Skip to content

Microsoft Exchange 2013 Client Access Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000125

    Group
  • SRG-APP-000014

    Group
  • Exchange must use Encryption for RPC client access.

    This setting controls whether client machines are forced to use secure channels to communicate with the server. If this feature is enabled, clients will only be able to communicate with the server ...
    Rule Medium Severity
  • Exchange must have Forms-based Authentication disabled.

    Identification and Authentication provide the foundation for access control. Access to email services applications in the DoD requires authentication using DoD Public Key Infrastructure (PKI) certi...
    Rule Medium Severity
  • Exchange must have Administrator audit logging enabled.

    Unauthorized or malicious data changes can compromise the integrity and usefulness of the data. Automated attacks or malicious users with elevated privileges have the ability to affect change using...
    Rule Medium Severity
  • Exchange must have IIS map client certificates to an approved certificate server.

    For EAS to be used effectively on DoD networks, client certificate authentication must be used for communications between the MEM and email server. Identification and Authentication provide the fou...
    Rule Medium Severity
  • Exchange Email Diagnostic log level must be set to lowest level.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Diagnostic logging, however, characterist...
    Rule Medium Severity
  • Exchange must have Send Fatal Errors to Microsoft disabled.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. This setting enables an automated log ent...
    Rule Medium Severity
  • Exchange must have Audit data on separate partitions.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be consider...
    Rule Low Severity
  • Exchange must have the Microsoft Active Sync directory removed.

    To reduce the vectors through which a server can be attacked, unneeded application components should be disabled or removed. By default, a virtual directory is installed for Active Sync, and the Ex...
    Rule Low Severity
  • Exchange services must be documented and unnecessary services must be removed or disabled.

    Unneeded but running services offer attackers an enhanced attack profile, and attackers are constantly watching to discover open ports with running services. By analyzing and disabling unneeded ser...
    Rule Medium Severity
  • Exchange OWA must have S/MIME Certificates enabled.

    Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requiremen...
    Rule Medium Severity
  • Exchange must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    Configuring the application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baselin...
    Rule Medium Severity
  • SRG-APP-000014

    Group
  • Exchange must use Encryption for OWA access.

    This setting controls whether client machines should be forced to use secure channels to communicate with this virtual directory. If this feature is enabled, clients will only be able to communicat...
    Rule Medium Severity
  • SRG-APP-000014

    Group
  • SRG-APP-000033

    Group
  • Exchange must have authenticated access set to Integrated Windows Authentication only.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., networks, web servers, and web porta...
    Rule Medium Severity
  • SRG-APP-000027

    Group
  • SRG-APP-000033

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules