Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Sunday, November 2
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Cyber agencies co-sign Exchange Server security guide
    Latest News

    Cyber agencies co-sign Exchange Server security guide

    TeamBy TeamNovember 2, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Cyber agencies co-sign Exchange Server security guide
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Three out of the five Five Eyes states – Australia, Canada and the US – have issued guidance to help end-user organisations  secure their Microsoft Exchange Server instances, stemming in part from an emergency alert that the US Cybersecurity and Infrastructure Security Agency (CISA) issued in August concerning CVE-2025-53786, an elevation of privilege (EoP) flaw affecting all versions of the widely used product.

    The document sets out a number of proactive prevention techniques to address threats and protect sensitive data and communications within on-premise Exchange Servers as part of hybrid environments, and CISA described it as a critical resource for users reliant on Microsoft Exchange.

    Nick Anderson, executive assistant director of the agency’s Cybersecurity Division, said: “With the threat to Exchange servers remaining persistent, enforcing a prevention posture and adhering to these best practices is crucial for safeguarding our critical communication systems. This guidance empowers organisations to proactively mitigate threats, protect enterprise assets and ensure the resilience of their operations.  

    “Furthermore, CISA recommends that organisations evaluate the use of cloud-based email services instead of managing the complexities associated with hosting their own communication services. CISA provides secure baselines for these through our Secure Cloud Business Applications [SCuBA] programme.” 

    The guidebook outlines several steps admins need to take to optimise their Exchange security posture – many of them form basic elements of cyber security best practice, such as restricting access, implementing multifactor authentication (MFA), enforcing strict transport security configurations and mandating zero-trust principles.

    It also emphasises that since Microsoft Exchange Server Subscription Edition (SE) is now the only supported on-premise version of Exchange – previous versions having fallen out of support on 14 October 2025 alongside Windows 10 – those that are running unsupported versions should migrate to SE or an alternative supported email server software or service.

    Should that not be immediately possible, admins could consider isolating old Exchange Server instances in a dedicated network segment and only using them internally; if they must be used externally, admins could look into hiding them from public internet connections behind a separate and supported email security gateway intermediary.

    “Securing Exchange servers is essential for maintaining the integrity and confidentiality of enterprise communications and functions,” wrote the guide’s authors.

    “By adhering to the best practices outlined in this document, organisations can significantly reduce their risk from cyber threats. Continuously evaluating and hardening the cyber security posture of these communication servers is critical to staying ahead of evolving cyber threats and ensuring robust protection of Exchange as part of the operational core of many organisations.”

    ‘Devastating commentary’

    A.J. Grotto, a former White House cyber policy lead during the Obama and first Trump administrations, and now at California’s Stanford University, said the publication was an unusual move that did not necessarily reflect well on Microsoft.

    “Governments do not normally step in to provide detailed guidance on behalf of private companies on how to safely operate their products,” said Grotto. “The fact that a multilateral coalition of security and intelligence agencies felt obligated to produce something like this is a devastating commentary on Microsoft’s security posture.

    “Microsoft gets away with its negligence because they have customers locked into their ecosystem – which gives Microsoft leverage to pass risk and expense along to their customers. It’s not a good look.”

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Why Standards and Credentials Matter in Dual Enrollment

      November 2, 2025

      3 strategies to boost student reading fluency this school year

      November 1, 2025

      European governments opt for open source alternatives to Big Tech encrypted communications

      November 1, 2025

      This Teacher Says Toddlers Can Read. Here’s What Science and My 4-Year-Old Say.

      October 31, 2025

      How districts can avoid 4 hidden costs of outdated facilities systems

      October 31, 2025

      Trump administration’s One Big Beautiful Bill Act promises to fill Meta’s coffers

      October 30, 2025
      Courses and Software Tools

      Welcome to AI: A Human Guide to Artificial Intelligence

      March 20, 2024123 Views

      Extreme Privacy: What It Takes to Disappear

      August 24, 202475 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202433 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202429 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202525 Views
      Reviews

      Basic well logging analysis using Techlog software | Udemy Coupons 2025

      November 2, 2025

      RCQC Senior Security Specialist

      November 2, 2025

      How to Show Professional Appreciation

      November 2, 2025

      No Growth in Finance Career? Try CMA

      November 2, 2025

      Learn MATLAB and SIMULINK in one week | Udemy Coupons 2025

      November 2, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Cyber agencies co-sign Exchange Server security guide

      November 2, 2025

      Why Standards and Credentials Matter in Dual Enrollment

      November 2, 2025

      3 strategies to boost student reading fluency this school year

      November 1, 2025

      European governments opt for open source alternatives to Big Tech encrypted communications

      November 1, 2025

      This Teacher Says Toddlers Can Read. Here’s What Science and My 4-Year-Old Say.

      October 31, 2025
      Latest Videos

      No Growth in Finance Career? Try CMA

      November 2, 2025

      Building a Career in Digital Marketing | Digital Marketing

      November 1, 2025

      Minecraft RTX: What if ~82 BODYGUARD #shorts

      October 31, 2025

      Meesho , Cometchat , Zeotap , DEPT |2021, 2022 , 2023 , 2024 jobs

      October 30, 2025

      Enterprise CISO on Cybersecurity Careers. Brought to you by Evolution Equity.

      October 29, 2025
      Latest Jobs

      RCQC Senior Security Specialist

      November 2, 2025

      Risk Management – Credit Officer – Executive Director

      November 2, 2025

      Client Success Specialist – Bi-Lingual (Spanish)

      November 2, 2025

      Digital Marketing Consultant

      November 2, 2025

      Growth Marketing Hacker

      November 2, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202536 Views

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202436 Views

      ISO 9001:2015 – Quality Management System Internal Auditor | Udemy Coupons 2025

      May 5, 202535 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202527 Views
      Blog

      How to Show Professional Appreciation

      November 2, 2025

      How to Strengthen Business Relationships

      November 1, 2025

      How to Evaluate a Company During Your Office Tour (What to Look For) –

      October 31, 2025

      Template for Volunteer Position Acceptance Letter (With Samples & Tips)

      October 30, 2025

      Recommendation Letter Template for Healthcare Worker

      October 29, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT