Jump to content

DarrylRH

Members
  • Posts

    2
  • Joined

  • Last visited

About DarrylRH

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    Canada
  1. Appreciate what you're saying - my understanding is this exploit triggers the Outlook client to initiate an outbound SMB connection via the system process thereby exposing the NTLM hash. ESET Mail Security is running in the inbound side of Exchange edge transport - before the exploit ever reaches the mailbox, and far before the Outlook client comes into play.
  2. Can we expect ESET Mail Security to quarantine inbound external messages once the detection signatures are made available? (thereby protecting potentially vulnerable Outlook clients)
×
×
  • Create New...