Skip to content

Commit 10422ab

Browse files
authored
Add instructions on how to run the script offline.
1 parent 2300ef2 commit 10422ab

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

Security/README.md

+2
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,8 @@ To read the output, open the result csv file in excel or in powershell:
9898

9999
`$result = Import-Csv <Path to result file>`
100100

101+
Note: If the server does not have internet connectivity, run the script which would output the exchange versions discovered on the server. The baselines can be downloaded from [published known good hashes of exchange files](https://github.com/microsoft/CSS-Exchange/releases/latest) and re-run the script.
102+
101103
Submitting files for analysis:
102104
* Please submit the output file for analysis in the malware analysis portal [here](https://www.microsoft.com/en-us/wdsi/filesubmission). Please add the text "ExchangeMarchCVE" in "Additional Information" field on the portal submission form.
103105
* Instructions on how to use the portal can be found [here](https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/submission-guide).

0 commit comments

Comments
 (0)