No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000391
Group -
Exchange Outlook Anywhere (OA) clients must use NTLM authentication to access email.
Identification and authentication provide the foundation for access control. Access to email services applications require NTLM authentication. Outlook Anywhere, if authorized for use by the site, ...Rule Medium Severity -
SRG-APP-000431
Group -
The Exchange Email application must not share a partition with another application.
In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subseque...Rule Medium Severity -
SRG-APP-000435
Group -
Exchange must not send delivery reports to remote domains.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure tha...Rule Medium Severity -
SRG-APP-000435
Group -
Exchange must not send nondelivery reports to remote domains.
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure tha...Rule Medium Severity -
SRG-APP-000435
Group -
The Exchange SMTP automated banner response must not reveal server details.
Automated connection responses occur as a result of FTP or Telnet connections, when connecting to those services. They report a successful connection by greeting the connecting client and stating t...Rule Medium Severity -
SRG-APP-000435
Group -
Exchange must provide Mailbox databases in a highly available and redundant configuration.
To protect Exchange Server mailbox databases and the data they contain by configuring Mailbox servers and databases for high availability and site resilience. A database availability group (DAG) i...Rule Medium Severity -
SRG-APP-000456
Group -
Exchange must have the most current, approved service pack installed.
Failure to install the most current Exchange service pack leaves a system vulnerable to exploitation. Current service packs correct known security and system vulnerabilities.Rule Medium Severity -
SRG-APP-000516
Group -
Exchange Public Folder Stores must mount at startup.
Administrator responsibilities include the ability to react to unplanned maintenance tasks or emergency situations that may require Public Folder Store data manipulation. Occasionally, there may be...Rule Low Severity -
SRG-APP-000278
Group -
The applications built-in Malware Agent must be disabled.
Malicious code protection mechanisms include, but are not limited, to, anti-virus and malware detection software. In order to minimize potential negative impact to the organization that can be caus...Rule Medium Severity -
SRG-APP-000278
Group -
A DoD-approved third party Exchange-aware malicious code protection application must be implemented.
Malicious code protection mechanisms include, but are not limited, to, anti-virus and malware detection software. In order to minimize potential negative impact to the organization that can be caus...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.