New Microsoft Exchange service mitigates high-risk bugs automatically

Microsoft has added a new Exchange Server feature that automatically applies interim mitigations for high-risk security flaws to secure on-premises servers against incoming attacks and give admins more time to apply security updates.

The new Exchange Server component, aptly named Microsoft Exchange Emergency Mitigation service, builds upon Microsoft’s Exchange On-premises Mitigation Tool released in March to help customers minimize the attack surface exposed by the ProxyLogon bugs.

EM runs as a Windows service on Exchange Mailbox servers and it will be automatically installed on servers with the Mailbox role after deploying the September 2021 CU on Exchange Server 2016 or Exchange Server 2019.

Exchange service mitigation: disables a vulnerable service on an Exchange server.

“This new service is not a replacement for installing Exchange Server Security Updates, but it is the fastest and easiest way to mitigate the highest risks to Internet-connected, on-premises Exchange servers prior to installing applicable SUs,” the Exchange Team explained.

Admins can disable the EM service if they don’t want Microsoft to apply mitigations to their Exchange servers automatically.

Share this article on social media:

Subscribe to Our Newsletter!
Stay on top of cybersecurity risks, evolving threats and industry news.
This field is for validation purposes and should be left unchanged.

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:

Tell us About your Needs
Get an Answer the Same Business Day

Got an urgent request? Call us at 1-877-805-7475 or Book a meeting.

What happens next:

A Vumetric expert will contact you to learn more about your cybersecurity needs and goals.

The project's scope will be defined (Target environment, deadlines, requirements, etc.)

A detailed quote including all-inclusive pricing and statement of work is sent to you.

This field is for validation purposes and should be left unchanged.


Everything You Need to Know

Gain confidence in your future cybersecurity assessments by learning to effectively plan, scope and execute projects.


Enter your Email Address

This field is for validation purposes and should be left unchanged.

* No free email provider (e.g:,, etc.)

This site is registered on as a development site. Switch to a production site key to remove this banner.