A new Exchange vulnerability has been disclosed this week known as ProxyToken that allows someone who can access an Exchange 2013, 2016 or 2019 server over HTTPS to perform configuration actions against mailboxes of their choosing, such as setting forwarding rules. Find out what you need to do to protect your organization.
So, you’ve completed your migration to Exchange Online. Email flows smoothly into and out of the cloud, and all your mailboxes are now online. What’s next for your Exchange Servers, now that you’ve made the transition?
After completion you will have several tasks to perform to remove Exchange Servers from your environment, but there is one important caveat you need to know about; if you run Azure AD Connect then you can’t remove every Exchange Server from your environment. You will need to keep at least one around for management purposes. In this article, I’ll walk through what you can do to minimise what you keep and need to maintain, and what you can consider planning for in the future. You can also join me at TEC this week, on September 2nd.
In the show this week – Microsoft price increases, Ignite is back later this year, we bid IE11 farewell, cover the latest Teams new features and – discuss Exchange vulnerabilities you need to patch and protect yourself against.
It has been a tiring year for Exchange on-premises and hybrid administrators and unfortunately, it’s not getting any easier. The HAFNIUM exploits cast a negative light on Microsoft Exchange, re-emphasizing why email is a crucial part of any organization and that nothing and no one is exempt from an attack. Find out why and what you can do to protect your organization NOW.
In the show this week, Ingo Gegenwarth joins Steve and Paul to talk about how to manage Exchange Online at scale in advance of his TEC talk; and we look at the pricing for Windows 365, test drive Teams 2.0 and check in on Skype in retirement – has it really retired?