Addressing Microsoft Exchange Server’s Critical Vulnerability: A Step-by-Step Guide