Exchange Emergency Mitigation Service for patched systems only

Exchange Logo[German]Since September 2021, Microsoft has provided the Exchange Emergency Mitigation Service (EEMS) for Exchange Server to improve Exchange protection. However, this service only works on systems that are up to date. Microsoft explicitly pointed this out at the end of last week.


Advertising

Review:: Exchange Emergency Mitigation Service (EEMS)

The Exchange Emergency Mitigation (EM) service is used to protect Exchange servers against potential threats by applying remedial measures. If a serious security problem is detected in the Exchange software, this service can initiate the necessary steps to automatically mitigate or eliminate the vulnerabilities on the Microsoft Exchange servers. Microsoft mentions three types of configuration changes as a remedy for eliminating vulnerabilities (mitigation):

  • IIS URL rewrite rule mitigation: this is a rule that blocks certain patterns of malicious HTTP requests that can compromise an Exchange server.
  • Exchange service mitigation: This disables a vulnerable service on an Exchange server.
  • App Pool Mitigation: Disables a vulnerable app pool on an Exchange server.

As soon as Microsoft detects a new attack, these temporary mitigations are distributed via EM to all Exchange servers worldwide and work begins on a software patch. The service uses the cloud-based Office Config Service (OCS) to search for and download available mitigations and send diagnostic data to Microsoft.

The EM service runs as a Windows service on an Exchange mail server as soon as the September 2021 (or later) CU is installed on Exchange Server 2016 or Exchange Server 2019. The EM service is automatically installed on Exchange servers with the Mailbox role. The EM service is not installed on Edge Transport servers. However, the use of the EM service is optional and this function can be deactivated.

I reported on the new feature in the article Exchange Server September 2021 CU comes Sept. 28 with Microsoft Exchange Emergency Mitigation Service. Details can be found in a Techcommunity article and this Microsoft support article.

EEMS will only work on patched systems in future

Microsoft has now pointed out a certain problem in the Technet article Exchange Emergency Mitigation Service might not work for servers significantly out of date on January 24, 2025.


Advertising

Exchange EEMS

Many Exchange installations are not fully patched. This simply leads to increasing problems for developers. Microsoft is therefore pulling a kind of emergency brake and announcing changes for the future. Microsoft is therefore providing information about future changes.

Certificate types expired

One of the older certificate types in the Office Configuration Service (OCS) has expired. A new certificate has already been provided in OCS. Any Exchange Server that is updated to an Exchange Server Cumulative Update (CU) or Security Update (SU) newer than March 2023 will have the updated certificate. This Exchange Server can continue to check for new EEMS mitigations.

Consequences of a missing certificate

According to Microsoft, EEMS running Exchange versions older than March 2023 will not be able to contact the Office Configuration Service (OCS) to check for and download new mitigation definitions. An event like the following may be logged in the server's application log:

Error, MSExchange Mitigation Service 
Event ID: 1008
An unexpected exception occurred. 
Diagnostic information: Exception encountered while fetching mitigations.

In addition, the following will be included in the EEMS protocol:

FetchMitigation,S:LogLevel=Warning;S:Message=Connection attempted against untrusted endpoint

In addition, the execution of the script $exscripts\Get-Mitigations.ps1 fails with the following message:

WARNING: Connection with Mitigation Endpoint was not successful. To enable connectivity please refer: https://aka.ms/HelpConnectivityEEMS

Microsoft therefore asks administrators to update their servers as soon as possible if they are no longer up to date. The Exchange server must then be reactivated in order to check the EEMS rules.


Advertising

This entry was posted in Security, Software and tagged , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: Please note the rules for commenting on the blog (first comments and linked posts end up in moderation, I release them every few hours, I rigorously delete SEO posts/SPAM).