Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ghost Identities, Poisoned Accounts, & AI Agent Havoc

November 6, 2025

“I Paid Twice” Phishing Campaign Targets Booking.com

November 6, 2025

Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics

November 6, 2025
Facebook X (Twitter) Instagram
Thursday, November 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»CISA and NSA Outline Best Practices to Secure Exchange Servers
News

CISA and NSA Outline Best Practices to Secure Exchange Servers

Team-CWDBy Team-CWDNovember 3, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new cybersecurity blueprint aimed at strengthening Microsoft Exchange Server environments has been released by the US Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and international partners.

The Microsoft Exchange Server Security Best Practices guidance outlines techniques to reduce exposure to cyber-attacks and secure sensitive communications across hybrid and on-premises deployments.

The release builds on CISA’s Emergency Directive 25-02 and outlines measures such as restricting administrator access, using multi-factor authentication (MFA), tightening transport security settings and adopting zero-trust principles. It arrives amid continued concerns over threat actors targeting Exchange servers.

Key Technical Focus Areas

The guidance stresses the importance of limiting unauthorized entry points and strengthening authentication processes, while also enhancing encryption standards.

Additionally, it highlights the importance of support lifecycles, noting that some Exchange versions have reached end-of-life (EOL).

The agencies also strongly recommend minimizing risk by migrating to a supported email software or service, or disconnecting unsupported and EOL systems.

Recommended priorities include:

  • Restricting administrative access to dedicated systems

  • Enabling MFA and modern authentication

  • Applying Microsoft’s Exchange Emergency Mitigation service

  • Enforcing TLS and strict transport security

  • Maintaining software baselines and using built-in security features

Read more on Microsoft Exchange security: Best Practices for Exchange Server Recovery: Minimize Downtime and Data Loss

Collaboration and Ongoing Initiatives

Officials emphasized the importance of steady cooperation across government and allied cybersecurity organizations, despite political friction and a prolonged government shutdown.

“Even amid a prolonged government shutdown riddled with partisan rhetoric, CISA remains dedicated to safeguarding critical infrastructure by providing timely guidance to minimize disruptions and to thwart nation-state threats,” said CISA acting director, Madhu Gottumukkala.

“Under the leadership of President Trump and Secretary Noem, CISA continues to demonstrate the power of operational collaboration.”

Nick Andersen, CISA’s executive assistant director for the Cybersecurity Division (CSD), also commented on the news, calling for continued vigilance amid a persistent threat landscape.

“With the threat to Exchange servers remaining persistent, enforcing a prevention posture and adhering to these best practices is crucial for safeguarding our critical communication systems,” Andersen said.

“This guidance empowers organizations to proactively mitigate threats, protect enterprise assets and ensure the resilience of their operations.”

The agencies also encouraged organizations to evaluate cloud-based email platforms, pointing to secure baselines offered through CISA’s SCuBA program.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhy Executives and Practitioners See Risk Differently
Next Article New GDI Flaws Could Enable Remote Code Execution in Windows
Team-CWD
  • Website

Related Posts

News

Ghost Identities, Poisoned Accounts, & AI Agent Havoc

November 6, 2025
News

“I Paid Twice” Phishing Campaign Targets Booking.com

November 6, 2025
News

Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics

November 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.