Skip to content

Microsoft Exchange 2013 Mailbox Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Exchange SMTP automated banner response must not reveal server details.

    Automated connection responses occur as a result of FTP or Telnet connections, when connecting to those services. They report a successful connection by greeting the connecting client and stating t...
    Rule Medium Severity
  • Exchange Public Folder Stores must mount at startup.

    Administrator responsibilities include the ability to react to unplanned maintenance tasks or emergency situations that may require Public Folder Store data manipulation. Occasionally, there may be...
    Rule Low Severity
  • Exchange Servers must use approved DoD certificates.

    Server certificates are required for many security features in Exchange; without them, the server cannot engage in many forms of secure communication. Failure to implement valid certificates make...
    Rule Medium Severity
  • SRG-APP-000038

    Group
  • Exchange Message Tracking Logging must be enabled.

    A message tracking log provides a detailed log of all message activity as messages are transferred to and from a computer running Exchange. If events are not recorded, it may be difficult or impos...
    Rule Medium Severity
  • SRG-APP-000111

    Group
  • SRG-APP-000211

    Group
  • Exchange auto-forwarding email to remote domains must be disabled or restricted.

    Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Verify Aut...
    Rule Medium Severity
  • SRG-APP-000027

    Group
  • SRG-APP-000033

    Group
  • SRG-APP-000089

    Group
  • SRG-APP-000098

    Group
  • SRG-APP-000089

    Group
  • SRG-APP-000089

    Group
  • Exchange Audit record parameters must be set.

    Log files help establish a history of activities, and can be useful in detecting attack attempts. This item declares the fields that must be available in the audit log file in order to adequately r...
    Rule Low Severity
  • SRG-APP-000098

    Group
  • Exchange Circular Logging must be disabled.

    Logging provides a history of events performed and can also provide evidence of tampering or attack. Failure to create and preserve logs adds to the risk that suspicious events may go unnoticed and...
    Rule Low Severity
  • SRG-APP-000098

    Group
  • Exchange Email Subject Line logging must be disabled.

    Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. When “message tracking” is enabled, only t...
    Rule Medium Severity
  • SRG-APP-000141

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules