Skip to content

Microsoft Exchange 2013 Client Access Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000125

    Group
  • SRG-APP-000014

    Group
  • Exchange must use Encryption for RPC client access.

    This setting controls whether client machines are forced to use secure channels to communicate with the server. If this feature is enabled, clients will only be able to communicate with the server ...
    Rule Medium Severity
  • Exchange must have Forms-based Authentication disabled.

    Identification and Authentication provide the foundation for access control. Access to email services applications in the DoD requires authentication using DoD Public Key Infrastructure (PKI) certi...
    Rule Medium Severity
  • Exchange must have Administrator audit logging enabled.

    Unauthorized or malicious data changes can compromise the integrity and usefulness of the data. Automated attacks or malicious users with elevated privileges have the ability to affect change using...
    Rule Medium Severity
  • Exchange must have IIS map client certificates to an approved certificate server.

    For EAS to be used effectively on DoD networks, client certificate authentication must be used for communications between the MEM and email server. Identification and Authentication provide the fou...
    Rule Medium Severity
  • Exchange Email Diagnostic log level must be set to lowest level.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Diagnostic logging, however, characterist...
    Rule Medium Severity
  • Exchange must have Send Fatal Errors to Microsoft disabled.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. This setting enables an automated log ent...
    Rule Medium Severity
  • Exchange must have Audit data on separate partitions.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be consider...
    Rule Low Severity
  • Exchange must have the Microsoft Active Sync directory removed.

    To reduce the vectors through which a server can be attacked, unneeded application components should be disabled or removed. By default, a virtual directory is installed for Active Sync, and the Ex...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules