Skip to content

Commit ffb4603

Browse files
authored
Merge pull request #249 from microsoft/bilong-readme
Make download links more prominent
2 parents bebb33d + d786b9a commit ffb4603

File tree

2 files changed

+10
-8
lines changed

2 files changed

+10
-8
lines changed

Security/README.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Security scripts
22

3-
## Test-ProxyLogon.ps1
3+
## [Test-ProxyLogon.ps1](https://github.com/microsoft/CSS-Exchange/releases/latest/download/Test-ProxyLogon.ps1)
44

55
Formerly known as Test-Hafnium, this script automates all four of the commands found in the [Hafnium blog post](https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/). It also has a progress bar and some performance tweaks to make the CVE-2021-26855 test run much faster.
66

@@ -25,7 +25,7 @@ To display the results without saving them, pass -DisplayOnly:
2525

2626
`.\Test-ProxyLogon.ps1 -DisplayOnly`
2727

28-
## ExchangeMitigations.ps1
28+
## [ExchangeMitigations.ps1](https://github.com/microsoft/CSS-Exchange/releases/latest/download/ExchangeMitigations.ps1)
2929
This script contains 4 mitigations to help address the following vulnerabilities:
3030

3131
* CVE-2021-26855
@@ -77,7 +77,7 @@ To rollback multiple or specific mitigations
7777

7878
`.\ExchangeMitigations.ps1 -WebSiteNames "Default Web Site" -RollbackECPAppPoolMitigation -RollbackOABAppPoolMitigation`
7979

80-
## CompareExchangeHashes.ps1
80+
## [CompareExchangeHashes.ps1](https://github.com/microsoft/CSS-Exchange/releases/latest/download/CompareExchangeHashes.ps1)
8181

8282
This script provides a mechanism for malicious file detection on Exchange servers running E13, E16 or E19 versions.
8383
For more information please go to [https://aka.ms/exchangevulns](https://aka.ms/exchangevulns).
@@ -104,7 +104,7 @@ Submitting files for analysis:
104104
* Please submit the output file for analysis in the malware analysis portal [here](https://www.microsoft.com/en-us/wdsi/filesubmission). Please add the text "ExchangeMarchCVE" in "Additional Information" field on the portal submission form.
105105
* Instructions on how to use the portal can be found [here](https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/submission-guide).
106106

107-
## BackendCookieMitigation.ps1
107+
## [BackendCookieMitigation.ps1](https://github.com/microsoft/CSS-Exchange/releases/latest/download/BackendCookieMitigation.ps1)
108108

109109
This mitigation will filter https requests that contain malicious X-AnonResource-Backend and malformed X-BEResource cookies which were found to be used in CVE-2021-26855.
110110

@@ -142,7 +142,7 @@ To rollback - Note: This does not remove the IIS Rewrite module, only the rules.
142142

143143
`PS C:\> BackendCookieMitigation.ps1 -WebSiteNames "Default Web Site" -RollbackMitigation -Verbose`
144144

145-
## http-vuln-cve2021-26855.nse
145+
## [http-vuln-cve2021-26855.nse](https://github.com/microsoft/CSS-Exchange/releases/latest/download/http-vuln-cve2021-26855.nse)
146146

147147
This file is for use with nmap. It detects whether the specified URL is vulnerable to the Exchange Server SSRF Vulnerability (CVE-2021-26855).
148148
For usage information, please read the top of the file.

Setup/README.md

+5-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
# SetupAssist.ps1
1+
# [SetupAssist.ps1](https://github.com/microsoft/CSS-Exchange/releases/latest/download/SetupAssist.ps1)
2+
3+
Download the latest release here: [https://github.com/microsoft/CSS-Exchange/releases/latest/download/SetupAssist.ps1](https://github.com/microsoft/CSS-Exchange/releases/latest/download/SetupAssist.ps1)
24

35
This script is meant to be run on the system where you are running setup from. It currently checks and displays the following when just running it:
46

@@ -20,9 +22,9 @@ Parameter | Description
2022
----------|------------
2123
[string]OtherWellKnownObjectsContainer | Pass the Distinguished Name of Microsoft Exchange container to look at the OtherWellKnownObjects attributes
2224

23-
Download the latest release [here](https://github.com/microsoft/CSS-Exchange/releases/latest/download/SetupAssist.ps1)
25+
# [SetupLogReviewer.ps1](https://github.com/microsoft/CSS-Exchange/releases/latest/download/SetupLogReviewer.ps1)
2426

25-
# SetupLogReviewer.ps1
27+
Download the latest release here: [https://github.com/microsoft/CSS-Exchange/releases/latest/download/SetupLogReviewer.ps1](https://github.com/microsoft/CSS-Exchange/releases/latest/download/SetupLogReviewer.ps1)
2628

2729
This script is meant to be run against the Exchange Setup Logs located at `C:\ExchangeSetupLogs\ExchangeSetup.log`. You can run this on the server, or on a personal computer.
2830

0 commit comments

Comments
 (0)