Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000247
Group -
SRG-APP-000261
Group -
Active hyperlinks in messages from non .mil domains must be rendered unclickable.
Active hyperlinks within an email are susceptible to attacks of malicious software or malware. The hyperlink could lead to a malware infection or redirect the website to another fraudulent website ...Rule Medium Severity -
SRG-APP-000261
Group -
SRG-APP-000261
Group -
Exchange messages with a blank sender field must be filtered.
By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated from the message stream rather than admitting them into the mail server en...Rule Medium Severity -
SRG-APP-000261
Group -
SRG-APP-000261
Group -
The Exchange sender filter must block unaccepted domains.
Spam origination sites and other sources of suspected email-borne malware have the ability to corrupt, compromise, or otherwise limit availability of email servers. Limiting exposure to unfiltered ...Rule Medium Severity -
SRG-APP-000261
Group -
SRG-APP-000261
Group -
The Exchange Sender Reputation filter must be enabled.
By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated from the message stream rather than admitting them into the mail server en...Rule Medium Severity -
SRG-APP-000261
Group -
The Exchange Sender Reputation filter must identify the spam block level.
By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated from the message stream rather than admitting them into the mail server en...Rule Medium Severity -
SRG-APP-000261
Group -
SRG-APP-000261
Group -
The Exchange Spam Evaluation filter must be enabled.
By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages may be eliminated from the transport message stream, preventing their entry into the Exch...Rule Medium Severity -
SRG-APP-000261
Group -
SRG-APP-000261
Group -
Exchange messages with a malformed From address must be rejected.
Sender Identification (SID) is an email anti-spam sanitization process. Sender ID uses DNS MX record lookups to verify the Simple Mail Transfer Protocol (SMTP) sending server is authorized to send ...Rule Medium Severity -
SRG-APP-000261
Group -
The Exchange Recipient filter must be enabled.
Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduces the risk that system or network congestion will contribute to availab...Rule Medium Severity -
SRG-APP-000261
Group -
SRG-APP-000261
Group -
Exchange internal Receive connectors must not allow anonymous connections.
This control is used to limit the servers that may use this server as a relay. If a Simple Mail Transport Protocol (SMTP) sender does not have a direct connection to the internet (for example, an a...Rule Medium Severity -
SRG-APP-000261
Group -
Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List entries must be empty.
Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduces the risk that system or network congestion will contribute to availab...Rule Medium Severity -
SRG-APP-000261
Group -
The Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List Connection filter must be enabled.
Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduces the risk that system or network congestion will contribute to availab...Rule Medium Severity -
SRG-APP-000261
Group -
SRG-APP-000261
Group -
Exchange must have anti-spam filtering installed.
Originators of spam messages are constantly changing their techniques to defeat spam countermeasures; therefore, spam software must be constantly updated to address the changing threat. Spam protec...Rule Medium Severity -
SRG-APP-000261
Group -
Exchange must have anti-spam filtering enabled.
Originators of spam messages are constantly changing their techniques to defeat spam countermeasures; therefore, spam software must be constantly updated to address the changing threat. Spam protec...Rule Medium Severity -
SRG-APP-000261
Group -
Exchange must have anti-spam filtering configured.
Originators of spam messages are constantly changing their techniques to defeat spam countermeasures; therefore, spam software must be constantly updated to address the changing threat. A manual up...Rule Medium Severity -
SRG-APP-000261
Group -
SRG-APP-000295
Group -
SRG-APP-000340
Group -
SRG-APP-000378
Group -
The Exchange application directory must be protected from unauthorized access.
Default product installations may provide more generous access permissions than are necessary to run the application. By examining and tailoring access permissions to provide the least amount of pr...Rule Medium Severity -
SRG-APP-000380
Group -
SRG-APP-000381
Group -
The Exchange local machine policy must require signed scripts.
Scripts, especially those downloaded from untrusted locations, often provide a way for attackers to infiltrate a system. By setting machine policy to prevent unauthorized script executions, unantic...Rule Medium Severity -
SRG-APP-000383
Group -
SRG-APP-000424
Group -
The Exchange Edge server must point to a trusted list of DNS servers for external and internal resolution.
To mitigate the risk of possible erroneous queries that may have been coopted by bad actors, the Exchange Edge server must use DNS servers that utilize DNSSEC to resolve external hosts and internal...Rule Medium Severity -
SRG-APP-000431
Group -
Exchange software must be installed on a separate partition from the OS.
In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subseque...Rule Medium Severity -
SRG-APP-000435
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.