Microsoft recently announced four zero-day vulnerabilities in Exchange Server, the on-premises email server software. Those vulnerabilities are currently being exploited by a group called “Hafnium”.Per Microsoft, these vulnerabilities allow “the threat actor… to access on-premise Exchange Servers, which enabled access to email accounts and allowed the installation of additional malware to facilitate long-term access to victim environments.” This is a prime example of persistent threats that MSPs must protect their customers from.Click on “Reports” at the top of the page Click “Create Report” > “One-Time Report” > Name your report Name your table > Select the “Windows” Inspector > Make sure “All Systems” is selected Select “Windows Server: Running Microsoft Exchange” and “Windows Server: Patch List” from the list Click “Continue” at the top right > Select whether you want all environments in one report or separate environments for each report > Click “Finish” Download the report as an Excel, share it with your team via email or a link, or view it in Liongard Option #2: Review Exchange Servers Across All of Your Customers Within LiongardSelect desired customer environment Select Endpoints on left hand navigation pane Select “Metrics” on the far right of the table Check the box for “Windows Server: Running Microsoft Exchange” and “Windows Server: Patch List” and then click “Save” at the bottom You will see these metrics for each Windows Server Want to see this for different customer environments? Scroll all the way to the top of the page and click the dropdown at the top to search for another environment. Option #3: Leverage Reporting Integrations You can also sync these metrics to third party reporting like BrightGauge or Power BI to identify which customers’ Exchange Servers have been patched and which haven’t.
Guest blog courtesy of Liongard. Read more guest blogs from Liongard here.
You can skip this ad in 5 seconds