Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Exchange internal receive connectors must not allow anonymous connections.
This control is used to limit the servers that may use this server as a relay. If a Simple Mail Transport Protocol (SMTP) sender does not have a direct connection to the internet (for example, an a...Rule Medium Severity -
Exchange must have anti-spam filtering installed.
Originators of spam messages are constantly changing their techniques to defeat spam countermeasures; therefore, spam software must be constantly updated to address the changing threat. A manual up...Rule Medium Severity -
Exchange must have anti-spam filtering configured.
Originators of spam messages are constantly changing their techniques to defeat spam countermeasures; therefore, spam software must be constantly updated to address the changing threat. A manual up...Rule Medium Severity -
The Exchange Global Recipient Count Limit must be set.
Email system availability depends in part on best practice strategies for setting tuning configurations. The Global Recipient Count Limit field is used to control the maximum number of recipients t...Rule Low Severity -
The Exchange malware scanning agent must be configured for automatic updates.
Antimalware protection in Exchange Server 2019 helps combat viruses and spyware in an email messaging environment. Viruses infect other programs and data, and they spread throughout computer lookin...Rule Medium Severity -
Role-Based Access Control must be defined for privileged and nonprivileged users.
Role Based Access Control (RBAC) is the permissions model used in Microsoft Exchange Server 2013, 2016, and 2019. With RBAC, there is no need to modify and manage access control lists (ACLs), which...Rule Medium Severity -
Exchange services must be documented, and unnecessary services must be removed or disabled.
Unneeded but running services offer attackers an enhanced attack profile, and attackers are constantly watching to discover open ports with running services. By analyzing and disabling unneeded ser...Rule Medium Severity -
The Exchange email application must not share a partition with another application.
In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subseque...Rule Medium Severity -
Exchange must not send nondelivery reports to remote domains.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure tha...Rule Medium Severity -
The Exchange SMTP automated banner response must not reveal server details.
Automated connection responses occur as a result of FTP or Telnet connections when connecting to those services. They report a successful connection by greeting the connecting client and stating th...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.