Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000014

    Group
  • Exchange must use Encryption for OWA access.

    This setting controls whether client machines should be forced to use secure channels to communicate with this virtual directory. If this feature is enabled, clients will only be able to communicat...
    Rule Medium Severity
  • SRG-APP-000014

    Group
  • Exchange must have Forms-based Authentication disabled.

    Identification and Authentication provide the foundation for access control. Access to email services applications in the DoD requires authentication using DoD Public Key Infrastructure (PKI) certi...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • Exchange must have authenticated access set to Integrated Windows Authentication only.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., networks, web servers, and web porta...
    Rule Medium Severity
  • SRG-APP-000027

    Group
  • Exchange must have Administrator audit logging enabled.

    Unauthorized or malicious data changes can compromise the integrity and usefulness of the data. Automated attacks or malicious users with elevated privileges have the ability to affect change using...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • Exchange Servers must use approved DoD certificates.

    Server certificates are required for many security features in Exchange; without them the server cannot engage in many forms of secure communication. Failure to implement valid certificates makes i...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • Exchange ActiveSync (EAS) must only use certificate-based authentication to access email.

    Identification and Authentication provide the foundation for access control. For EAS to be used effectively on DoD networks, client certificate authentication must be used for communications betwee...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • Exchange must have IIS map client certificates to an approved certificate server.

    For EAS to be used effectively on DoD networks, client certificate authentication must be used for communications between the MEM and email server. Identification and Authentication provide the fou...
    Rule Medium Severity
  • SRG-APP-000089

    Group
  • Exchange Email Diagnostic log level must be set to lowest level.

    Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Diagnostic logging, however, characterist...
    Rule Medium Severity
  • SRG-APP-000089

    Group
  • Exchange must have Audit record parameters set.

    Log files help establish a history of activities, and can be useful in detecting attack attempts. This item declares the fields that must be available in the audit log file in order to adequately r...
    Rule Low Severity
  • SRG-APP-000111

    Group
  • Exchange must have Queue monitoring configured with threshold and action.

    Monitors are automated "process watchers" that respond to performance changes, and can be useful in detecting outages and alerting administrators where attention is needed. Exchange has built-in mo...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules