The steerage
The steerage states admins ought to deal with on-prem Change servers as being “underneath imminent menace,” and itemizes key practices for admins:
- First, it notes, “the best protection in opposition to exploitation is guaranteeing all Change servers are working the most recent model and Cumulative Replace (CU)”;
- It factors out that Microsoft Change Server Subscription Version (SE) is the only supported on-premises model of Change, since Microsoft ended assist for earlier variations on October 14, 2025;
- It urges admins to make sure Microsoft’s Emergency Mitigation Service stays enabled for supply of interim mitigations;
- It urges admins to determine a security baseline for Change Server, mail purchasers, and Home windows. Sustaining a security baseline permits directors to establish non-conforming methods and people with incorrect security configurations, in addition to permitting them to carry out fast remediation that reduces the assault floor accessible to an adversary;
- It advises admins to allow built-in safety like Microsoft Defender Antivirus and different Home windows options in the event that they aren’t utilizing third occasion security software program. Utility Management for Home windows (App Management for Enterprise and AppLocker) is a crucial security characteristic that strengthens the security of Change servers by controlling the execution of executable content material, the recommendation provides;
- It urges admins to ensure solely licensed, devoted administrative workstations must be permitted to entry Change administrative environments, together with through distant PowerShell;
- It tells admins to ensure to harden authentication and encryption for id verification;
- It advises that Prolonged Safety (EP) be configured with constant TLS settings and NTLM configurations. These make EP function accurately throughout a number of Change servers;
- It advises admins to make sure that the default setting for the P2 FROM header is enabled, to detect header manipulation and spoofing;
- It says admins ought to allow HTTP Strict Transport Safety (HSTS) to pressure all browser connections to be encrypted with HTTPS.
Given the variety of configuration choices accessible, it may be troublesome for a lot of organizations to pick out the optimum security configuration for his or her specific group on the time of set up, Beggs admits. That is made extra advanced, he stated, if implementations happen in a shared providers mannequin the place the Change server is hosted within the cloud, and could also be configured and maintained by a 3rd occasion, and duty for a safe configuration will not be clear.
“A little bit-recognized facet of securely configuring Change is that making use of patches and upgrades from the seller might reset or change some security configuration data,” he famous. Whereas the steerage urges admins to ‘apply security baselines,’ Beggs stated they need to confirm that the proper security baseline was utilized. And, he added, they need to overview configuration settings a minimum of quarterly.



