Skip to content

Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000213

    <GroupDescription></GroupDescription>
    Group
  • Exchange internet-facing send connectors must specify a smart host.

    &lt;VulnDiscussion&gt;When identifying a "Smart Host" for the email environment, a logical Send connector is the preferred method. A Smart Host ac...
    Rule Medium Severity
  • SRG-APP-000231

    <GroupDescription></GroupDescription>
    Group
  • Exchange mailboxes must be retained until backups are complete.

    &lt;VulnDiscussion&gt;Backup and recovery procedures are an important part of overall system availability and integrity. Complete backups reduce th...
    Rule Medium Severity
  • SRG-APP-000231

    <GroupDescription></GroupDescription>
    Group
  • Exchange email forwarding must be restricted.

    &lt;VulnDiscussion&gt;Auto-forwarded email accounts do not meet the requirement for digital signature and encryption of Controlled Unclassified Inf...
    Rule Medium Severity
  • SRG-APP-000231

    <GroupDescription></GroupDescription>
    Group
  • Exchange email-forwarding SMTP domains must be restricted.

    &lt;VulnDiscussion&gt;Auto-forwarded email accounts do not meet the requirement for digital signature and encryption of Controlled Unclassified Inf...
    Rule Medium Severity
  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • Exchange mailbox stores must mount at startup.

    &lt;VulnDiscussion&gt;Administrator responsibilities include the ability to react to unplanned maintenance tasks or emergency situations that may r...
    Rule Low Severity
  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • Exchange mail quota settings must not restrict receiving mail.

    &lt;VulnDiscussion&gt;Mail quota settings control the maximum sizes of a user's mailbox and the system's response if these limits are exceeded. Mai...
    Rule Low Severity
  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • Exchange mail quota settings must not restrict sending mail.

    &lt;VulnDiscussion&gt;Mail quota settings control the maximum sizes of a user's mailbox and the system's response if these limits are exceeded. Mai...
    Rule Low Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • Exchange Message size restrictions must be controlled on Receive connectors.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. For message size res...
    Rule Low Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The Exchange Receive Connector Maximum Hop Count must be 60.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. This setting control...
    Rule Low Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The Exchange send connector connections count must be limited.

    &lt;VulnDiscussion&gt;The Exchange Send connector setting controls the maximum number of simultaneous outbound connections allowed for a given SMTP...
    Rule Low Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • Exchange receive connectors must control the number of recipients per message.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. This configuration...
    Rule Low Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • Exchange message size restrictions must be controlled on send connectors.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. For message size res...
    Rule Low Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The Exchange global inbound message size must be controlled.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. Message size limits ...
    Rule Low Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The Exchange global outbound message size must be controlled.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. Message size limits ...
    Rule Low Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The Exchange Outbound Connection Limit per Domain Count must be controlled.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. This configuration c...
    Rule Low Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The Exchange Outbound Connection Timeout must be 10 minutes or less.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. This configuration c...
    Rule Low Severity
  • SRG-APP-000261

    <GroupDescription></GroupDescription>
    Group
  • Exchange servers must have an approved DOD email-aware virus protection software installed.

    &lt;VulnDiscussion&gt;With the proliferation of trojans, viruses, and spam attaching themselves to email messages (or attachments), it is necessary...
    Rule High Severity
  • SRG-APP-000261

    <GroupDescription></GroupDescription>
    Group
  • Exchange internal receive connectors must not allow anonymous connections.

    &lt;VulnDiscussion&gt;This control is used to limit the servers that may use this server as a relay. If a Simple Mail Transport Protocol (SMTP) sen...
    Rule Medium Severity
  • SRG-APP-000261

    <GroupDescription></GroupDescription>
    Group
  • Exchange external/internet-bound automated response messages must be disabled.

    &lt;VulnDiscussion&gt;Spam originators, in an effort to refine mailing lists, sometimes monitor transmissions for automated bounce-back messages. A...
    Rule Medium Severity
  • SRG-APP-000261

    <GroupDescription></GroupDescription>
    Group
  • Exchange must have anti-spam filtering installed.

    &lt;VulnDiscussion&gt;Originators of spam messages are constantly changing their techniques to defeat spam countermeasures; therefore, spam softwar...
    Rule Medium Severity
  • SRG-APP-000261

    <GroupDescription></GroupDescription>
    Group
  • Exchange must have anti-spam filtering enabled.

    &lt;VulnDiscussion&gt;Originators of spam messages are constantly changing their techniques to defeat spam countermeasures; therefore, spam softwar...
    Rule Medium Severity
  • SRG-APP-000261

    <GroupDescription></GroupDescription>
    Group
  • Exchange must have anti-spam filtering configured.

    &lt;VulnDiscussion&gt;Originators of spam messages are constantly changing their techniques to defeat spam countermeasures; therefore, spam softwar...
    Rule Medium Severity
  • SRG-APP-000261

    <GroupDescription></GroupDescription>
    Group
  • Exchange must not send automated replies to remote domains.

    &lt;VulnDiscussion&gt;Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An a...
    Rule Medium Severity
  • SRG-APP-000261

    <GroupDescription></GroupDescription>
    Group
  • The Exchange Global Recipient Count Limit must be set.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. The Global Recipient...
    Rule Low Severity
  • SRG-APP-000272

    <GroupDescription></GroupDescription>
    Group
  • Exchange anti-malware agent must be enabled and configured.

    &lt;VulnDiscussion&gt;Microsoft Exchange 2019 offers built-in anti-malware protection for messages going through the transport pipeline. When enabl...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules