{"id":28203,"date":"2022-11-09T15:47:00","date_gmt":"2022-11-09T14:47:00","guid":{"rendered":"https:\/\/perseus.de\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/"},"modified":"2026-03-31T14:55:30","modified_gmt":"2026-03-31T12:55:30","slug":"guide-gratuit-vulnerabilites-dans-microsoft-exchange-server","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/","title":{"rendered":"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28203\" class=\"elementor elementor-28203 elementor-23486\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5424324 e-con-full e-flex e-con e-child\" data-id=\"5424324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30992b0 e-con-full e-flex e-con e-child\" data-id=\"30992b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6493f26 e-con-full e-flex e-con e-child\" data-id=\"6493f26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d785d elementor-widget elementor-widget-heading\" data-id=\"52d785d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2585ee elementor-widget elementor-widget-text-editor\" data-id=\"b2585ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Comment s\u00e9curiser votre syst\u00e8me ou r\u00e9pondre \u00e0 un incident<\/strong><\/p><p>Il est devenu connu que des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 critiques ont \u00e9t\u00e9 d\u00e9couvertes dans le logiciel serveur de transport de messagerie \u00ab Microsoft Exchange Server \u00bb. L\u2019aide d\u2019urgence Perseus fut particuli\u00e8rement utilis\u00e9e \u00e0 cette \u00e9poque. Tous les conseils obtenus, les instructions concr\u00e8tes pour la bonne conduite \u00e0 suivre pendant et apr\u00e8s un incident ainsi que des conseils utiles sur ce que vous pouvez faire pour mieux prot\u00e9ger votre entreprise se trouvent dans le livre blanc actuel de Perseus.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"589\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png\" class=\"attachment-medium_large size-medium_large wp-image-28202\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1-300x230.png 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd77b0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cd77b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db259ac e-con-full e-flex e-con e-child\" data-id=\"db259ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c698d50 e-con-full e-flex e-con e-child\" data-id=\"c698d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00403d elementor-widget elementor-widget-heading\" data-id=\"c00403d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">T\u00e9l\u00e9chargez maintenant :\n\n Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b0922 elementor-widget elementor-widget-text-editor\" data-id=\"26b0922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Informations de base sur les vuln\u00e9rabilit\u00e9s critiques<\/li><li>Que faire pour sauvegarder votre syst\u00e8me de fa\u00e7on \u00e9claire ?<\/li><li>Que faire si une attaque est suspect\u00e9e ?<\/li><li>Que faire apr\u00e8s un incident ?<\/li><li>3 conseils pour renforcer la s\u00e9curit\u00e9 de votre entreprise<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-626d01e e-con-full e-flex e-con e-child\" data-id=\"626d01e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f6a7820 e-con-full e-flex e-con e-child\" data-id=\"f6a7820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072ed64 elementor-widget__width-inherit elementor-widget elementor-widget-html\" data-id=\"072ed64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe width=\"540\" height=\"920\" src=\"https:\/\/8cd7d579.sibforms.com\/serve\/MUIFAGIU9sSDF4llANI1Iul1FkcmukZRixXax_G0JdghqVDOQqx9LfDHCIyWNZNluSflhOgheZURLJ2JQxyx2HKy8VtuwzgWMx-VXE5DXRKHOhNfhc5C8n3GqhCFOLJWjQAT_GE7Zw2kL3OrDKsBMNrsZq61mGgcaOSqJU76MY7cVe8-dPJCb-ts0ZStmd1NfsivYouLzW6knI52\" frameborder=\"0\" scrolling=\"auto\" allowfullscreen=\"\" style=\"display: block;margin-left: auto;margin-right: auto;max-width: 100%;\"><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b84d216 e-flex e-con-boxed e-con e-parent\" data-id=\"b84d216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b869a7a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b869a7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Il est devenu connu que des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 critiques ont \u00e9t\u00e9 d\u00e9couvertes dans le logiciel serveur de transport de messagerie \u00ab Microsoft Exchange Server \u00bb. L\u2019aide d\u2019urgence Perseus fut particuli\u00e8rement utilis\u00e9e \u00e0 cette \u00e9poque. Tous les conseils obtenus, les instructions concr\u00e8tes pour la bonne conduite \u00e0 suivre pendant et apr\u00e8s un incident ainsi que des conseils utiles sur ce que vous pouvez faire pour mieux prot\u00e9ger votre entreprise se trouvent dans le livre blanc actuel de Perseus.  <\/p>\n","protected":false},"author":4,"featured_media":28202,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[70],"tags":[],"class_list":["post-28203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guide"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Il est devenu connu que des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 critiques ont \u00e9t\u00e9 d\u00e9couvertes dans le logiciel serveur de transport de messagerie \u00ab Microsoft Exchange Server \u00bb. L\u2019aide d\u2019urgence Perseus fut particuli\u00e8rement utilis\u00e9e \u00e0 cette \u00e9poque. Tous les conseils obtenus, les instructions concr\u00e8tes pour la bonne conduite \u00e0 suivre pendant et apr\u00e8s un incident ainsi que des conseils utiles sur ce que vous pouvez faire pour mieux prot\u00e9ger votre entreprise se trouvent dans le livre blanc actuel de Perseus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-09T14:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T12:55:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"589\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server\",\"datePublished\":\"2022-11-09T14:47:00+00:00\",\"dateModified\":\"2026-03-31T12:55:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/\"},\"wordCount\":168,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cover-microsoft-768x589-1.png\",\"articleSection\":[\"Guide\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/\",\"name\":\"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cover-microsoft-768x589-1.png\",\"datePublished\":\"2022-11-09T14:47:00+00:00\",\"dateModified\":\"2026-03-31T12:55:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cover-microsoft-768x589-1.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cover-microsoft-768x589-1.png\",\"width\":768,\"height\":589},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/","og_locale":"fr_FR","og_type":"article","og_title":"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server - Perseus Technologies","og_description":"Il est devenu connu que des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 critiques ont \u00e9t\u00e9 d\u00e9couvertes dans le logiciel serveur de transport de messagerie \u00ab Microsoft Exchange Server \u00bb. L\u2019aide d\u2019urgence Perseus fut particuli\u00e8rement utilis\u00e9e \u00e0 cette \u00e9poque. Tous les conseils obtenus, les instructions concr\u00e8tes pour la bonne conduite \u00e0 suivre pendant et apr\u00e8s un incident ainsi que des conseils utiles sur ce que vous pouvez faire pour mieux prot\u00e9ger votre entreprise se trouvent dans le livre blanc actuel de Perseus.","og_url":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/","og_site_name":"Perseus Technologies","article_published_time":"2022-11-09T14:47:00+00:00","article_modified_time":"2026-03-31T12:55:30+00:00","og_image":[{"width":768,"height":589,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png","type":"image\/png"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Anastasia Pamoukis","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server","datePublished":"2022-11-09T14:47:00+00:00","dateModified":"2026-03-31T12:55:30+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/"},"wordCount":168,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png","articleSection":["Guide"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/","url":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/","name":"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png","datePublished":"2022-11-09T14:47:00+00:00","dateModified":"2026-03-31T12:55:30+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png","width":768,"height":589},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/fr\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=28203"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28203\/revisions"}],"predecessor-version":[{"id":28204,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28203\/revisions\/28204"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/28202"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=28203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=28203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=28203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}