Microsoft Exchange: The NSA, the CISA, and the Race Against End-of-Life

Hey You,

If you’re still running an on-prem Exchange Server in 2025, first of all… congratulations. You’re officially on a government watchlist.

I am watching you

Okay, maybe not literally, but according to a new joint report by the NSA, CISA, ASD and the Canadian Cyber Centre, your Exchange server is under imminent threat. And they’re not joking.

The 24-page paper called “Microsoft Exchange Server Security Best Practices” just dropped and it’s basically a wake-up call for anyone who thought “We’ll patch it next week” was still a valid IT strategy.

Let’s go over wat actually matters.

1. Keep it updated (like… yesterday)

Exchange’s update cadence is 2 cumulative updates per year and monthly security patches. If you’re skipping eve one… JUST ONE… you’re leaving the door wide open for every HAFNIUM, ALPH and their cousins.

Use:

They’re free. They work and they’ll save you from a weekend incident response call.

2. Migrate or Die (figuratively)

As of October 14th, 2025, Exchange 2016 and 2019 are officially End-Of-Life. Microsoft’s message is clear: move to Exchange Server SE or Microsoft 365.

Still need time? Fine… just isolate that box from the internet, lock it down and let it quietly retire in a network corner.

No internet… no exposure… simple math.

3. Keep the EM service alive

Microsoft’s Exchange Emergeny Mitigation (EM) service applies temporary fixed automatically through the Office Config Service. Think of it as Exchange’s “defibrillator”… not a cure… but it can keep you alive until the doctor (patch) arrives.

4. Apply baselines

CIS Benchmarks®, DISA STIGs, Microsoft Security Baselines… pick one.

Baseline = Known good

No baseline = guesswork

Guesswork + exchange = breach.

5. Built-in protection exists (use it)

You already have:

So, turn them on. 

Bonus: block webshell creation with ASR. If that doesn’t sound cool… you’ve never been hacked.

6. Kill NTLM before it kills you.

NTLM is finally on life support. Start auditing and migrating to Kerberos now.

The new Exchange Server SE (CU1) will replace NTLMv2 with Kerberos by default… so this is not optional.

7. Modern Auth or Bust

Basic Authentication is dead. Use Modern AUTH + MFA (OAuth 2.0 via ADFS or Entra ID). 

It’s more secure… and honestly… if you’re still typing passwords in plain text in 2025… you DESERVE every phishing mail you get.

8. Encrypt EVERYTHING

  • TLS everywhere (inside and out)
  • Enable HSTS
  • Use Extended Protection (EP) to stop token relay attacks
  • And yes… restart the damn server after changing TLS configs. I know you won’t but now you can’t say you didn’t know.

9. Role separation & Split permissions

Stop using Domain Admin accounts to manage Exchange. I will repeat… STOP USING THE DAMN DOMAIN ADMIN ACCOUNTS…

RBAC exists for a reason… use it. If exchange gets compromised, it shouldn’t take down your ENTIRE AD FOREST with it.

10. Zero Trust… or… Zero Chance

Every line of the NSA reports screams ZERO TRUST:

  • Assume breach.
  • Verify explicity.
  • Minimize blast radius

Translation: Stop trusting everything inside your LAN.

TL;DR… your next steps

  • Patch everything
  • Plan your migration to Exchange SE of M365
  • Enable EM Service
  • Turn on built-in protections
  • Get rid of NTLM
  • Use Modern AUTH + MFA
  • Lock down admin access
  • Embrace zero trust

Because honestly, if the NSA, CISA, ASD and Canada are all writing one document… together… you might want to take the hint.

Thanks for reading.

Cheers,

Engin