Skip to content

Microsoft Exchange 2013 Client Access Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000378

    Group
  • SRG-APP-000381

    Group
  • Exchange software must be monitored for unauthorized changes.

    Monitoring software files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system.
    Rule Medium Severity
  • SRG-APP-000383

    Group
  • SRG-APP-000391

    Group
  • Exchange Outlook Anywhere (OA) clients must use NTLM authentication to access email.

    Identification and authentication provide the foundation for access control. Access to email services applications requires NTLM authentication. Outlook Anywhere, if authorized for use by the site,...
    Rule Medium Severity
  • SRG-APP-000431

    Group
  • Exchange software must be installed on a separate partition from the OS.

    In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subseque...
    Rule Medium Severity
  • SRG-APP-000435

    Group
  • Exchange must provide redundancy.

    Load balancing is a way to manage which Exchange servers receive traffic. Load balancing helps distribute incoming client connections over a variety of endpoints. This ensures that no one endpoint ...
    Rule Medium Severity
  • SRG-APP-000439

    Group
  • Exchange OWA must use https.

    Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered.
    Rule High Severity
  • SRG-APP-000440

    Group
  • SRG-APP-000456

    Group
  • Exchange must have the most current, approved service pack installed.

    Failure to install the most current Exchange service pack leaves a system vulnerable to exploitation. Current service packs correct known security and system vulnerabilities.
    Rule Medium Severity
  • SRG-APP-000516

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules