Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The applications built-in Malware Agent must be disabled.
Malicious code protection mechanisms include but are not limited to anti-virus and malware detection software. To minimize potential negative impact to the organization that can be caused by malici...Rule Medium Severity -
SRG-APP-000014
Group -
Exchange must use encryption for RPC client access.
This setting controls whether client machines are forced to use secure channels to communicate with the server. If this feature is enabled, clients will only be able to communicate with the server ...Rule Medium Severity -
SRG-APP-000014
Group -
SRG-APP-000014
Group -
SRG-APP-000033
Group -
Exchange must have authenticated access set to Integrated Windows Authentication only.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., networks, web servers, and web porta...Rule Medium Severity -
Exchange must have Administrator audit logging enabled.
Unauthorized or malicious data changes can compromise the integrity and usefulness of the data. Automated attacks or malicious users with elevated privileges have the ability to effect change using...Rule Medium Severity -
Exchange servers must use approved DoD certificates.
Server certificates are required for many security features in Exchange; without them, the server cannot engage in many forms of secure communication. Failure to implement valid certificates makes...Rule Medium Severity -
Exchange auto-forwarding email to remote domains must be disabled or restricted.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Verify Aut...Rule Medium Severity -
The Exchange Email Diagnostic log level must be set to the lowest level.
Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Diagnostic logging, however, characteristi...Rule Medium Severity -
Exchange Audit record parameters must be set.
Log files help establish a history of activities and can be useful in detecting attack attempts. This item declares the fields that must be available in the audit log file in order to adequately re...Rule Low Severity -
Exchange Circular Logging must be disabled.
Logging provides a history of events performed and can also provide evidence of tampering or attack. Failure to create and preserve logs adds to the risk that suspicious events may go unnoticed and...Rule Low Severity -
Exchange Queue monitoring must be configured with threshold and action.
Monitors are automated "process watchers" that respond to performance changes and can be useful in detecting outages and alerting administrators where attention is needed. Exchange has built-in mon...Rule Medium Severity -
Exchange must protect audit data against unauthorized access.
Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be considere...Rule Medium Severity -
Exchange must protect audit data against unauthorized deletion.
Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be considere...Rule Medium Severity -
Exchange Audit data must be on separate partitions.
Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be considere...Rule Medium Severity -
Exchange Local machine policy must require signed scripts.
Scripts often provide a way for attackers to infiltrate a system, especially scripts downloaded from untrusted locations. By setting machine policy to prevent unauthorized script executions, unanti...Rule Medium Severity -
The Exchange Internet Message Access Protocol 4 (IMAP4) service must be disabled.
IMAP4 is not approved for use within the DoD. It uses a clear-text-based user name and password and does not support the DoD standard for PKI for email access. User name and password could easily b...Rule Medium Severity -
The Exchange Post Office Protocol 3 (POP3) service must be disabled.
POP3 is not approved for use within the DoD. It uses a clear-text-based user name and password and does not support the DoD standard for PKI for email access. User name and password could easily be...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.