No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000261
Group -
Exchange must have antispam filtering configured.
Originators of spam messages are constantly changing their techniques in order to defeat spam countermeasures; therefore, spam software must be constantly updated to address the changing threat. A ...Rule Medium Severity -
SRG-APP-000261
Group -
Exchange must not send automated replies to remote domains.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Remote use...Rule Medium Severity -
SRG-APP-000261
Group -
Exchange servers must have an approved DoD email-aware virus protection software installed.
With the proliferation of trojans, viruses, and spam attaching themselves to email messages (or attachments), it is necessary to have capable email-aware antivirus (AV) products to scan messages an...Rule High Severity -
SRG-APP-000261
Group -
The Exchange Global Recipient Count Limit must be set.
Email system availability depends in part on best practice strategies for setting tuning configurations. The Global Recipient Count Limit field is used to control the maximum number of recipients t...Rule Low Severity -
SRG-APP-000295
Group -
The Exchange Receive connector timeout must be limited.
Email system availability depends in part on best practice strategies for setting tuning. This configuration controls the number of idle minutes before the connection is dropped. It works in conjun...Rule Low Severity -
SRG-APP-000367
Group -
The Exchange Public Store storage quota must be limited.
This setting controls the maximum sizes of a public folder and the system’s response if these limits are exceeded. There are two available controls and the system response when the quota has been e...Rule Low Severity -
SRG-APP-000378
Group -
The Exchange application directory must be protected from unauthorized access.
Default product installations may provide more generous access permissions than are necessary to run the application. By examining and tailoring access permissions to more closely provide the least...Rule Medium Severity -
SRG-APP-000380
Group -
An Exchange software baseline copy must exist.
Exchange software, as with other application software installed on a host system, must be included in a system baseline record and periodically reviewed; otherwise, unauthorized changes to the soft...Rule Medium Severity -
SRG-APP-000381
Group -
Exchange software must be monitored for unauthorized changes.
Monitoring software files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system.Rule Medium Severity -
SRG-APP-000383
Group -
Exchange services must be documented and unnecessary services must be removed or disabled.
Unneeded but running services offer attackers an enhanced attack profile, and attackers are constantly watching to discover open ports with running services. By analyzing and disabling unneeded ser...Rule Medium Severity -
SRG-APP-000391
Group -
Exchange Outlook Anywhere (OA) clients must use NTLM authentication to access email.
Identification and authentication provide the foundation for access control. Access to email services applications require NTLM authentication. Outlook Anywhere, if authorized for use by the site, ...Rule Medium Severity -
SRG-APP-000431
Group -
The Exchange Email application must not share a partition with another application.
In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subseque...Rule Medium Severity -
SRG-APP-000435
Group -
Exchange must not send delivery reports to remote domains.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure tha...Rule Medium Severity -
SRG-APP-000435
Group -
Exchange must not send nondelivery reports to remote domains.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure tha...Rule Medium Severity -
SRG-APP-000435
Group -
The Exchange SMTP automated banner response must not reveal server details.
Automated connection responses occur as a result of FTP or Telnet connections, when connecting to those services. They report a successful connection by greeting the connecting client and stating t...Rule Medium Severity -
SRG-APP-000435
Group -
Exchange must provide Mailbox databases in a highly available and redundant configuration.
To protect Exchange Server mailbox databases and the data they contain by configuring Mailbox servers and databases for high availability and site resilience. A database availability group (DAG) i...Rule Medium Severity -
SRG-APP-000456
Group -
Exchange must have the most current, approved service pack installed.
Failure to install the most current Exchange service pack leaves a system vulnerable to exploitation. Current service packs correct known security and system vulnerabilities.Rule Medium Severity -
SRG-APP-000516
Group -
Exchange Public Folder Stores must mount at startup.
Administrator responsibilities include the ability to react to unplanned maintenance tasks or emergency situations that may require Public Folder Store data manipulation. Occasionally, there may be...Rule Low Severity -
SRG-APP-000278
Group -
The applications built-in Malware Agent must be disabled.
Malicious code protection mechanisms include, but are not limited, to, anti-virus and malware detection software. In order to minimize potential negative impact to the organization that can be caus...Rule Medium Severity -
SRG-APP-000278
Group -
A DoD-approved third party Exchange-aware malicious code protection application must be implemented.
Malicious code protection mechanisms include, but are not limited, to, anti-virus and malware detection software. In order to minimize potential negative impact to the organization that can be caus...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.