This whole hafnium situation struck just as we were moving to Exchange online, missed this transition by a few weeks – lucky us. Anyway, the exploit was active since January, Microsoft patched in March. That leaves almost two months where networks/servers were at risk with no patch.<\/p>\n
At this point, despite patching and various testing tools, no one can be for sure what’s going on with their networks. That being the case, what is the best we can do in the short term when using sensitive passwords in our networks for network administration? Disable all accounts we use to interact with Exchange server right after using? Change all passwords twice after using?<\/p>\n
If we continue to run testing tools on Exchange, that essentially means putting sensitive passwords INTO the Exchange server to check the health of the Exchange server – seems like a giant catch 22.<\/p>","upvoteCount":11,"answerCount":13,"datePublished":"2021-03-22T11:18:26.000Z","author":{"@type":"Person","name":"spiceuser-3x0xa","url":"https://community.spiceworks.com/u/spiceuser-3x0xa"},"suggestedAnswer":[{"@type":"Answer","text":"
This whole hafnium situation struck just as we were moving to Exchange online, missed this transition by a few weeks – lucky us. Anyway, the exploit was active since January, Microsoft patched in March. That leaves almost two months where networks/servers were at risk with no patch.<\/p>\n
At this point, despite patching and various testing tools, no one can be for sure what’s going on with their networks. That being the case, what is the best we can do in the short term when using sensitive passwords in our networks for network administration? Disable all accounts we use to interact with Exchange server right after using? Change all passwords twice after using?<\/p>\n
If we continue to run testing tools on Exchange, that essentially means putting sensitive passwords INTO the Exchange server to check the health of the Exchange server – seems like a giant catch 22.<\/p>","upvoteCount":11,"datePublished":"2021-03-22T11:18:26.000Z","url":"https://community.spiceworks.com/t/hafnium-paranoia-and-passwords/794481/1","author":{"@type":"Person","name":"spiceuser-3x0xa","url":"https://community.spiceworks.com/u/spiceuser-3x0xa"}},{"@type":"Answer","text":"
Yeah, it’s a sticky situation with passwords. Granted if the bad guys are in the network which is the perception organizations should be taking and making sure the critical assets and other sensitive data are protected fully.<\/p>\n
Has there been any considered to use MFA to reduce some of the risk of the current vulnerability?<\/p>\n