Let’s start with a question. How often to you apply fix packs to your Exchange Server?
For Windows client PC’s, it is very important to apply Windows fix packs when they are released for Windows. This also applies to Exchange Servers. If you are an experienced Exchange administrator you already know that these updates are very easy to miss. Exchange Server updates are typically not seen by the Exchange or server administrator. That is, of course unless he or she signs up for a newsletter that brings such news, or accidentially stumbles upon an Exchange server-related blog or the Exchange Server homepage.
Note that applying Microsoft Exchange updates is not only about bug fixes but also overall security of Exchange Server. In August, Microsoft released an important and critical security update for Exchange Server 2013. As a result, keeping your Exchange Server updated should be an integral part of your Exchange Server and general e-mail security strategy.
Never resting on our laurels, we decided to include an Exchange Diagnostics Tool with SPAMfighter Exchange Module. This tool will alert you of missing updates for Exchange Server and provide a handy overview of which updates have been released by Microsoft. Here is a short video:
News: SPAMfighter Exchange Module 188.8.131.52 also includes a function for sending an e-mail alert if your Exchange Server is not patched with the latest updates.
How get i get my hands on the Exchange Diagnostics Tool?
The Exchange Diagnostics Tool is Free with the latest version of SPAMfighter Exchange Module. The award-winning anti-spam filter can be downloaded in a 30 day full version here. Existing users can upgrade SPAMfighter Exchange Module using the same link and of course enjoy the same benefits free of charge.
However, beware of Exchange Server updates! Often times Microsoft makes mistakes. In August, Microsoft had to pull this Security Update due to errors, so it is always a good idea to test an Exchange update in a test environment.
Hope you enjoy the Exchange Diagnostics Tool!