Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Exchange send connector connections count must be limited.
<VulnDiscussion>This setting controls the maximum number of simultaneous outbound connections allowed for a given SMTP Connector and can be u...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
Exchange message size restrictions must be controlled on Send connectors.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. For message size res...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
Exchange send connectors delivery retries must be controlled.
<VulnDiscussion>This setting controls the rate at which delivery attempts from the home domain are retried and user notifications are issued ...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
Exchange receive connectors must be clearly named.
<VulnDiscussion>For receive connectors, unclear naming as to direction and purpose increases risk that messages may not flow as intended, tro...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
Exchange receive connectors must control the number of recipients chunked on a single message.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. For message size res...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
The Exchange internet receive connector connections count must be set to default.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. This configuration c...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
Exchange Message size restrictions must be controlled on receive connectors.
<VulnDiscussion>Email system availability depends in part on best practices strategies for setting tuning configurations. For message size re...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Active hyperlinks in messages from non .mil domains must be rendered unclickable.
<VulnDiscussion>Active hyperlinks within an email are susceptible to attacks of malicious software or malware. The hyperlink could lead to a ...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange messages with a blank sender field must be rejected.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange messages with a blank sender field must be filtered.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange filtered messages must be archived.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange sender filter must block unaccepted domains.
<VulnDiscussion>Spam origination sites and other sources of suspected email-borne malware have the ability to corrupt, compromise, or otherwi...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange nonexistent recipients must not be blocked.
<VulnDiscussion>Spam originators, in an effort to refine mailing lists, sometimes use a technique where they first create fictitious names an...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Sender Reputation filter must be enabled.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Sender Reputation filter must identify the spam block level.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange Attachment filtering must remove undesirable attachments by file type.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Spam Evaluation filter must be enabled.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages may be eliminated...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Block List service provider must be identified.
<VulnDiscussion>Block List filtering is a sanitization process performed on email messages prior to their arrival at the destination mailbox....Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Simple Mail Transfer Protocol (SMTP) Sender filter must be enabled.
<VulnDiscussion>Email system availability depends in part on best practices strategies for setting tuning configurations. Careful tuning redu...Rule Medium Severity -
The Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List Connection filter must be enabled.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduc...Rule Medium Severity -
Exchange messages with a malformed From address must be rejected.
<VulnDiscussion>Sender Identification (SID) is an email anti-spam sanitization process. Sender ID uses DNS MX record lookups to verify the Si...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Recipient filter must be enabled.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduc...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange tarpitting interval must be set.
<VulnDiscussion>Tarpitting is the practice of artificially delaying server responses for specific Simple Mail Transfer Protocol (SMTP) commun...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange internal Receive connectors must not allow anonymous connections.
<VulnDiscussion>This control is used to limit the servers that may use this server as a relay. If a Simple Mail Transport Protocol (SMTP) sen...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List entries must be empty.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduc...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange must have anti-spam filtering installed.
<VulnDiscussion>Originators of spam messages are constantly changing their techniques to defeat spam countermeasures; therefore, spam softwar...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.