-
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Thank you for taking the time to create a separate discussion on this. Others will be able to more easily find this discussion if they run into a similar error. I'm curious why you do not store Exchange server logs. Is that intentional? Those logs are going to be critical for future forensics. Additionally, without them you are blind as to the underlying TLS connection problem. What has caught my eye in the above post is this line: From the information you've provided it appears that your Exchange server is antiquated and needs to be updated to support modern encryption ciphers. If you do not intend to upgrade Exchange then you may have no alternative but to downgrade ElastAlert 2 to a version equivalent to that Exchange server's version era. Perhaps even switch back to the deprecated original ElastAlert, which is quite old. |
Beta Was this translation helpful? Give feedback.
Thank you for taking the time to create a separate discussion on this. Others will be able to more easily find this discussion if they run into a similar error.
I'm curious why you do not store Exchange server logs. Is that intentional? Those logs are going to be critical for future forensics. Additionally, without them you are blind as to the underlying TLS connection problem.
What has caught my eye in the above post is this line:
Protocol : TLSv1
. That cipher has some security deficiencies, and the computing industry has largely disabled and removed support for it. As of Python 3.10, TLS v1 has been deprecated. It may be possible to force it to support it, but I don't have this informat…