Why Exchange Server updates matter
Published Apr 26 2021 03:00 AM 37.3K Views

We have now published most of the information from this blog post as a part of our official documentation, You can find it here: Exchange Server update FAQ.

 

It is very important to keep updating your Exchange Servers to a supported Cumulative Update (CU). Simply put, your on-premises environments should always be ready to take an emergency security update (this applies to Exchange, Windows, and other Microsoft products you use on-premises). One thing we learned during the March 2021 release of Exchange Server security updates is that many of our customers were not ready to install security updates because they were not on supported cumulative update versions. With the threat landscape rapidly evolving, the importance of keeping your environment current should not be underestimated.

Please keep your Exchange Servers up to date. We want to continue helping you keep your environment secure, and this means your Exchange servers need to be up to date. This is a continuous process.

Once your Exchange servers are running a supported CU, ensure that the latest available Security Update (SU) is also installed. This will help address any vulnerabilities found since the release of the supported CU. To find recently released Exchange Server SUs, go to the Security Update Guide (filter on Exchange Server under Product Family). Exchange Server security updates are cumulative (an update released in April will also contain security fixes released in March, for example). We also announce all major updates on our blog.

We have prepared a set of questions and answers that cover what we hear most often about Exchange updates. If you are running into a different set of challenges keeping your environment up to date, please let us know in comments below!

Q&A

I updated my Exchange Servers a few months ago! How come they are ‘not supported’ today?

For versions of Exchange that are within mainstream support (see product lifecycle), Microsoft supports (releases relevant security fixes for) the two latest CUs. Sometimes the latest two CUs are referred to as “N and N-1”. As a current example, if the latest released CU is CU12 (‘N’), and the server version is Exchange Server 2019, then Microsoft at this time supports two Exchange Server 2019 CUs, N and N-1 (CU12 and CU11). When CU13 is released, the “supported CU window” will slide toward the newly released CU13 (and what used to be the N-1 supported CU, CU11, will become unsupported).

SupportedWindow.jpg

Why does Microsoft release updates so often?

It is good that updates are released when issues are found. Microsoft (and other software vendors) release updates only when they are needed. CUs typically contain resolutions to feature problems that were reported to us by our customers (and can contain security updates from previous SUs) and are released twice a year (in H1 and H2). SUs are released only when actual security issues are found and fixed, and are typically released on a ‘patch Tuesday’. Let’s take an example of how a typical release flow for two CUs and two SUs we might release would look like:

  • On a particular month (let’s say March), we might release CU4; CU4 is cumulative and will include fixes and updates from before.
  • A month later we release CU4 SU1, a security update for CU4.
  • In July we then release CU4 SU2, an additional security update for CU4. CU4 SU2 will include updates released in CU4 SU1 also.
  • In September we release CU5, which will contain all updates released up to that point.

SUs_are_cumulative.jpg

My Exchange Servers are working as expected, so why update them?

While we appreciate the ‘don’t fix what is not broken’ thinking, the reality is that keeping Exchange Server current allows you to ensure that it will keep working without major interruptions to functionality. Investing some time into Exchange Server maintenance (on your planned schedule) will give you a long-term benefit of well running system, with code as protected from vulnerabilities as you can get it.

Updating Exchange Server seems complicated; what exactly do I do?

Think of updating Exchange server in several stages:

  1. Take inventory: use the Exchange Server Health Checker script on GitHub to see if you are behind on your on-premises Exchange Server updates.
  2. Install updates: visit https://aka.ms/ExchangeUpdateWizard and choose your currently running CU and your target CU. Then click the “Tell me the steps” button, to get a list of steps to follow.
  3. Troubleshoot (if needed): follow the ExchangeUpdateWizard instructions and best practices for installation of updates carefully, including when to use an elevated command prompt. If you encounter errors during or after installation, see Repair failed installations of Exchange Cumulative and Security updates.

Why did Microsoft suddenly start releasing Exchange Server security updates?

Releasing security updates for Exchange Server is not new. Microsoft has been releasing Exchange Server updates on ‘patch Tuesday’ for years (when issues are found). Keeping up with these updates is a best practice.

How can I update Exchange Server when (insert 3rd party application name here) does not support either of the latest supported Exchange Server CUs?

Work with your 3rd party vendor to bring their software current in a timely manner. Consider that your Exchange environment contains a lot of valuable company directory and messaging information. Your priority should be to keep your environment as secure as possible.

How can we stay current when we are a 24x7 business and have no time to take our servers down for maintenance?

Many customers require Exchange Server to work 24x7. In fact, our update process is designed for these high-demand businesses. You should use Database Availability Groups (DAGs) and put servers that you are updating in Maintenance mode to enable a graceful and non-disruptive update process for your users. See Performing maintenance on DAG members for more information.

If we are in Hybrid mode and don’t actively use our on-premises Exchange Server, do we still need to stay current?

Even if you are only using Exchange Server on-premises to manage Exchange-related objects, you need to keep the server current. Note that the Hybrid Configuration Wizard (HCW) does not need to be re-run after updates are installed.

I looked at recent security update releases and the Common Vulnerabilities and Exposures (CVE) severity was not very high; so why update?

Microsoft recommends that you apply all available security updates because it can be difficult to understand how even lower severity vulnerabilities disclosed in one month might interact with vulnerabilities disclosed and fixed a month later. An attack may trigger only specific low-impact functionality on a remote target machine and nothing else, causing the scoring for the CVE to be quite low one month. For example, in the following month an important issue with that functionality could be discovered, but it might be only triggered locally and require significant user interaction. That on its own might also not be scored highly. But if your software is behind in updates, these two issues could combine into an attack chain, thereby scoring at critical levels.

We applied mitigations for a recent security vulnerability. Why should we install (later released) updates for those same vulnerabilities?

Mitigations are a temporary form of protection that should be used until the actual code fix is released. Because mitigations do not address the actual vulnerability that is present in the code, they can (and sometimes do) get bypassed by threat actors attacking systems that are still vulnerable. Microsoft recommends to install the code fix for any vulnerability as soon as it is available. Mitigations should not be considered a long-term solution to vulnerable code.

We find it difficult to update because Active Directory (AD) schema extensions and Exchange installations require different teams to take action.

In cases where different teams need to perform separate actions to prepare for installation of Exchange Cumulative Updates (as those might require AD schema extension) – we recommend you request schema changes when we release new CUs that require them. Even if you do not need to update to the very latest CU (because last two CUs are supported for Exchange versions that are still within support lifetime) – the fact that Active Directory schema will be up to date means that if you do find that you need to install the latest CU, AD schema will already be updated. We release CUs twice a year and not all of them will require AD schema updates. You can track this here for Exchange 2016 and here for Exchange 2019.

We installed a previous CU on our server and then applied available SUs. We just updated our server to the latest CU available. Do we need to apply the SU for the latest CU too?

After a new CU is installed on the server, you always need to install the latest SUs available for that CU. Let us walk through a hypothetical Exchange Server 2019 scenario of this:

  • In May, you installed CU9 (the latest available CU at the time) and all available SUs for CU9
  • In June, we released CU10 for Exchange Server 2019
  • In July, we released SUs that apply to both CU9 and CU10
  • In July, you installed July SU to your Exchange 2019 CU9 server
  • In August, you installed CU10 (the latest available CU in July)
  • You now need to apply the latest SU that is available for Exchange Server 2019 CU10

We installed an SU for current CU last month. This month, a new SU is available for the same CU. Do we need to uninstall last month’s SU before installing a newer one for the same CU?

No, uninstallation of last month’s SU is not necessary. Simply install this month’s SU as it becomes available. Newer SU will contain last month’s SUs security fixes too.

When we release security updates for supported Exchange Server versions, we release them for the last two (supported) CUs. SUs are always CU specific. In other words – installing a later CU will require that any SU available for that CU be installed also, no matter if the SU for the latest and previous CU were released on the same day. If there are SUs for the CU your server is running, then you should install it. SUs will typically be ‘rolled into the CU’ at the next subsequent CU release (see Why does Microsoft release updates so often? question above).

Did Microsoft change how often Exchange CUs are released?

Yes, starting with 2022 H1 Cumulative Updates, we have moved to a release cadence of two CUs per year – releasing in H1 and H2 of each calendar year, with general target release dates of March and September. But our release dates are driven by quality, so we might release updates in April or October, or some other month, depending on what we’re delivering. With these service model changes, being current still means running the latest CU or the one immediately preceding it (N or N-1), but the ‘currency window’ is now extended from 6 months to 1 year.

Do we need to install SUs on all Exchange Servers within our organization? What about ‘Management Tools only’ machines?

Our recommendation is to install Security Updates on all Exchange Servers as well as servers or workstations running Exchange Management Tools only, which will ensure that there is no incompatibility between management tools clients and servers.

We installed current CU and SU releases and are fully up to date. Is there anything else that we should do?

Depending on the particular environment, addressing certain vulnerabilities might require additional actions to be performed by the Exchange administrator. To make sure that you have performed all of the actions necessary after relevant Security Updates were installed, please run the Exchange Server Health Checker script. Please also ensure that you update the Windows operating system that Exchange Server is running on, as vulnerabilities in the OS can be used as a part of attack chain too.

The Exchange Team

11 Comments
Brass Contributor

Yes, it can be difficult and frustrating keeping MS Exchange up to date. The quarterly updates seem to come round so quickly.

In March and April, I was in the process or migrating from Exchange 2016 Hybrid to Exchange 2019 Hybrid, something that had been meticulously planned and scheduled. First there was the March CUs, then the March SUs and then the April SUs. All important updates that had to be promptly installed and tested, in the correct order. All this while deploying Exchange 2019 Hybrid and decommissioning Exchange 2016 Hybrid. I guess bad timing on my part, but all completed now. Hopefully things will be a bit quieter now, until the next round of CUs in June/July.

Microsoft

@sjhudson - other than the timing (which is something that cannot be fully predicted) - do you feel it is the release cadence (quarterly) that is the largest hurdle to keep up to date, in your opinion?

Brass Contributor

@Nino Bilic - The quarterly cadence is just fine (patch Tuesday is a different story :smiling_face_with_smiling_eyes:). The last few of months have been unique with the sequential release of important Security Updates, in addition to the scheduled Cumulative Updates. Additionally, as a result of COVID, many of us are having perform many Exchange maintenance and administration tasks remotely. I did of course perform the Exchange Hybrid installation and migration on-site!

Brass Contributor

I know, that patching Exchange is really hard work and most of the time it works as expected, but the last 3 CUs (18-20) for Exchange 2016 opened one bug by another, leading to the misery we saw in March. Admins had to install buggy CUs to get protected against Hafnium attacks. ExchangeAdmins are waiting for "clean" CUs... QualityControl should be alarmed, you are loosing customers, not everyone is able / allowed to use Microsoft365 solutions...

Dear @The_Exchange_Team  @Nino Bilic please release Exchange Server 2019 for free to customers using it for Exchange Online hybrid or hybrid management purposes.

I see the need of this option for customers that want to stay current. 

 

 

Current state:

Only Exchange Server 2016 is for free in this usecase 

 

Issues:

- Exchange Server 2016 is not supported on Server 2019 LTSC

 

- Exchange Server 2016 is in extended support 

 

- Windows Server 2016 LTSC will be soon in Extended Support 

 

-Windows Server 2016 does not contain .net 4.8. By default as required for latest Exchange Server 2016 CU

 

-Windows Server 2016 LTasc5is known for very slow patching times and high downtimes for CBS applied patches. This issue will not be fixed. https://windowsserver.uservoice.com/forums/295047-general-feedback/suggestions/32121229-stop-the-win...

 

Solution:

- Windows Server 2019 LTSC is not affected by this. However only supports Exchange Server 2019

- the OS has much better security by default and better Defender capabilities

 

The only reason to keep up the Exchange Server 2016 offer (in addition) is to the provide very slow upgrading companies to support Windows Server 2012 R2 OS for Exchange Server 2016 and also to support 2012 R2 FFL/DFL and so using 2012R2 Domain Controllers (not everything compatible is recommended). 

 

Alternative:

Extend the free offer for this usecase to Windows Server 2022 LTSC and Exchange Server 202x

 

Usecase:

SMB customers that don't run DAG or Server Clustering, using Exchange 2016 for free as part of their Hybrid Exchange Online deployment or Exchange Onp-remises hybrid management 

 

Thanks for your understanding and soon response to this dilemma. 

 

Additional reasons:

Due to the March response we have seen customers that tried to apply latest Exchange CUs on outdated Server 2016 and caused issues which needed a full OS restore.

 

 

Copper Contributor

When these SU's fail to install - it's a nightmare. The rollback process leaves everything in an undesired state - services disabled, Etc. + sometimes with missing DLL files in the bin directory. It would be great if this process was a bit more trustworthy without having to cross your fingers hoping that it installs correctly without any issues. 

Copper Contributor

@The_Exchange_Team 

 

Download Link for EX2013 CU23 are broken.

 

Regards Steve

Copper Contributor

Hi Team

My Exchange 2016 environment still on CU12 and i want to upgrade to CU18 .  

however, CU18 required AD update where as CU16 also required AD update.

in such case , do in need to perform CU16 AD update first followed by CU18 AD update?

OR

Can i directly perform CU18 AD update,?

 

Pls suggest. 

Microsoft

@Yogi1 - please see https://aka.ms/exchangeupdatewizard - it will tell you exactly what needs to be done. :)

Microsoft

@SteveTH - should be back now! Sorry about that!

Brass Contributor

"When these SU's fail to install - it's a nightmare. The rollback process leaves everything in an undesired state..."

 

I totally agree on this! The whole update/patching process is a nightmare. We need a 100% rollback function! I 've written a custom installation/update-system for a big German company for their software application in the past and with 100% rollback functionality. WHY is MS with all their manpower and money not able to provide such a rollback system for their updates/patches?

Co-Authors
Version history
Last update:
‎Nov 27 2023 08:02 AM
Updated by: