Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000141

    Group
  • Exchange must have Send Fatal Errors to Microsoft disabled.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. This setting enables an automated log ent...
    Rule Medium Severity
  • SRG-APP-000118

    Group
  • Exchange must have Audit data protected against unauthorized read access.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be consider...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Exchange must not send Customer Experience reports to Microsoft.

    It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and...
    Rule Medium Severity
  • SRG-APP-000119

    Group
  • Exchange must have Audit data protected against unauthorized modification.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be consider...
    Rule Medium Severity
  • SRG-APP-000120

    Group
  • Exchange must have audit data protected against unauthorized deletion.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be consider...
    Rule Medium Severity
  • SRG-APP-000125

    Group
  • Exchange must have Audit data on separate partitions.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Audit log content must always be consider...
    Rule Low Severity
  • SRG-APP-000131

    Group
  • Exchange Local machine policy must require signed scripts.

    Scripts often provide a way for attackers to infiltrate a system, especially those downloaded from untrusted locations. By setting machine policy to prevent unauthorized script executions, unantici...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Exchange IMAP4 service must be disabled.

    The IMAP4 protocol is not approved for use within the DoD. It uses a clear text-based user name and password and does not support the DoD standard for PKI for email access. User name and password c...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Exchange POP3 service must be disabled.

    The POP3 protocol is not approved for use within the DoD. It uses a clear text based user name and password and does not support the DoD standard for PKI for email access. User name and password co...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Exchange must have the Public Folder virtual directory removed if not in use by the site.

    To reduce the vectors through which a server can be attacked, unneeded application components should be disabled or removed. By default, a virtual directory is installed for Public Folders. If an ...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules