Saturday, March 06, 2021
exchange@conference.lightwitch.org
March
Mon Tue Wed Thu Fri Sat Sun
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20 21
22 23 24 25
26
27
28
29
30
31
       
             
Talk about Exchange Administration and Development.

This room is directly linked to Aria Network's Matrix, the room has RSS feeds linked in.

[00:18:13] <Echo Archon> New post in Microsoft Exchange Server: HAFNIUM exploit and WAP + ADFS (https://www.reddit.com/r/exchangeserver/comments/lypj7q/hafnium_exploit_and_wap_adfs/)

[00:59:34] <Echo Archon> New post in Microsoft Exchange Server: Seeking answers on HAFNIUM Exchange Server vulns... (https://www.reddit.com/r/exchangeserver/comments/lyqa01/seeking_answers_on_hafnium_exchange_server_vulns/)

[01:30:11] <Echo Archon> New post in Microsoft Exchange Server: If you were compromised by the latest 0day hack (had webshells dropped, OAB changed, etc), did you have an Administrator email address enabled in your org? What email accounts were referenced in the Autodiscover events discovered by Test-Hanfium.ps1? (https://www.reddit.com/r/exchangeserver/comments/lyqycu/if_you_were_compromised_by_the_latest_0day_hack/)

[01:40:32] <Echo Archon> New post in Microsoft Exchange Server: If you were compromised by the latest 0day hack (had webshells dropped, OAB changed, etc), did you have an Administrator email address enabled in your org? What email accounts were referenced in the Autodiscover events discovered by Test-Hanfium.ps1? (https://www.reddit.com/r/exchangeserver/comments/lyr2lr/if_you_were_compromised_by_the_latest_0day_hack/)

[02:52:33] <Echo Archon> New post in Microsoft Exchange Server: CVE-2021-26855 Detection Script (https://www.reddit.com/r/exchangeserver/comments/lys9gs/cve202126855_detection_script/)

[03:33:18] <Echo Archon> New post in Microsoft Exchange Server: End of 2016 patching marathon. We got her folks (https://www.reddit.com/r/exchangeserver/comments/lyt23w/end_of_2016_patching_marathon_we_got_her_folks/)

[03:33:20] <Echo Archon> New post in Microsoft Exchange Server: Microsoft Exchange Server Vulnerabilities Mitigations – March 2021 (https://www.reddit.com/r/exchangeserver/comments/lyt0eq/microsoft_exchange_server_vulnerabilities/)

[04:34:23] <Echo Archon> New post in Microsoft Exchange Server: KB5000871 - broke POP3? (https://www.reddit.com/r/exchangeserver/comments/lyu1i1/kb5000871_broke_pop3/)

[06:59:00] <Echo Archon> New post in Microsoft Exchange Server: The Exchange Exploit - OAB? What is it supposed to be? (https://www.reddit.com/r/exchangeserver/comments/lyw6fo/the_exchange_exploit_oab_what_is_it_supposed_to_be/)

[08:21:11] <Echo Archon> New post in Microsoft Exchange Server: KB5000871 + Load Balancer issue for OWA (https://www.reddit.com/r/exchangeserver/comments/lyx6cc/kb5000871_load_balancer_issue_for_owa/)

[10:37:12] <Echo Archon> New post in Microsoft Exchange Server: AD error when attempting install of Exchange 2016 (https://www.reddit.com/r/exchangeserver/comments/lyz09u/ad_error_when_attempting_install_of_exchange_2016/)

[10:57:29] <Echo Archon> New post in Microsoft Exchange Server: How to upgrade hybrid exchange 2016 cu17 to cu19 (https://www.reddit.com/r/exchangeserver/comments/lyz89f/how_to_upgrade_hybrid_exchange_2016_cu17_to_cu19/)

[12:52:49] <Echo Archon> New post in Microsoft Exchange Server: Hybrid Exchange (https://www.reddit.com/r/exchangeserver/comments/lz0zeq/hybrid_exchange/)

[13:33:28] <Echo Archon> New post in Microsoft Exchange Server: Exchange Won't Start (https://www.reddit.com/r/exchangeserver/comments/lz1i7j/exchange_wont_start/)

[14:04:51] <Echo Archon> New post in Microsoft Exchange Server: You've been hit by / You've been struck by / An Exchange Exploit - So now what? (https://www.reddit.com/r/exchangeserver/comments/lz2410/youve_been_hit_by_youve_been_struck_by_an/)

[14:25:12] <Echo Archon> New post in Microsoft Exchange Server: My HAFNIUM compromised LAB server (https://www.reddit.com/r/exchangeserver/comments/lz2iey/my_hafnium_compromised_lab_server/)

[16:39:47] <Echo Archon> New post in Microsoft Exchange Server: Good work (https://www.reddit.com/r/exchangeserver/comments/lz59r3/good_work/)

[16:49:54] <Echo Archon> New post in Microsoft Exchange Server: Last server and its hanging at finalizing setup 62% (https://www.reddit.com/r/exchangeserver/comments/lz5eip/last_server_and_its_hanging_at_finalizing_setup_62/)

[19:14:41] <Echo Archon> New post in Microsoft Exchange Server: HAFNIUM: are Exchange 2003 or 2007 vulnerable? (asking for a friend) (https://www.reddit.com/r/exchangeserver/comments/lz8lp6/hafnium_are_exchange_2003_or_2007_vulnerable/)

[19:55:50] <Echo Archon> New post in Microsoft Exchange Server: Find Exchange CU Entitlement (https://www.reddit.com/r/exchangeserver/comments/lz9j0t/find_exchange_cu_entitlement/)

[20:06:01] <Echo Archon> New post in Microsoft Exchange Server: Hafnium and non exposed and deactivated OWA? (https://www.reddit.com/r/exchangeserver/comments/lz9pkp/hafnium_and_non_exposed_and_deactivated_owa/)

[21:07:12] <Echo Archon> New post in Microsoft Exchange Server: Upgrade from 2016 CU13 to CU19 errors out early during File Copy phase (https://www.reddit.com/r/exchangeserver/comments/lzb1e6/upgrade_from_2016_cu13_to_cu19_errors_out_early/)

[21:27:30] <Echo Archon> New post in Microsoft Exchange Server: Microsoft IOC Detection Tool for Exchange Server Vulnerabilities (https://www.reddit.com/r/exchangeserver/comments/lzbef6/microsoft_ioc_detection_tool_for_exchange_server/)

[22:08:14] <Echo Archon> New post in Microsoft Exchange Server: /owa/auth.owa After Recovery Install (https://www.reddit.com/r/exchangeserver/comments/lzcaop/owaauthowa_after_recovery_install/)

[22:59:11] <Echo Archon> New post in Microsoft Exchange Server: Exchange 2016 CU19 - update problem (https://www.reddit.com/r/exchangeserver/comments/lzdclc/exchange_2016_cu19_update_problem/)

[23:29:45] <Echo Archon> New post in Microsoft Exchange Server: How to tell if my managed exchange server has been updated after the hafnium attack (https://www.reddit.com/r/exchangeserver/comments/lzdvm7/how_to_tell_if_my_managed_exchange_server_has/)