Skip to content

Microsoft Exchange 2013 Mailbox Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Exchange Send Fatal Errors to Microsoft must be disabled.

    It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and...
    Rule Medium Severity
  • SRG-APP-000118

    Group
  • SRG-APP-000141

    Group
  • Exchange must not send Customer Experience reports to Microsoft.

    It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and...
    Rule Medium Severity
  • SRG-APP-000119

    Group
  • SRG-APP-000120

    Group
  • Exchange must protect audit data against unauthorized deletion.

    Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be considere...
    Rule Medium Severity
  • SRG-APP-000125

    Group
  • Exchange Audit data must be on separate partitions.

    Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be considere...
    Rule Medium Severity
  • SRG-APP-000131

    Group
  • Exchange Local machine policy must require signed scripts.

    Scripts often provide a way for attackers to infiltrate a system, especially those downloaded from untrusted locations. By setting machine policy to prevent unauthorized script executions, unantici...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • The Exchange IMAP4 service must be disabled.

    The IMAP4 protocol is not approved for use within the DoD. It uses a clear-text-based user name and password and does not support the DoD standard for PKI for email access. User name and password c...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • The Exchange POP3 service must be disabled.

    The POP3 protocol is not approved for use within the DoD. It uses a clear-text-based user name and password and does not support the DoD standard for PKI for email access. User name and password co...
    Rule Medium Severity
  • SRG-APP-000213

    Group
  • Exchange Internet-facing Send connectors must specify a Smart Host.

    When identifying a "Smart Host" for the email environment, a logical Send connector is the preferred method. A Smart Host acts as an Internet-facing concentrator for other email servers. Appropria...
    Rule Medium Severity
  • SRG-APP-000219

    Group
  • SRG-APP-000219

    Group
  • Exchange internal Receive connectors must use Domain Security (mutual authentication Transport Layer Security).

    The Simple Mail Transfer Protocol (SMTP) connector is used by Exchange to send and receive messages from server to server. There are several controls that work together to provide security between ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules