Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| exchange_emergency_mitigation_service [2026/05/21 09:04] – jp | exchange_emergency_mitigation_service [2026/05/21 11:53] (current) – jp | ||
|---|---|---|---|
| Line 6: | Line 6: | ||
| Get-Service -DisplayName " | Get-Service -DisplayName " | ||
| + | Либо сразу вот так, если нам лень искать название службы на другом языке: | ||
| + | |||
| + | Get-Service -name MSExchangeMitigation | ||
| Теперь посмотрим - включена ли настройка использования данной службы, | Теперь посмотрим - включена ли настройка использования данной службы, | ||
| Line 17: | Line 20: | ||
| Name | Name | ||
| ---- | ---- | ||
| - | EXCHANGE02 | + | EXCHANGE1 |
| - | EXCHANGE01 | + | EXCHANGE2 |
| - | EXCHANGE03 | + | EXCHANGE3 |
| - | EXCHANGE04 | + | EXCHANGE4 |
| </ | </ | ||
| + | |||
| + | Статус защиты с помощью данной службы можно проверить также, используя скрипт //Exchange Health Checker//. | ||
| + | |||
| + | Уязвимость **CVE-2026-42897** - как раз хороший пример случая обработки проблемы с //Exchange Emergency Mitigation Service//. Для проверки - была ли устранена данная уязвимость при работающей службе //Exchange Emergency Mitigation Service//, требуется сделать следующее. | ||
| + | |||
| + | 1. Качаем //Exchange On-premises Mitigation Tool (EOMT)//: | ||
| + | |||
| + | https:// | ||
| + | |||
| + | 2. Выполняем на сервере Exchange | ||
| + | |||
| + | .\EOMT.ps1 -ShowMitigationStatus | ||
| + | 3. Выбираем нужную уязвимость в списке и проверяем статус. Если // | ||
| + | |||
| + | < | ||
| + | Checking mitigation status for CVE-2026-42897 on EXCH1 | ||
| + | EXCHANGE1 : Code Fix Applied: False | Mitigation Applied: True | ||
| + | </ | ||
| + | |||
| + | :!: Данная служба обычно применяет некие экстренные хотфиксы, | ||
| + | |||
| + | < | ||
| + | Known issues when mitigation is applied | ||
| + | We are aware of following known issues once CVE-2026-42897 mitigation is applied (using either option above): | ||
| + | |||
| + | OWA Print Calendar functionality might not work. As a workaround copy the data or screenshot the calendar you want to print or use Outlook Desktop client. | ||
| + | Inline images might not display correctly in the recipients OWA reading pane. As a workaround, send images as email attachments or use Outlook Desktop client. | ||
| + | |||
| + | OWA light (OWA URL ending in /? | ||
| + | OWACalendar.Proxy healthset might start showing unhealthy once the mitigation is in effect. This can cause alerts if you use various monitoring solutions for your Exchange Server. If you see this problem, we recommend ignoring those alerts within your monitoring platform until the fix is out and mitigation is removed. | ||
| + | |||
| + | Published calendars might not work with error 500. | ||
| + | We are aware of the mitigation showing the " | ||
| + | </ | ||
| + | |||
| + | https:// | ||
| + | |||
| + | {{tag> | ||