{"id":1008,"date":"2021-06-15T15:43:06","date_gmt":"2021-06-15T20:43:06","guid":{"rendered":"https:\/\/itblog.ldlnet.net\/?p=1008"},"modified":"2021-06-15T15:43:06","modified_gmt":"2021-06-15T20:43:06","slug":"news-about-the-june-2021-cumulative-update-for-exchange-server","status":"publish","type":"post","link":"https:\/\/itblog.ldlnet.net\/index.php\/2021\/06\/15\/news-about-the-june-2021-cumulative-update-for-exchange-server\/","title":{"rendered":"News About the June 2021 Cumulative Update for Exchange Server"},"content":{"rendered":"\n<p class=\"has-vivid-cyan-blue-color has-black-background-color has-text-color has-background\"><strong><em>There are some extra features going along with these updates for this quarter in Exchange Server which is why the Exchange Team is releasing the updates two weeks late. Please continue reading this update from the Exchange Team. I will be sure to have the update available when it comes out in a few weeks.!<\/em><\/strong><\/p>\n\n\n\n<p>We typically release our quarterly Cumulative Updates (CUs) for Exchange Server on the third Tuesday of a month. In June 2021, that would be June 15<sup>th<\/sup>. Today we want to let you know that the June CUs for Exchange Server will be released two weeks later, on June 29<sup>th<\/sup>&nbsp;instead. In addition to bug fixes and incorporating previous Security Updates (SUs) for Exchange Server, we are taking a little bit of extra time to finish adding a new security feature to Exchange Server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"toc-hId--440091120\">Today&#8217;s Security Landscape<\/h2>\n\n\n\n<p>Security is a top priority for Microsoft and our customers, especially as cyberattacks increase in frequency and level of sophistication. The cybersecurity landscape has fundamentally changed, as evidenced by large-scale, complex attacks, and signals that&nbsp;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/05\/27\/nobelium-cyberattack-nativezone-solarwinds\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/human-operated-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">human-operated ransomware<\/a>&nbsp;are on the rise. Microsoft is now&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/12\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/\" target=\"_blank\" rel=\"noreferrer noopener\">actively tracking<\/a>&nbsp;more than 40 nation-state actors and over 140 threat groups across 20 countries\u2014a number that used to be a handful. More than ever, it is&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/why-exchange-server-updates-matter\/ba-p\/2280770\" target=\"_blank\" rel=\"noreferrer noopener\">critical<\/a>&nbsp;to keep your on-premises infrastructure secure and up-to-date, including all your Exchange servers. This is a&nbsp;<em>continuous process<\/em>&nbsp;in which you:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Use the&nbsp;<a href=\"https:\/\/aka.ms\/ExchangeHealthChecker\" target=\"_blank\" rel=\"noreferrer noopener\">Exchange Server Health Checker script<\/a>&nbsp;to inventory your Exchange servers.<\/li><li>Use the&nbsp;<a href=\"https:\/\/aka.ms\/ExchangeUpdateWizard\" target=\"_blank\" rel=\"noreferrer noopener\">Exchange Update Wizard<\/a>&nbsp;to get steps for installing the latest updates on your Exchange server(s).<\/li><\/ol>\n\n\n\n<p>This past March, we released SUs for critical vulnerabilities in Exchange Server, and we actively worked through our customer support teams, third-party hosters, and our partner network to help customers secure their environments and respond to associated threats from the attacks occurring against on-premises Exchange Server. In addition to releasing the one-click&nbsp;<a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/15\/one-click-microsoft-exchange-on-premises-mitigation-tool-march-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">Exchange On-Premises Mitigation Tool<\/a>&nbsp;(EOMT) last March, we also&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/18\/automatic-on-premises-exchange-server-mitigation-now-in-microsoft-defender-antivirus\/\" target=\"_blank\" rel=\"noreferrer noopener\">released<\/a>&nbsp;automatic mitigation for Exchange Server in Microsoft Defender Antivirus and System Center Endpoint Protection. As with EOMT, these were interim mitigations designed to help protect customers who needed extra time to install the available SU.<\/p>\n\n\n\n<p>When the June CU is released on June 29<sup>th<\/sup>, only the&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-march-2021-exchange-server-security-updates\/ba-p\/2175901\" target=\"_blank\" rel=\"noreferrer noopener\">March<\/a>&nbsp;and June CUs will be supported for any future Exchange Server SUs. If you are not yet running the March CU, now is a great time to get current.