No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
Exch-2-817
<GroupDescription></GroupDescription>Group -
Email Diagnostic log level must be set to low or lowest level.
<VulnDiscussion>Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...Rule Medium Severity -
Exch-2-820
<GroupDescription></GroupDescription>Group -
The Send Fatal Errors to Microsoft must be disabled.
<VulnDiscussion>Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...Rule Medium Severity -
Exch-2-826
<GroupDescription></GroupDescription>Group -
Audit data must be protected against unauthorized access.
<VulnDiscussion>Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...Rule Medium Severity -
Exch-2-828
<GroupDescription></GroupDescription>Group -
Exchange application directory must be protected from unauthorized access.
<VulnDiscussion>Default product installations may provide more generous access permissions than are necessary to run the application. By exa...Rule Medium Severity -
Exch-2-831
<GroupDescription></GroupDescription>Group -
Exchange must not send Customer Experience reports to Microsoft.
<VulnDiscussion>Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...Rule Medium Severity -
Exch-2-839
<GroupDescription></GroupDescription>Group -
Audit data must be on separate partitions.
<VulnDiscussion>Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...Rule Medium Severity -
Exch-2-842
<GroupDescription></GroupDescription>Group -
Queue monitoring must be configured with threshold and action.
<VulnDiscussion>Monitors are automated “process watchers” that respond to performance changes, and can be useful in detecting outages and ale...Rule Medium Severity -
Exch-3-003
<GroupDescription></GroupDescription>Group -
Email software must be monitored for change on INFOCON frequency schedule.
<VulnDiscussion>The INFOCON system provides a framework within which the Commander USSTRATCOM regional commanders, service chiefs, base/post/...Rule Medium Severity -
Exch-3-006
<GroupDescription></GroupDescription>Group -
Exchange software baseline copy must exist.
<VulnDiscussion>Exchange software, as with other application software installed on a host system, must be included in a system baseline recor...Rule Medium Severity -
Exch-2-005
<GroupDescription></GroupDescription>Group -
Accepted domains must be configured.
<VulnDiscussion>Exchange may be configured to accept email for multiple domain names. This setting identifies the domains for which the serve...Rule Medium Severity -
Exch-3-804
<GroupDescription></GroupDescription>Group -
Services must be documented and unnecessary services must be removed or disabled.
<VulnDiscussion>Unneeded, but running, services offer attackers an enhanced attack profile, and attackers are constantly watching to discove...Rule Medium Severity -
Exch-3-807
<GroupDescription></GroupDescription>Group -
Email application must not share a partition with another application.
<VulnDiscussion>In the same way that added security layers can provide a cumulative positive effect on security posture, multiple application...Rule Medium Severity -
Exch-2-014
<GroupDescription></GroupDescription>Group -
Servers must use approved DoD certificates.
<VulnDiscussion>Server certificates are required for many security features in Exchange; without them the server cannot engage in many forms ...Rule Medium Severity -
Exch-2-015
<GroupDescription></GroupDescription>Group -
Global outbound message size must be controlled.
<VulnDiscussion>Email system availability depends in part on best practices strategies for setting tuning configurations. Message size limits...Rule Low Severity -
Exch-3-814
<GroupDescription></GroupDescription>Group -
The current, approved service pack must be installed.
<VulnDiscussion>Failure to install the most current Exchange service pack leaves a system vulnerable to exploitation. Current service packs c...Rule Medium Severity -
Exch-2-333
<GroupDescription></GroupDescription>Group -
Messages with malformed from address must be rejected.
<VulnDiscussion>Sender Identification (SID) is an email anti-spam sanitization process. Sender ID uses DNS MX record lookups to verify the S...Rule Medium Severity -
Exch-2-019
<GroupDescription></GroupDescription>Group -
Local machine policy must require signed scripts.
<VulnDiscussion>Scripts often provide a way for attackers to infiltrate a system, especially those downloaded from untrusted locations. By ...Rule Medium Severity -
Exch-2-330
<GroupDescription></GroupDescription>Group -
Block list service provider must be identified.
<VulnDiscussion>Block List filtering is a sanitization process performed on email messages prior to their arrival at the destination mailbox....Rule Medium Severity -
Exch-2-200
<GroupDescription></GroupDescription>Group -
SMTP automated banner response must not reveal server details.
<VulnDiscussion>Automated connection responses occur as a result of FTP or Telnet connections, when connecting to those services. They report...Rule Medium Severity -
Exch-2-201
<GroupDescription></GroupDescription>Group -
Outbound Connection Limit per Domain Count must be controlled.
<VulnDiscussion>Email system availability depends in part on best practices strategies for setting tuning configurations. This configuration ...Rule Low Severity -
Exch-2-327
<GroupDescription></GroupDescription>Group -
SPAM evaluation filter must be enabled.
<VulnDiscussion>By performing filtering at the perimeter, up to 90% of SPAM, malware, and other undesirable messages may be eliminated from t...Rule Medium Severity -
Exch-2-302
<GroupDescription></GroupDescription>Group -
Attachment filtering must remove undesirable attachments by file type.
<VulnDiscussion>By performing filtering at the perimeter, up to 90 percent of spam, malware, and other undesirable messages are eliminated fr...Rule Medium Severity -
Exch-2-324
<GroupDescription></GroupDescription>Group -
Sender reputation filter must identify SPAM block level.
<VulnDiscussion>By performing filtering at the perimeter, up to 90% of SPAM, malware, and other undesirable messages are eliminated from the ...Rule Medium Severity -
Exch-2-321
<GroupDescription></GroupDescription>Group -
Sender reputation filter must be enabled.
<VulnDiscussion>By performing filtering at the perimeter, up to 90% of SPAM, malware, and other undesirable messages are eliminated from the ...Rule Medium Severity -
Exch-2-305
<GroupDescription></GroupDescription>Group -
Non-existent recipients must not be blocked.
<VulnDiscussion>SPAM originators, in an effort to refine mailing lists, sometimes use a technique where they first create fictitious names, a...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.