I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange must have antispam filtering configured.
<VulnDiscussion>Originators of spam messages are constantly changing their techniques in order to defeat spam countermeasures; therefore, spa...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange must not send automated replies to remote domains.
<VulnDiscussion>Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An a...Rule Medium Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
Exchange servers must have an approved DoD email-aware virus protection software installed.
<VulnDiscussion>With the proliferation of trojans, viruses, and spam attaching themselves to email messages (or attachments), it is necessary...Rule High Severity -
SRG-APP-000261
<GroupDescription></GroupDescription>Group -
The Exchange Global Recipient Count Limit must be set.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning configurations. The Global Recipient...Rule Low Severity -
SRG-APP-000295
<GroupDescription></GroupDescription>Group -
The Exchange Receive connector timeout must be limited.
<VulnDiscussion>Email system availability depends in part on best practice strategies for setting tuning. This configuration controls the num...Rule Low Severity -
SRG-APP-000367
<GroupDescription></GroupDescription>Group -
The Exchange Public Store storage quota must be limited.
<VulnDiscussion>This setting controls the maximum sizes of a public folder and the system’s response if these limits are exceeded. There are ...Rule Low Severity -
SRG-APP-000378
<GroupDescription></GroupDescription>Group -
The Exchange application directory must be protected from unauthorized access.
<VulnDiscussion>Default product installations may provide more generous access permissions than are necessary to run the application. By exam...Rule Medium Severity -
SRG-APP-000380
<GroupDescription></GroupDescription>Group -
An Exchange software baseline copy must exist.
<VulnDiscussion>Exchange software, as with other application software installed on a host system, must be included in a system baseline recor...Rule Medium Severity -
SRG-APP-000381
<GroupDescription></GroupDescription>Group -
Exchange software must be monitored for unauthorized changes.
<VulnDiscussion>Monitoring software files for changes against a baseline on a regular basis may help detect the possible introduction of mali...Rule Medium Severity -
SRG-APP-000383
<GroupDescription></GroupDescription>Group -
Exchange services must be documented and unnecessary services must be removed or disabled.
<VulnDiscussion>Unneeded but running services offer attackers an enhanced attack profile, and attackers are constantly watching to discover o...Rule Medium Severity -
SRG-APP-000391
<GroupDescription></GroupDescription>Group -
Exchange Outlook Anywhere (OA) clients must use NTLM authentication to access email.
<VulnDiscussion>Identification and authentication provide the foundation for access control. Access to email services applications require NT...Rule Medium Severity -
SRG-APP-000431
<GroupDescription></GroupDescription>Group -
The Exchange Email application must not share a partition with another application.
<VulnDiscussion>In the same way that added security layers can provide a cumulative positive effect on security posture, multiple application...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
Exchange must not send delivery reports to remote domains.
<VulnDiscussion>Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An a...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
Exchange must not send nondelivery reports to remote domains.
<VulnDiscussion>Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An a...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
The Exchange SMTP automated banner response must not reveal server details.
<VulnDiscussion>Automated connection responses occur as a result of FTP or Telnet connections, when connecting to those services. They report...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
Exchange must provide Mailbox databases in a highly available and redundant configuration.
<VulnDiscussion>To protect Exchange Server mailbox databases and the data they contain by configuring Mailbox servers and databases for high ...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
Exchange must have the most current, approved service pack installed.
<VulnDiscussion>Failure to install the most current Exchange service pack leaves a system vulnerable to exploitation. Current service packs c...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Exchange Public Folder Stores must mount at startup.
<VulnDiscussion>Administrator responsibilities include the ability to react to unplanned maintenance tasks or emergency situations that may r...Rule Low Severity -
SRG-APP-000278
<GroupDescription></GroupDescription>Group -
The applications built-in Malware Agent must be disabled.
<VulnDiscussion>Malicious code protection mechanisms include, but are not limited, to, anti-virus and malware detection software. In order to...Rule Medium Severity -
SRG-APP-000278
<GroupDescription></GroupDescription>Group -
A DoD-approved third party Exchange-aware malicious code protection application must be implemented.
<VulnDiscussion>Malicious code protection mechanisms include, but are not limited, to, anti-virus and malware detection software. In order to...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.