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"toc-hId-2047421713\">Introducing Exchange Server integration with AMSI<\/h2>\n\n\n\n<p>In response to the fast-changing threat landscape, in the June CUs for Exchange 2016 and Exchange 2019, we are introducing integration between Exchange Server and the Windows&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/amsi\/antimalware-scan-interface-portal\" target=\"_blank\" rel=\"noreferrer noopener\">Antimalware Scan Interface<\/a>&nbsp;(AMSI). AMSI exists in Windows Server 2016 and later, and the new integration is available in Exchange 2016 and Exchange 2019 when running on either of those operating systems. For Exchange 2016, AMSI integration is available only when running on Windows Server 2016. It is not available for Exchange 2016 running on Windows Server 2012 or Windows Server 2012 R2.<\/p>\n\n\n\n<p>AMSI integration in Exchange Server provides the ability for an AMSI-capable antivirus\/antimalware solution to scan content in HTTP requests sent to Exchange Server and block a malicious request before it is handled by Exchange Server. The scan is performed in real-time by any AMSI-capable antivirus\/antimalware solution that runs on the Exchange server as the server begins to process the request. This provides automatic mitigation and protection which compliments the existing&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/Exchange\/antispam-and-antimalware\/antimalware-protection\/antimalware-protection\" target=\"_blank\" rel=\"noreferrer noopener\">antimalware protection in Exchange Server<\/a>&nbsp;to make your Exchange servers more secure than ever.<\/p>\n\n\n\n<p>The AMSI integration in Exchange Server works with any AMSI-capable anti-virus\/antimalware solution. By default,&nbsp;<a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender Antivirus<\/a>&nbsp;(MDAV), an AMSI-capable solution, is automatically enabled and installed on endpoints and devices that are running Windows 10 and Windows Server 2016 and later. If you haven\u2019t installed an antivirus\/antimalware application, Exchange Server AMSI integration will work with MDAV. If you install and enable another antivirus\/antimalware app, MDAV will automatically turn off. And if that other app is AMSI-capable, the Exchange Server integration will work with that app. If you uninstall the other app, MDAV will automatically turn back on, and the Exchange Server integration will work with MDAV.<\/p>\n\n\n\n<p>There are specific benefits when using MDAV on Exchange Server:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>MDAV dynamically fetches signatures that match malicious content. If Microsoft learns about an exploit that can be blocked, a new MDAV signature can be deployed to block the exploit from affecting Exchange.<\/li><li>Leveraging existing technology to add signatures for malicious content;<\/li><li>Leveraging the expertise of Microsoft&#8217;s malware research team for adding signatures;<\/li><li>Applying best practices that Defender already applies for adding other signatures.<\/li><\/ul>\n\n\n\n<p>We are working hard and are excited to deliver this new AMSI integration to you later this month on June 29th. Thank you for your patience!<\/p>\n\n\n\n<p>The Exchange Team<\/p>\n\n\n\n<h4 class=\"has-text-align-center wp-block-heading\">Thanks again Exchange Team and thanks everyone for your patronage to my blog! Keep checking for updates!<\/h4>\n\n\n\n<p class=\"has-small-font-size\"><strong><em>REFERNCES<\/em><\/strong>:<br><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/news-about-the-june-2021-cumulative-update-for-exchange-server\/ba-p\/2437578\">News About the June 2021 Cumulative Update for Exchange Server &#8211; Microsoft Tech Community<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are some extra features going along with these updates for this quarter in Exchange Server which is why the Exchange Team<\/p>\n<p class=\"link-more\"><a class=\"myButt \" href=\"https:\/\/itblog.ldlnet.net\/index.php\/2021\/06\/15\/news-about-the-june-2021-cumulative-update-for-exchange-server\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":939,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,2,266],"tags":[9,149,151,232,147,148],"class_list":["post-1008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exchange","category-general","category-security-and-compliance","tag-exchange","tag-exchange-2016","tag-exchange-2019","tag-exchange-deployment","tag-exchange-setup","tag-exchange-upgrade","odd"],"_links":{"self":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/1008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/comments?post=1008"}],"version-history":[{"count":1,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/1008\/revisions"}],"predecessor-version":[{"id":1009,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/1008\/revisions\/1009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/media\/939"}],"wp:attachment":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/media?parent=1008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/categories?post=1008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/tags?post=1008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}