Exchange 2010 Client Access Server STIG
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Exch-1-502
Group -
Exchange ActiveSync (EAS) must only use certificate-based authentication to access email.
Identification and Authentication provide the foundation for access control. For EAS to be used effectively on DoD networks, client certificate authentication must be used for communications betwee...Rule Medium Severity -
Exch-1-505
Group -
Encryption must be used for RPC client access.
This setting controls whether client machines are forced to use secure channels to communicate with the server. If this feature is enabled, clients will only be able to communicate with the server...Rule Medium Severity -
The Microsoft Exchange IMAP4 service must be disabled.
The IMAP4 protocol is not approved for use within the DoD. It uses a clear text based user name and password and does not support the DoD standard for PKI for email access. User name and password c...Rule Medium Severity -
The Microsoft Exchange POP3 service must be disabled.
The POP3 protocol is not approved for use within the DoD. It uses a clear text based user name and password and does not support the DoD standard for PKI for email access. User name and password co...Rule Medium Severity -
The Public Folder virtual directory must be removed if not in use by the site.
To reduce the vectors through which a server can be attacked, unneeded application components should be disabled or removed. By default, a virtual directory is installed for Public Folders. If ...Rule Low Severity -
Web email must use standard ports protocols.
PPSM standard defined ports and protocols must be used for all Exchange services. The standard port for HTTP connections is 80 and the standard port for HTTPS connections is 443. Changing the p...Rule Medium Severity -
Forms-based Authentication must not be enabled.
Identification and Authentication provide the foundation for access control. Access to email services applications in the DoD require authentication using DoD Public Key Infrastructure (PKI) certi...Rule Medium Severity -
Email Diagnostic log level must be set to low or lowest level.
Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Diagnostic logging, however, characterist...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.