Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000120

    <GroupDescription></GroupDescription>
    Group
  • Exchange audit data must be protected against unauthorized access for deletion.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustm...
    Rule Medium Severity
  • SRG-APP-000125

    <GroupDescription></GroupDescription>
    Group
  • Exchange audit data must be on separate partitions.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustm...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • Exchange local machine policy must require signed scripts.

    &lt;VulnDiscussion&gt;Scripts often provide a way for attackers to infiltrate a system, especially scripts downloaded from untrusted locations. By ...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Exchange must not send customer experience reports to Microsoft.

    &lt;VulnDiscussion&gt;It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objecti...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Exchange Send Fatal Errors to Microsoft must be disabled.

    &lt;VulnDiscussion&gt;It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objecti...
    Rule Medium Severity
  • SRG-APP-000211

    <GroupDescription></GroupDescription>
    Group
  • Exchange queue database must reside on a dedicated partition.

    &lt;VulnDiscussion&gt;In the same way that added security layers can provide a cumulative positive effect on security posture, multiple application...
    Rule Medium Severity
  • SRG-APP-000213

    <GroupDescription></GroupDescription>
    Group
  • Exchange internet-facing send connectors must specify a Smart Host.

    &lt;VulnDiscussion&gt;When identifying a "Smart Host" for the email environment, a logical send connector is the preferred method. A Smart Host ac...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • Exchange internal send connectors must use domain security (mutual authentication Transport Layer Security).

    &lt;VulnDiscussion&gt;The Simple Mail Transfer Protocol (SMTP) connector is used by Exchange to send and receive messages from server to server. Se...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • Exchange internet-facing receive connectors must offer Transport Layer Security (TLS) before using basic authentication.

    &lt;VulnDiscussion&gt;Sending unencrypted email over the internet increases the risk that messages can be intercepted or altered. TLS is designed t...
    Rule Medium Severity
  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • More than one Edge server must be deployed.

    &lt;VulnDiscussion&gt;To ensure hostile insiders are unable to easily commit DoS attacks and reduce the effectiveness of mail flow throughout the e...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules