Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Exchange must have anti-spam filtering installed.
Originators of spam messages are constantly changing their techniques in order to defeat spam countermeasures; therefore, spam software must be constantly updated to address the changing threat. A ...Rule Medium Severity -
SRG-APP-000261
Group -
Exchange must have anti-spam filtering enabled.
Originators of spam messages are constantly changing their techniques in order to defeat spam countermeasures; therefore, spam software must be constantly updated to address the changing threat. A ...Rule Medium Severity -
SRG-APP-000261
Group -
Exchange must have anti-spam filtering configured.
Originators of spam messages are constantly changing their techniques in order to defeat spam countermeasures; therefore, spam software must be constantly updated to address the changing threat. A ...Rule Medium Severity -
SRG-APP-000261
Group -
Exchange must not send automated replies to remote domains.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Remote use...Rule Medium Severity -
SRG-APP-000261
Group -
SRG-APP-000261
Group -
SRG-APP-000295
Group -
The Exchange Receive connector timeout must be limited.
Email system availability depends in part on best practice strategies for setting tuning. This configuration controls the number of idle minutes before the connection is dropped. It works in conjun...Rule Low Severity -
SRG-APP-000378
Group -
The Exchange application directory must be protected from unauthorized access.
Default product installations may provide more generous access permissions than are necessary to run the application. By examining and tailoring access permissions to more closely provide the least...Rule Medium Severity -
SRG-APP-000380
Group -
SRG-APP-000381
Group -
SRG-APP-000383
Group -
SRG-APP-000391
Group -
Exchange Outlook Anywhere clients must use NTLM authentication to access email.
Identification and authentication provide the foundation for access control. Access to email services applications require NTLM authentication. Outlook Anywhere, if authorized for use by the site, ...Rule Medium Severity -
SRG-APP-000431
Group -
SRG-APP-000435
Group -
Exchange must not send delivery reports to remote domains.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure tha...Rule Medium Severity -
SRG-APP-000435
Group -
Exchange must not send nondelivery reports to remote domains.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure tha...Rule Medium Severity -
SRG-APP-000435
Group -
SRG-APP-000435
Group -
SRG-APP-000435
Group -
SRG-APP-000456
Group -
Exchange must have the most current, approved service pack installed.
Failure to install the most current Exchange service pack leaves a system vulnerable to exploitation. Current service packs correct known security and system vulnerabilities.Rule Medium Severity -
SRG-APP-000516
Group -
SRG-APP-000278
Group -
The applications built-in Malware Agent must be disabled.
Malicious code protection mechanisms include but are not limited to anti-virus and malware detection software. To minimize potential negative impact to the organization that can be caused by malici...Rule Medium Severity -
SRG-APP-000014
Group -
Exchange must use encryption for RPC client access.
This setting controls whether client machines are forced to use secure channels to communicate with the server. If this feature is enabled, clients will only be able to communicate with the server ...Rule Medium Severity -
SRG-APP-000014
Group -
SRG-APP-000014
Group -
SRG-APP-000033
Group -
Exchange must have authenticated access set to Integrated Windows Authentication only.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., networks, web servers, and web porta...Rule Medium Severity -
Exchange must have Administrator audit logging enabled.
Unauthorized or malicious data changes can compromise the integrity and usefulness of the data. Automated attacks or malicious users with elevated privileges have the ability to effect change using...Rule Medium Severity -
Exchange servers must use approved DoD certificates.
Server certificates are required for many security features in Exchange; without them, the server cannot engage in many forms of secure communication. Failure to implement valid certificates makes...Rule Medium Severity -
Exchange auto-forwarding email to remote domains must be disabled or restricted.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Verify Aut...Rule Medium Severity -
The Exchange Email Diagnostic log level must be set to the lowest level.
Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Diagnostic logging, however, characteristi...Rule Medium Severity -
Exchange Audit record parameters must be set.
Log files help establish a history of activities and can be useful in detecting attack attempts. This item declares the fields that must be available in the audit log file in order to adequately re...Rule Low Severity -
Exchange Circular Logging must be disabled.
Logging provides a history of events performed and can also provide evidence of tampering or attack. Failure to create and preserve logs adds to the risk that suspicious events may go unnoticed and...Rule Low Severity -
Exchange Queue monitoring must be configured with threshold and action.
Monitors are automated "process watchers" that respond to performance changes and can be useful in detecting outages and alerting administrators where attention is needed. Exchange has built-in mon...Rule Medium Severity -
Exchange must protect audit data against unauthorized access.
Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be considere...Rule Medium Severity -
Exchange must protect audit data against unauthorized deletion.
Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be considere...Rule Medium Severity -
Exchange Audit data must be on separate partitions.
Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be considere...Rule Medium Severity -
Exchange Local machine policy must require signed scripts.
Scripts often provide a way for attackers to infiltrate a system, especially scripts downloaded from untrusted locations. By setting machine policy to prevent unauthorized script executions, unanti...Rule Medium Severity -
The Exchange Internet Message Access Protocol 4 (IMAP4) service must be disabled.
IMAP4 is not approved for use within the DoD. It uses a clear-text-based user name and password and does not support the DoD standard for PKI for email access. User name and password could easily b...Rule Medium Severity -
The Exchange Post Office Protocol 3 (POP3) service must be disabled.
POP3 is not approved for use within the DoD. It uses a clear-text-based user name and password and does not support the DoD standard for PKI for email access. User name and password could easily be...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.