Skip to content

Microsoft Exchange 2013 Mailbox Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Exchange Queue monitoring must be configured with threshold and action.

    <VulnDiscussion>Monitors are automated "process watchers" that respond to performance changes and can be useful in detecting outages and aler...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Exchange Send Fatal Errors to Microsoft must be disabled.

    &lt;VulnDiscussion&gt;It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objecti...
    Rule Medium Severity
  • SRG-APP-000118

    <GroupDescription></GroupDescription>
    Group
  • Exchange must protect audit data against unauthorized read access.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustm...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Exchange must not send Customer Experience reports to Microsoft.

    &lt;VulnDiscussion&gt;It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objecti...
    Rule Medium Severity
  • SRG-APP-000119

    <GroupDescription></GroupDescription>
    Group
  • Exchange must protect audit data against unauthorized access.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustm...
    Rule Medium Severity
  • SRG-APP-000120

    <GroupDescription></GroupDescription>
    Group
  • Exchange must protect audit data against unauthorized deletion.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustm...
    Rule Medium Severity
  • SRG-APP-000125

    <GroupDescription></GroupDescription>
    Group
  • Exchange Audit data must be on separate partitions.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustm...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • Exchange Local machine policy must require signed scripts.

    &lt;VulnDiscussion&gt;Scripts often provide a way for attackers to infiltrate a system, especially those downloaded from untrusted locations. By se...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The Exchange IMAP4 service must be disabled.

    &lt;VulnDiscussion&gt;The IMAP4 protocol is not approved for use within the DoD. It uses a clear-text-based user name and password and does not sup...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The Exchange POP3 service must be disabled.

    &lt;VulnDiscussion&gt;The POP3 protocol is not approved for use within the DoD. It uses a clear-text-based user name and password and does not supp...
    Rule Medium Severity
  • Exchange Mailbox databases must reside on a dedicated partition.

    &lt;VulnDiscussion&gt;In the same way that added security layers can provide a cumulative positive effect on security posture, multiple application...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules