[CVE-2021-26855] Suspicious activity found in Http Proxy log

dirkdigs 921 Reputation points
2021-03-12T22:35:07.323+00:00

Hello I have run the Test-Proxy PowerShell script and got back a notice that suspicious activity has been found . i received 3 .CSV files.

What should i be looking at specifically in these files. there are somewhere meaningless

These are the headers in the CSV file

DateTime RequestId ClientIpAddress UrlHost UrlStem RoutingHint UserAgent AnchorMailbox HttpStatus

What am I looking for?

Exchange Server Management
Exchange Server Management
Exchange Server: A family of Microsoft client/server messaging and collaboration software.Management: The act or process of organizing, handling, directing or controlling something.
7,369 questions
Windows Server Security
Windows Server Security
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
1,732 questions
0 comments No comments
{count} votes

3 answers

Sort by: Most helpful
  1. Andy David - MVP 142.3K Reputation points MVP
    2021-03-13T00:00:40.627+00:00

    There should be data in those columns. Is there not?

    Scan your system:
    https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/

    Microsoft Support Emergency Response Tool (MSERT) to scan Microsoft Exchange Server

    https://learn.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download

    0 comments No comments

  2. dirkdigs 921 Reputation points
    2021-03-13T00:09:55.64+00:00

    ya there is i didn't post it just for the sake of privacy.

    Here is the data from the Anchor Mailbox column

    AnchorMailbox
    ServerInfo~a]@NVH-Exchange.xxx.local:444/mapi/emsmdb/?#
    ServerInfo~a]@CAxxx.xxxxxxx.intra:444/mapi/emsmdb/?#
    ServerInfo~EXCHANGE/EWS/Exchange.asmx?a=
    ServerInfo~<no value>.82axxxx4a.d.requestbin.net/ecp/default.flt?
    ServerInfo~buxxxxx.net/ecp/default.flt?
    ServerInfo~buxxxxx.net/ecp/default.flt?
    ServerInfo~buxxxxx.net/ecp/default.flt?
    ServerInfo~buxxxxx.net/ecp/default.flt?
    ServerInfo~buxxxxx.net/ecp/ecp/default.flt?
    ServerInfo~buxxxxx.net/ecp/ecp/default.flt?
    ServerInfo~somethingnonexistent/ecp/default.flt?
    ServerInfo~somethingnonexistent/ecp/default.flt?
    ServerInfo~somethingnonexistent/ecp/default.flt?
    ServerInfo~somethingnonexistent/ecp/default.flt?
    ServerInfo~somethingnonexistent/ecp/default.flt?
    ServerInfo~somethingnonexistent/ecp/default.flt?


  3. KyleXu-MSFT 26,211 Reputation points
    2021-03-15T07:06:55.913+00:00

    @dirkdigs

    For safety reasons, it is recommended that you upgrade your Exchange server to the lasted CU, then install the security patch. After that, open a ticket to Microsoft, they may could help you carry out further investigations remotely.


    If the response is helpful, please click "Accept Answer" and upvote it.
    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.

    0 comments No comments