Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000119

    <GroupDescription></GroupDescription>
    Group
  • Exchange audit data must be protected against unauthorized access for modification.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustm...
    Rule Medium Severity
  • SRG-APP-000120

    <GroupDescription></GroupDescription>
    Group
  • Exchange audit data must be protected against unauthorized access for deletion.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustm...
    Rule Medium Severity
  • SRG-APP-000125

    <GroupDescription></GroupDescription>
    Group
  • Exchange audit data must be on separate partitions.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustm...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The Exchange local machine policy must require signed scripts.

    &lt;VulnDiscussion&gt;Scripts, especially those downloaded from untrusted locations, often provide a way for attackers to infiltrate a system. By s...
    Rule Medium Severity
  • SRG-APP-000213

    <GroupDescription></GroupDescription>
    Group
  • Exchange Internet-facing Send connectors must specify a Smart Host.

    &lt;VulnDiscussion&gt;When identifying a "Smart Host" for the email environment, a logical Send connector is the preferred method. A Smart Host ac...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • Exchange internal Send connectors must use domain security (mutual authentication Transport Layer Security).

    &lt;VulnDiscussion&gt;The Simple Mail Transfer Protocol (SMTP) connector is used by Exchange to send and receive messages from server to server. Se...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • Exchange Internet-facing Receive connectors must offer Transport Layer Security (TLS) before using basic authentication.

    &lt;VulnDiscussion&gt;Sending unencrypted email over the Internet increases the risk that messages can be intercepted or altered. TLS is designed t...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • Exchange Outbound Connection Timeout must be 10 minutes or less.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. This configuration c...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • Exchange Outbound Connection Limit per Domain Count must be controlled.

    &lt;VulnDiscussion&gt;Email system availability depends in part on best practice strategies for setting tuning configurations. This configuration c...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • Exchange Send connector connections count must be limited.

    &lt;VulnDiscussion&gt;This setting controls the maximum number of simultaneous outbound connections allowed for a given SMTP Connector and can be u...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules