Quest customers can do with their Change Auditor and Enterprise Reporter solutions to investigate and stop attacks. 
 
You'll hear from Exchange Server Microsoft Certified Master and MVP Jeff Guillet, Microsoft Certified Solutions Master and MVP Michael Van Horenbeeck (a.k.a. Mr. Van Hybrid), Microsoft MVP Paul Robichaux, and CISSP and Quest solutions expert Bryan Patton.
 
View On-Demand today!

無料のWebキャストを見る

お待ちください...

triangle-down check
ダウンロードすると、マーケティング関連のEメールが届くようになります。オプトアウトするには、プライバシーポリシーに記載された手順に従ってください。

このサイトはreCAPTCHAで保護されています。詳細はGoogleのプライバシーポリシー利用規約をご参照ください。