如需獲得最佳網頁瀏覽體驗,請使用 IE 11 或更高版本、Chrome、Firefox 或 Safari。

Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting from HAFNIUM Attacks

Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting from HAFNIUM Atta...

True, false or maybe?

  • If you use Exchange Online, then HAFNIUM and the Exchange Server exploit do not affect you.
  • The most likely consequence of the exploit is credential dumping.
  • If you’ve been attacked through the exploit, the best practice is to rebuild Active Directory.

Attacks against multiple vulnerabilities in Exchange Server have left system administrators like you scrambling for answers. That’s why “maybe” is the most prudent choice for those three statements.

Read this technical brief with perspectives on the exploit from four cybersecurity experts, including special insights for users of Change Auditor. Make sure you’re doing everything you can to patch, mitigate and investigate. 

Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting from HAFNIUM Atta...

下载免费技术简报

请稍候……

triangle-down check
进行下载即表示您注册以接收我们发送的营销电子邮件。要选择不再接收,请按照我们隐私政策中描述的步骤进行操作。

reCAPTCHA为此站点提供保护。请查看Google的隐私政策使用条款