Securing Your Exchange Server Against CVE-2026-42897: A Step-by-Step Mitigation Guide
Guide to applying Microsoft's mitigations for CVE-2026-42897 Exchange Server zero-day: confirm version, enable Extended Protection, URL Rewrite rules, restrict access, monitor logs, and tips.
Introduction
Microsoft has issued an urgent warning about a critical zero-day vulnerability, tracked as CVE-2026-42897, actively being exploited in the wild against certain versions of Exchange Server. Until a permanent security update is released, Microsoft has provided temporary mitigations to help protect your environment. This guide walks you through the necessary steps to apply these mitigations, ensuring your Exchange infrastructure remains as secure as possible during this window of exposure.

What You Need
Before starting, gather the following prerequisites:
- Administrative access to your Exchange Server (local admin and Exchange Organization Management role).
- Latest Exchange Server Cumulative Update installed (to reduce attack surface).
- Backup of your Exchange configuration and databases (in case rollback is needed).
- Knowledge of your Exchange version – CVE-2026-42897 affects Exchange Server 2016, 2019, and earlier versions (check Microsoft’s advisory for exact builds).
- PowerShell access for some mitigation steps.
- URL Rewrite Module for IIS (if not already installed).
- Time – plan for 2–4 hours to complete all steps.
Step-by-Step Mitigation Process
Step 1: Confirm Your Exchange Version is Affected
- Open Exchange Management Shell as administrator.
- Run
Get-ExchangeServer | Format-List Name,AdminDisplayVersion. - Compare the build number with the list provided in Microsoft’s advisory. If your build is below the fixed version (yet unreleased), proceed with mitigations.
Step 2: Enable Extended Protection for Authentication
CVE-2026-42897 is reportedly related to authentication bypass; enabling Extended Protection helps mitigate this attack vector.
- Open Exchange Management Shell.
- Run the following commands to enable Extended Protection on all Exchange virtual directories:
Set-WebConfigurationProperty -Filter system.web/authentication -Name extendedProtection -Value 'Allow' -PSPath IIS:\ -Location 'Exchange Back End'
Note: Test on a non-production server first. - Restart IIS:
iisreset /noforce.
Step 3: Apply URL Rewrite Rules to Block Suspicious Requests
Microsoft recommends blocking specific patterns that exploit the vulnerability.
- Open IIS Manager, select your Exchange server, then the Default Web Site.
- Double-click URL Rewrite (install feature if missing via Server Manager).
- Add a new Request Blocking rule:
- Name: Block CVE-2026-42897 Exploit
- Pattern:
.*\..*\..*?autodiscover\.json.*(adjust based on Microsoft’s guidance – verify exact regex from advisory) - Condition: Match URL Path.
- Action: Abort request.
- Apply and recycle app pools:
Restart-WebAppPool -Name MSExchangeAutodiscoverAppPool.
Step 4: Restrict Access to Autodiscover and Other Endpoints
If possible, limit network access to Exchange endpoints that are being exploited.

- From a management workstation, update firewall rules to allow only trusted IP ranges to ports 443 and 80 on your Exchange server.
- Consider disabling older protocols (e.g., Outlook Anywhere) if not required – but test impact carefully.
- Use IIS IP Address and Domain Restrictions to whitelist only trusted internal networks for Autodiscover and EWS.
Step 5: Enable Strict Verification of TLS Certificates
Ensure all clients and servers validate certificates; this prevents some MITM-based variants.
- On Exchange Server, open Registry Editor (as admin).
- Navigate to
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL. - Set
EnableCertificateAuthorityto1andDisableRemoteCertificateNameValidationto0. - Reboot the server or restart the Microsoft Exchange Active Directory Topology service.
Step 6: Monitor for Signs of Exploitation
Even after mitigations, stay vigilant.
- Enable audit logging in Exchange:
Set-AdminAuditLogConfig -AdminAuditLogEnabled $true. - Review IIS logs daily for suspicious patterns (e.g., repeated 401 errors, abnormal POST requests to
/autodiscover). - Use Microsoft Sentinel or your SIEM to correlate logs with CVE-2026-42897 indicators.
Tips and Best Practices
- Test before deploying any mitigation in a staging environment to avoid breaking client connectivity.
- Keep an eye on Microsoft’s Security Response Center for the permanent patch – apply it as soon as it’s available.
- Use the Exchange Health Checker script (from Microsoft) to verify mitigation status.
- Consider additional protections such as Multi-Factor Authentication for all Exchange users and Conditional Access policies in Azure AD.
- Document every change you make for rollback ease. Create a restore point if using virtual machines.
- Remember: mitigations are temporary – do not treat them as permanent fixes.