Skip to content

Microsoft Exchange 2013 Client Access Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Exchange must have Queue monitoring configured with threshold and action.

    <VulnDiscussion>Monitors are automated "process watchers" that respond to performance changes, and can be useful in detecting outages and ale...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Exchange application directory must be protected from unauthorized access.

    &lt;VulnDiscussion&gt;Default product installations may provide more generous access permissions than are necessary to run the application. By exam...
    Rule Medium Severity
  • SRG-APP-000380

    <GroupDescription></GroupDescription>
    Group
  • Exchange must have Send Fatal Errors to Microsoft disabled.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...
    Rule Medium Severity
  • SRG-APP-000118

    <GroupDescription></GroupDescription>
    Group
  • Exchange must have Audit data protected against unauthorized read access.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Exchange must not send Customer Experience reports to Microsoft.

    &lt;VulnDiscussion&gt;It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objecti...
    Rule Medium Severity
  • SRG-APP-000119

    <GroupDescription></GroupDescription>
    Group
  • Exchange must have Audit data protected against unauthorized modification.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...
    Rule Medium Severity
  • SRG-APP-000120

    <GroupDescription></GroupDescription>
    Group
  • Exchange must have audit data protected against unauthorized deletion.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...
    Rule Medium Severity
  • Exchange software baseline copy must exist.

    &lt;VulnDiscussion&gt;Exchange software, as with other application software installed on a host system, must be included in a system baseline recor...
    Rule Medium Severity
  • Exchange must have Audit data on separate partitions.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...
    Rule Low Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • Exchange Local machine policy must require signed scripts.

    &lt;VulnDiscussion&gt;Scripts often provide a way for attackers to infiltrate a system, especially those downloaded from untrusted locations. By se...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Exchange IMAP4 service must be disabled.

    &lt;VulnDiscussion&gt;The IMAP4 protocol is not approved for use within the DoD. It uses a clear text-based user name and password and does not sup...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules