Released: October 2021 Exchange Server Security Updates

Published Oct 12 2021 10:00 AM 25.4K Views

Microsoft has released security updates for vulnerabilities found in:

  • Exchange Server 2013
  • Exchange Server 2016
  • Exchange Server 2019

These updates are available for the following specific builds of Exchange Server:

IMPORTANT: If manually installing security updates, you must install .msp from elevated command prompt (do not choose Run after download).

  • Exchange Server 2013 CU23 (Exchange 2013 customers might also need to /prepareschema. Please see this post.)
  • Exchange Server 2016 CU21 and CU22
  • Exchange Server 2019 CU10 and CU11

The October 2021 security updates for Exchange Server address vulnerabilities responsibly reported by security partners and found through Microsoft’s internal processes. Although we are not aware of any active exploits in the wild, our recommendation is to install these updates immediately to protect your environment.

These vulnerabilities affect on-premises Microsoft Exchange Server, including servers used by customers in Exchange Hybrid mode. Exchange Online customers are already protected and do not need to take any action.

More details about specific CVEs can be found in Security Update Guide (filter on Exchange Server under Product Family).

Update installation

Two update paths are available:

October2021SUpath2.jpg

Inventory your Exchange Servers / determine which updates are needed

Use the Exchange Server Health Checker script (use the latest release) to inventory your servers. Running this script will tell you if any of your Exchange Servers are behind on updates (CUs and SUs).

Update to the latest Cumulative Update

Go to https://aka.ms/ExchangeUpdateWizard and choose your currently running CU and your target CU to get directions for your environment.

If you encounter errors during or after installation of Exchange Server updates

If you encounter errors during installation, see the SetupAssist script. If something does not work properly after updates, see Repair failed installations of Exchange Cumulative and Security updates.

FAQs

My organization is in Hybrid mode with Exchange Online. Do I need to do anything?
While Exchange Online customers are already protected, the October 2021 security updates do need to be applied to your on-premises Exchange Servers, even if they are used only for management purposes. You do not need to re-run the Hybrid Configuration Wizard (HCW) after applying updates.

Do I need to install the updates on ‘Exchange Management Tools only’ workstations?
Servers or workstations running only Microsoft Exchange Management Tools (no Exchange services) do not need to apply these updates.

NOTE: This post might receive future updates; they will be listed here (if available).

The Exchange Server Team

22 Comments
Occasional Visitor

Impossible to install

file are used by microsoft filtering management service (but service is disabled)

 

either throug win update nor manually (admin prompt)

Thanks

Frequent Visitor

Please share some your details? What was OS platform and Exchange? So far we cannot replicate that behaviour. 

 

Frequent Visitor

After install the update on Exchange 2013, i have a problem with access to OWA/ECP, like this 

https://support.microsoft.com/it-it/topic/impossibile-accedere-a-owa-o-ecp-dopo-l-installazione-di-e...

 

have a solution?

Occasional Visitor

In case of Exchange 2013 with October 2021 security updates installed without running the /PrepareSchema using July 2021 CUs first. Is it supported to update the schema after installing the October security update by using the command "Setup.exe /PrepareSchema /IAcceptExchangeServerLicenseTerms". Or is it needed to uninstall the October updates first?

Regular Visitor

@andreasoc2350 

I think you have that issue if you don't run the update from an elevated/admin command prompt?

Frequent Visitor

@DanielEarl  the installation was successful, but after that, I came up with the problem I indicated.

Regular Visitor

@andreasoc2350 Yes, the update will appear to install properly (it will complete) but you will see those OWA/ECP errors and it's because the update hasn't been run with sufficient privs. If you run the update again, but from an elevated cmd/ps session, I think it's likely to run properly and you won't get the errors.

 

See the section in the article above:

 

"IMPORTANT: If manually installing security updates, you must install .msp from elevated command prompt (do not choose Run after download)."

 

If you already did that, then sorry I am not sure.

Occasional Visitor

For resolve problem with ecp and owa, is necessari to rebind certificare in back end site in iis. After that do a iisreset and all it's ok

Frequent Visitor

@DanielEarl  i installed with privilege correct! 

Occasional Visitor

I am just experiencing issues with the SU and Exchange Server 2013 CU23 on Windows Server 2012 R2.

The Exchange Services are taking forever to start up. Installation was done with an elevated Shell.

Startup typ is "Automatic" but the services are taking much longer to start up.

 

Are you guys also experiencing those issues?

Contributor

After updating the system on my end I am also seeing a problem with OWA

Windows 2012R2/ Exchange 2016 CU21 to CU22 with Security patch mentioned.

Issue:

When trying to login to OWA user keeps getting redirected to the login page.

Outlook and phones are working properly.

Solution:

https://support.microsoft.com/en-us/topic/you-can-t-access-owa-or-ecp-after-you-install-exchange-ser...

 

You might have to wait for 3 hours for OWA to start working again. 

New Contributor

I have seen dot net updates create problems very often. Better to have a pool of front ends.  These updates often breaks .. These updates also change to defaults .. Any custom configurations that you might have done will be over written . Better to keep a copy of your customized configuration 

Frequent Visitor

I experience one problem with ECP some hours after update. Screenshot shows what I see after entering ECP. OWA works properly, all the certs are ok. Presented advices here are useless for me now. Honestly I don't know what to do.

 

UPD: solved. SU is not the reason of this problem.

ecp_1.png

New Contributor

@azotov Seeing the the same issue with /ecp

 

@The_Exchange_Team  Microsoft ?

Frequent Visitor

@Sam_T My solution was to remove "HTTP Header" from IIS - "x-content-type-options". Then reload /ECP page with Ctrl+F5.

I found the solution here: Exchange 2016 - CU8 ECP - Only showing text (microsoft.com)

Frequent Visitor

SOLVED:

I solved by following these two articles, the most accurate is that of spiceworks, that of microsoft was not precise on a step, that is, when you create the new certificate, you have to give U, so as not to assign the certificate already, but you have to do it later.
After applying the change, I waited a few hours for it to work, even if you reboot it doesn't change .. it needs a few hours, and now everything is working.

 

https://community.spiceworks.com/topic/2299094-exchange-2013-on-prem-microsoft-exchange-server-auth-...

https://docs.microsoft.com/en-us/exchange/troubleshoot/administration/exchange-oauth-authentication-... 

 

thanks to all

Occasional Visitor

Hi Exchange Team,

is /PrepareSchema required with this patch, if it was already done during July 2021 security patch install on 2013 CU23?

Thanks!

Frequent Visitor

@dmdovnar is no required /PrepareSchema if already installed cu23.. i'm in the same situation .. 

Frequent Visitor
dmdovnar 

 no, schema after July patching is the nevest one, no new schema extention is required. 

Occasional Visitor

Dear The Exchange Team,

I had a problem installing KB5007012 for CU21 for Exchange server 2016. After initial troubleshooting I decided to install CU22 for Exchange Server 2016 rather than repeating to install the update concerned - hoped to overcome the problem in this manner. Checking for new updates on the server brings no new updates. Unfortunately keeps WSUS remind me to install KB5007012 (now for CU22 for Exchange server 2016). The link published in the WSUS brings me to your Tech Community site.

Any idea?

Occasional Visitor

i have installed Security Update on Exchange Server 2019 CU11 using cmd prompt. unfortunately it is not showing up on my Exchange server Build. but upon checking the control panel > installed updates, the KB5007012 is already installed. will it reflect on the build number of the Exchange server?

Frequent Visitor

I've installed on my Exchange 2013 CU23 this latest security update. our schema master is in an empty root domain. as per the instructions, i created a Windows 2012 R2 server in our root domain, installed just the Exchange 2013 CU23 Management tools on it, installed this latest security update aswell, but when i run from elevated command prompt to update Schema: Setup.exe /PrepareSchema /IAcceptExchangeServerLicenseTerms , i receive the below error:

 

C:\Program Files\Microsoft\Exchange Server\V15\Bin>Setup.exe /PrepareSchema /IAcceptExchangeServerLicenseTerms

 

Microsoft Exchange Server 2013 Cumulative Update 23 Unattended Setup


The Exchange Server setup operation didn't complete. More details can be found
in ExchangeSetup.log located in the <SystemDrive>:\ExchangeSetupLogs folder.

 

in the Exchange setup logs, i see this:

Operating system version: Microsoft Windows NT 6.2.9200.0.
[0] Setup version: 15.0.1497.24.
Logged on user: (removed user).
Command Line Parameter Name='prepareschema', Value=''.
Command Line Parameter Name='iacceptexchangeserverlicenseterms', Value=''.
Command Line Parameter Name='sourcedir', Value='C:\Program Files\Microsoft\Exchange Server\V15\Bin'.
RuntimeAssembly was started with the following command: '/PrepareSchema /IAcceptExchangeServerLicenseTerms /sourcedir:C:\Program Files\Microsoft\Exchange Server\V15\Bin'.
[0] The registry key, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\v8.0, wasn't found.
[0] The registry key, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ExchangeServer\v14, wasn't found.
[0] Assembly dll file location is C:\Program Files\Microsoft\Exchange Server\V15\bin\Microsoft.Exchange.Setup.Console.dll
[0] [ERROR] Exception has been thrown by the target of an invocation.
[0] [ERROR] Could not load file or assembly 'Microsoft.Exchange.CabUtility.dll' or one of its dependencies. The specified module could not be found.
[0] CurrentResult SetupLauncherHelper.loadassembly:444: 1
[0] The Exchange Server setup operation didn't complete. More details can be found in ExchangeSetup.log located in the <SystemDrive>:\ExchangeSetupLogs folder.
[0] CurrentResult main.run:235: 1
[0] CurrentResult setupbase.maincore:396: 1
[0] End of Setup

 

I installed the management tools on this server using elevated command prompt and running this: Setup.exe /Role:ManagementTools /InstallWindowsComponents /IAcceptExchangeServerLicenseTerms pointing to the setup files for Exchange2013 CU23. rebooted server after aswell

 

Let me know how this can be resolved and i can update the Schema

 

Thank you

 

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2838287%22%20slang%3D%22en-US%22%3EReleased%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2838287%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20has%20released%20security%20updates%20for%20vulnerabilities%20found%20in%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EExchange%20Server%202013%3C%2FLI%3E%0A%3CLI%3EExchange%20Server%202016%3C%2FLI%3E%0A%3CLI%3EExchange%20Server%202019%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EThese%20updates%20are%20available%20for%20the%20following%20specific%20builds%20of%20Exchange%20Server%3A%3C%2FP%3E%0A%3CP%20style%3D%22background%3A%20%23F0F0F0%3B%20padding%3A%20.5em%3B%20margin%3A%201em%200%201em%200%3B%22%3E%3CFONT%20color%3D%22%23FF0000%22%3E%3CSTRONG%3EIMPORTANT%3A%3C%2FSTRONG%3E%3C%2FFONT%3E%26nbsp%3BIf%20manually%20installing%20security%20updates%2C%20you%26nbsp%3B%3CEM%3Emust%3C%2FEM%3E%26nbsp%3Binstall%20.msp%20from%20elevated%20command%20prompt%20(do%20%3CEM%3Enot%3C%2FEM%3E%20choose%20Run%20after%20download).%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EExchange%20Server%202013%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3FfamilyID%3Df4fbd725-70c7-485b-acac-aaf90ad372f8%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECU23%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3EExchange%20Server%202016%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3FfamilyID%3Dffea3a31-7286-4932-867a-a38952c1efee%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECU21%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3FfamilyID%3D2a8da394-c405-4cc7-aa58-e96aa19acd4f%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECU22%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3EExchange%20Server%202019%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3FfamilyID%3D5409b101-36fc-4e5c-82bc-d0f6068b2405%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECU10%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3FfamilyID%3D493ebadc-791f-43fc-b6da-349e9b227ef9%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECU11%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EThe%20October%202021%20security%20updates%20for%20Exchange%20Server%20address%20vulnerabilities%20responsibly%20reported%20by%20security%20partners%20and%20found%20through%20Microsoft%E2%80%99s%20internal%20processes.%20Although%20we%20are%20not%20aware%20of%20any%20active%20exploits%20in%20the%20wild%2C%20our%20recommendation%20is%20to%20install%20these%20updates%20%3CEM%3Eimmediately%3C%2FEM%3E%20to%20protect%20your%20environment.%3C%2FP%3E%0A%3CP%3EThese%20vulnerabilities%20affect%20on-premises%20Microsoft%20Exchange%20Server%2C%20including%20servers%20used%20by%20customers%20in%20Exchange%20Hybrid%20mode.%20Exchange%20Online%20customers%20are%20already%20protected%20and%20do%20not%20need%20to%20take%20any%20action.%3C%2FP%3E%0A%3CP%3EMore%20details%20about%20specific%20CVEs%20can%20be%20found%20in%20%3CA%20href%3D%22https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESecurity%20Update%20Guide%3C%2FA%3E%20(filter%20on%20Exchange%20Server%20under%20Product%20Family).%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-1471403781%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%20id%3D%22toc-hId-1471409386%22%3EUpdate%20installation%3C%2FH1%3E%0A%3CP%3ETwo%20update%20paths%20are%20available%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22October2021SUpath2.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F316742iE55A54E111098AC7%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22October2021SUpath2.jpg%22%20alt%3D%22October2021SUpath2.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--2133002041%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%20id%3D%22toc-hId--2132996436%22%3EInventory%20your%20Exchange%20Servers%20%2F%20determine%20which%20updates%20are%20needed%3C%2FH2%3E%0A%3CP%3EUse%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FExchangeHealthChecker%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EExchange%20Server%20Health%20Checker%20script%3C%2FA%3E%20(use%20the%20latest%20release)%20to%20inventory%20your%20servers.%20Running%20this%20script%20will%20tell%20you%20if%20any%20of%20your%20Exchange%20Servers%20are%20behind%20on%20updates%20(CUs%20and%20SUs).%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-354510792%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%20id%3D%22toc-hId-354516397%22%3EUpdate%20to%20the%20latest%20Cumulative%20Update%3C%2FH2%3E%0A%3CP%3EGo%20to%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FExchangeUpdateWizard%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FExchangeUpdateWizard%3C%2FA%3E%20and%20choose%20your%20currently%20running%20CU%20and%20your%20target%20CU%20to%20get%20directions%20for%20your%20environment.%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1452943671%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%20id%3D%22toc-hId--1452938066%22%3EIf%20you%20encounter%20errors%20during%20or%20after%20installation%20of%20Exchange%20Server%20updates%3C%2FH2%3E%0A%3CP%3EIf%20you%20encounter%20errors%20during%20installation%2C%20see%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FExSetupAssist%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESetupAssist%20script%3C%2FA%3E.%20If%20something%20does%20not%20work%20properly%20after%20updates%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fexchange%2Ftroubleshoot%2Fclient-connectivity%2Fexchange-security-update-issues%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ERepair%20failed%20installations%20of%20Exchange%20Cumulative%20and%20Security%20updates%3C%2FA%3E.%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId--1463446775%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%20id%3D%22toc-hId--1463441170%22%3EFAQs%3C%2FH1%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EMy%20organization%20is%20in%20Hybrid%20mode%20with%20Exchange%20Online.%20Do%20I%20need%20to%20do%20anything%3F%3C%2FEM%3E%3C%2FSTRONG%3E%3CBR%20%2F%3EWhile%20Exchange%20Online%20customers%20are%20already%20protected%2C%20the%20October%202021%20security%20updates%20do%20need%20to%20be%20applied%20to%20your%20on-premises%20Exchange%20Servers%2C%20even%20if%20they%20are%20used%20only%20for%20management%20purposes.%20You%20do%20%3CEM%3Enot%3C%2FEM%3E%20need%20to%20re-run%20the%20Hybrid%20Configuration%20Wizard%20(HCW)%20after%20applying%20updates.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EDo%20I%20need%20to%20install%20the%20updates%20on%20%E2%80%98Exchange%20Management%20Tools%20only%E2%80%99%20workstations%3F%3CBR%20%2F%3E%3C%2FEM%3E%3C%2FSTRONG%3EServers%20or%20workstations%20running%20only%20Microsoft%20Exchange%20Management%20Tools%20(no%20Exchange%20services)%20do%20not%20need%20to%20apply%20these%20updates.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ENOTE%3A%3C%2FSTRONG%3E%20This%20post%20might%20receive%20future%20updates%3B%20they%20will%20be%20listed%20here%20(if%20available).%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22author%22%3EThe%20Exchange%20Server%20Team%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2838287%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20releasing%20a%20set%20of%20security%20updates%20for%20Exchange%20Server%202013%2C%202016%20and%202019.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2838287%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAnnouncements%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%202013%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%202016%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%202019%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOn%20premises%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2840070%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2840070%22%20slang%3D%22en-US%22%3E%3CP%3EImpossible%20to%20install%3C%2FP%3E%3CP%3Efile%20are%20used%20by%20microsoft%20filtering%20management%20service%20(but%20service%20is%20disabled)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eeither%20throug%20win%20update%20nor%20manually%20(admin%20prompt)%3C%2FP%3E%3CP%3EThanks%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2841158%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2841158%22%20slang%3D%22en-US%22%3E%3CP%3EPlease%20share%20some%20your%20details%3F%20What%20was%20OS%20platform%20and%20Exchange%3F%20So%20far%20we%20cannot%20replicate%20that%20behaviour.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2844812%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2844812%22%20slang%3D%22en-US%22%3E%3CP%3EAfter%20install%20the%20update%20on%20Exchange%202013%2C%20i%20have%20a%20problem%20with%20access%20to%20OWA%2FECP%2C%20like%20this%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fit-it%2Ftopic%2Fimpossibile-accedere-a-owa-o-ecp-dopo-l-installazione-di-exchange-server-2016-cu6-88b3fe67-5f97-a8a2-8ed8-70034ff15761%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fsupport.microsoft.com%2Fit-it%2Ftopic%2Fimpossibile-accedere-a-owa-o-ecp-dopo-l-installazione-di-exchange-server-2016-cu6-88b3fe67-5f97-a8a2-8ed8-70034ff15761%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Ehave%20a%20solution%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2845287%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2845287%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20case%20of%20Exchange%202013%20with%20October%202021%20security%20updates%26nbsp%3Binstalled%20without%20running%20the%20%2FPrepareSchema%20using%20July%202021%20CUs%20first.%26nbsp%3BIs%20it%20supported%20to%20update%20the%20schema%20after%20installing%20the%20October%20security%20update%20by%20using%20the%20command%20%22%3CSPAN%3ESetup.exe%20%2FPrepareSchema%20%2FIAcceptExchangeServerLicenseTerms%22.%20Or%20is%20it%20needed%20to%20uninstall%20the%20October%20updates%20first%3F%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2845598%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2845598%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1185198%22%20target%3D%22_blank%22%3E%40andreasoc2350%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EI%20think%20you%20have%20that%20issue%20if%20you%20don't%20run%20the%20update%20from%20an%20elevated%2Fadmin%20command%20prompt%3F%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2845773%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2845773%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F808569%22%20target%3D%22_blank%22%3E%40DanielEarl%3C%2FA%3E%26nbsp%3B%20the%20installation%20was%20successful%2C%20but%20after%20that%2C%20I%20came%20up%20with%20the%20problem%20I%20indicated.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2845903%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2845903%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1185198%22%20target%3D%22_blank%22%3E%40andreasoc2350%3C%2FA%3E%26nbsp%3BYes%2C%20the%20update%20will%20appear%20to%20install%20properly%20(it%20will%20complete)%20but%20you%20will%20see%20those%20OWA%2FECP%20errors%20and%20it's%20because%20the%20update%20hasn't%20been%20run%20with%20sufficient%20privs.%20If%20you%20run%20the%20update%20again%2C%20but%20from%20an%20elevated%20cmd%2Fps%20session%2C%20I%20think%20it's%20likely%20to%20run%20properly%20and%20you%20won't%20get%20the%20errors.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESee%20the%20section%20in%20the%20article%20above%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%22%3CFONT%20color%3D%22%23FF0000%22%3E%3CSTRONG%3EIMPORTANT%3A%3C%2FSTRONG%3E%3C%2FFONT%3E%3CSPAN%3E%26nbsp%3BIf%20manually%20installing%20security%20updates%2C%20you%26nbsp%3B%3C%2FSPAN%3E%3CEM%3Emust%3C%2FEM%3E%3CSPAN%3E%26nbsp%3Binstall%20.msp%20from%20elevated%20command%20prompt%20(do%26nbsp%3B%3C%2FSPAN%3E%3CEM%3Enot%3C%2FEM%3E%3CSPAN%3E%26nbsp%3Bchoose%20Run%20after%20download).%22%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EIf%20you%20already%20did%20that%2C%20then%20sorry%20I%20am%20not%20sure.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2848923%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2848923%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F808569%22%20target%3D%22_blank%22%3E%40DanielEarl%3C%2FA%3E%26nbsp%3B%26nbsp%3Bi%20installed%20with%20privilege%20correct!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2847840%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2847840%22%20slang%3D%22en-US%22%3E%3CP%3EFor%20resolve%20problem%20with%20ecp%20and%20owa%2C%20is%20necessari%20to%20rebind%20certificare%20in%20back%20end%20site%20in%20iis.%20After%20that%20do%20a%20iisreset%20and%20all%20it's%20ok%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2849240%22%20slang%3D%22en-US%22%3ERe%3A%20Released%3A%20October%202021%20Exchange%20Server%20Security%20Updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2849240%22%20slang%3D%22en-US%22%3E%3CP%3EI%20am%20just%20experiencing%20issues%20with%20the%20SU%20and%20Exchange%20Server%202013%20CU23%20on%20Windows%20Server%202012%20R2.%3C%2FP%3E%3CP%3EThe%20Exchange%20Services%20are%20taking%20forever%20to%20start%20up.%20Installation%20was%20done%20with%20an%20elevated%20Shell.%3C%2FP%3E%3CP%3EStartup%20typ%20is%20%22Automatic%22%20but%20the%20services%20are%20taking%20much%20longer%20to%20start%20up.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAre%20you%20guys%20also%20experiencing%20those%20issues%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Oct 15 2021 11:46 AM
Updated by: