Dec 31 2021 09:39 PM - edited Jan 02 2022 09:38 PM
There is a live Bug going on in On premise Exchange. To resolve the issue Please Disable your Antimalware filter just for now so you can start your communication again. Please note that this is not final solution. this is just workaround for now
Please follow the below step:
Following third step is not necessary. This step is necessary only if you have third party malware agent.
Jan 01 2022 01:24 AM
I confirm this has allowed for communication flow to resume
Jan 01 2022 02:19 AM
@SABBIRRUBAYAT Where do you see that there is an 'Cyber Attack' ?
It seems there is a bug in the moduoe 'FIP-FS' if you look in your Eventlog
The FIP-FS "Microsoft" Scan Engine failed to load. PID: 20132, Error Code: 0x80004005. Error Description: Can't convert "2201010004" to long.
Looks like there are using long in there application
with an max number of
214748 3647 and they try (date looks like?) to parse and higher number 2201010004
A solution without a reboot from servies is:
Set-MalwareFilteringServer -Identity <<SERVERNAMEHERE>> -BypassFiltering $true
Please note!! This is a temporary solution! get a good virus, mallware and spam scanner on your Exchange server from a third party!
Jan 01 2022 09:34 AM
Solution@amaltsev Are you sure this is a cyberattack and not a bug? According to most reports I've read, this is due to a failure converting to a new date and occurred at midnight UTC.
Jan 01 2022 09:44 AM
Jan 01 2022 12:41 PM
@SABBIRRUBAYAT - just a note that it's not a cyber attack, it's an int32 conversion issue with the date code of the 2022 signatures that Microsoft still hasn't fixed.
I had also originally disabled malware scanning using the disable scripts last night to get things working, but the problem with this is that the malware definitions/engines are never updated for the FIP-FS service when you do that...it's better to set all your servers to bypass scanning instead. I had tried this last night before the internet blew up (this is for 2013 but same thing for 2016/2019 - https://docs.microsoft.com/en-us/exchange/disable-or-bypass-anti-malware-scanning-exchange-2013-help). The problem with that article is it doesn't say to restart the transport service after running the bypass command - but you have to do that for it to take effect.
If you do it this way, mailflow will work and your definitions will continue to be updated so that hopefully when Microsoft fixes this your servers will be updated so that when you remove the bypass things continue to work (rather than re-enabling scanning, then waiting for the engines to update which takes a long time/breaks your mail flow again).
Jan 01 2022 02:06 PM - edited Jan 01 2022 04:21 PM
I only ran the two steps below, and the email started to flow after.
1. Disable-Antimalwarescanning.ps1
2. restart the transport service
I did not run Set-MalwareFilteringServer <ServerIdentity> - BypassFiltering $true instead of the above two.
Will the next Exchange patch release installation re·vert
the antimalware agent back "on," as on the default installation, and again we have to disable the agent?
Jan 01 2022 02:14 PM
Jan 01 2022 05:07 PM
Jan 01 2022 08:25 PM
@Corbett Endersmy thoughts exactly. however I stumbled on the fix from an old article that recommends bypassing it. I've also kept an eye on the firewall, and nothing out of the ordinary.
Jan 02 2022 06:32 AM - edited Jan 02 2022 06:44 AM
It looks like MS has released its fix!, is it official?
https://techcommunity.microsoft.com/t5/exchange-team-blog/email-stuck-in-transport-queues/ba-p/30494...
Jan 02 2022 07:39 AM
Jan 02 2022 09:30 PM
Jan 02 2022 09:42 PM
Jan 02 2022 09:42 PM
Jan 02 2022 10:09 PM
Jan 02 2022 10:09 PM
Jan 02 2022 10:11 PM
Jan 12 2022 01:15 AM
@LeeMEI please note that my answer relates only to the action steps proposed, nothing to do with the origin of the problem