For the best web experience, please use IE11+, Chrome, Firefox, or Safari

HAFNIUM Exchange Server Hack: Why Patching Isn't Enough & Where to Start Hunting

HAFNIUM Exchange Server Hack
On Demand
  • Recorded Date:Mar. 12, 2021
  • Event:On Demand
HAFNIUM Exchange Server Hack
Microsoft wants you to know that patching the four critical security flaws in Microsoft Exchange Server listed in CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065 does not remediate existing compromised systems. Organizations need to patch, and then they need to investigate and, if compromised, stop the attack. Like most other attacks, this exploit is an avenue for an attacker to gain access to the rest of your network, meaning the investigation must widen beyond Exchange.
Join our panel of Microsoft Certified Masters, MVPs, and Quest experts share with you how they are advising clients to spot and stop existing Exchange Server compromises, including:

How and where to spot key indicators of compromise
Practical guidance on next steps to take if you’ve been compromised
Ways to proactively start protecting yourself against future attacks

This panel discussion is for any organization with an on-premises Exchange Server, even if that one server is only there to help manage hybrid Active Directory. The panel will discuss what you can do natively and what Quest customers can do with their Change Auditor and Enterprise Reporter solutions to investigate and stop attacks. 
You'll hear from Exchange Server Microsoft Certified Master and MVP Jeff Guillet, Microsoft Certified Solutions Master and MVP Michael Van Horenbeeck (a.k.a. Mr. Van Hybrid), Microsoft MVP Paul Robichaux, and CISSP and Quest solutions expert Bryan Patton.
View On-Demand today!

Watch Your Free Webcast

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.