Webサイトを快適にご利用いただくためには、IE11以降、Chrome、Firefox、またはSafariをご使用ください。

Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting from HAFNIUM Attacks

Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting from HAFNIUM Atta...

True, false or maybe?

  • If you use Exchange Online, then HAFNIUM and the Exchange Server exploit do not affect you.
  • The most likely consequence of the exploit is credential dumping.
  • If you’ve been attacked through the exploit, the best practice is to rebuild Active Directory.

Attacks against multiple vulnerabilities in Exchange Server have left system administrators like you scrambling for answers. That’s why “maybe” is the most prudent choice for those three statements.

Read this technical brief with perspectives on the exploit from four cybersecurity experts, including special insights for users of Change Auditor. Make sure you’re doing everything you can to patch, mitigate and investigate. 

Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting from HAFNIUM Atta...

無料の技術概要のダウンロード

お待ちください...

triangle-down check
ダウンロードすると、マーケティング関連のEメールが届くようになります。オプトアウトするには、プライバシーポリシーに記載された手順に従ってください。

このサイトはreCAPTCHAで保護されています。詳細はGoogleのプライバシーポリシー利用規約をご参照ください。