MS Exchange 2013 Edge Transport Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Exchange Receive connectors must be clearly named.
<VulnDiscussion>For receive connectors, unclear naming as to direction and purpose increases risk that messages may not flow as intended, tro...Rule Low Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
Exchange Receive connectors must control the number of recipients chunked on a single message.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. For message size res...Rule Low Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
Exchange Receive connectors must control the number of recipients per message.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. This configuration...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
The Exchange Internet Receive connector connections count must be set to default.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. This configuration c...Rule Low Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
Exchange Message size restrictions must be controlled on Receive connectors.
<VulnDiscussion>Email system availability depends in part on best practices strategies for setting tuning configurations. For message size re...Rule Low Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange messages with a blank sender field must be rejected.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange messages with a blank sender field must be filtered.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Sender filter must block unaccepted domains.
<VulnDiscussion>Spam origination sites and other sources of suspected email-borne malware have the ability to corrupt, compromise, or otherwi...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange nonexistent recipients must not be blocked.
<VulnDiscussion>Spam originators, in an effort to refine mailing lists, sometimes use a technique where they first create fictitious names an...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Sender Reputation filter must be enabled.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Sender Reputation filter must identify the spam block level.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange Attachment filtering must remove undesirable attachments by file type.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Spam Evaluation filter must be enabled.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages may be eliminated...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Block List service provider must be identified.
<VulnDiscussion>Block List filtering is a sanitization process performed on email messages prior to their arrival at the destination mailbox....Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange messages with malformed From address must be rejected.
<VulnDiscussion>Sender Identification (SID) is an email antispam sanitization process. Sender ID uses DNS MX record lookups to verify the Sim...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Recipient filter must be enabled.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduc...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange tarpitting interval must be set.
<VulnDiscussion>Tarpitting is the practice of artificially delaying server responses for specific Simple Mail Transfer Protocol (SMTP) commun...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange internal Receive connectors must not allow anonymous connections.
<VulnDiscussion>This control is used to limit the servers that may use this server as a relay. If a Simple Mail Transport Protocol (SMTP) sen...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List entries must be empty.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduc...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List Connection filter must be enabled.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduc...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Simple Mail Transfer Protocol (SMTP) Sender filter must be enabled.
<VulnDiscussion>Email system availability depends in part on best practices strategies for setting tuning configurations. Careful tuning redu...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange must have antispam filtering installed.
<VulnDiscussion>Originators of spam messages are constantly changing their techniques in order to defeat spam countermeasures; therefore, spa...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange must have antispam filtering enabled.
<VulnDiscussion>Originators of spam messages are constantly changing their techniques in order to defeat spam countermeasures; therefore, spa...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange must have antispam filtering configured.
<VulnDiscussion>Originators of spam messages are constantly changing their techniques in order to defeat spam countermeasures; therefore, spa...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange Sender Identification Framework must be enabled.
<VulnDiscussion>Email is only as secure as the recipient. When the recipient is an email server accepting inbound messages, authenticating th...Rule Medium Severity -
SRG-APP-000378
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.