Skip to content

Microsoft Exchange 2013 Client Access Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Exchange Servers must use approved DoD certificates.

    Server certificates are required for many security features in Exchange; without them the server cannot engage in many forms of secure communication. Failure to implement valid certificates makes i...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • Exchange ActiveSync (EAS) must only use certificate-based authentication to access email.

    Identification and Authentication provide the foundation for access control. For EAS to be used effectively on DoD networks, client certificate authentication must be used for communications betwee...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • SRG-APP-000089

    Group
  • SRG-APP-000089

    Group
  • Exchange must have Audit record parameters set.

    Log files help establish a history of activities, and can be useful in detecting attack attempts. This item declares the fields that must be available in the audit log file in order to adequately r...
    Rule Low Severity
  • SRG-APP-000111

    Group
  • Exchange must have Queue monitoring configured with threshold and action.

    Monitors are automated "process watchers" that respond to performance changes, and can be useful in detecting outages and alerting administrators where attention is needed. Exchange has built-in mo...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Exchange application directory must be protected from unauthorized access.

    Default product installations may provide more generous access permissions than are necessary to run the application. By examining and tailoring access permissions to more closely provide the least...
    Rule Medium Severity
  • SRG-APP-000380

    Group
  • SRG-APP-000118

    Group
  • Exchange must have Audit data protected against unauthorized read access.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be consider...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Exchange must not send Customer Experience reports to Microsoft.

    It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and...
    Rule Medium Severity
  • SRG-APP-000119

    Group
  • Exchange must have Audit data protected against unauthorized modification.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be consider...
    Rule Medium Severity
  • SRG-APP-000120

    Group
  • Exchange must have audit data protected against unauthorized deletion.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be consider...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules