Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000033

    Group
  • Exchange must have authenticated access set to integrated Windows authentication only.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD systems (e.g., networks, web servers, and web porta...
    Rule Medium Severity
  • SRG-APP-000038

    Group
  • Exchange auto-forwarding email to remote domains must be disabled or restricted.

    Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Verify Aut...
    Rule Medium Severity
  • SRG-APP-000089

    Group
  • Exchange connectivity logging must be enabled.

    A connectivity log is a record of the SMTP connection activity of the outbound message delivery queues to the destination Mailbox server, smart host, or domain. Connectivity logging is available on...
    Rule Medium Severity
  • SRG-APP-000089

    Group
  • The Exchange email diagnostic log level must be set to the lowest level.

    Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. Diagnostic logging, however, characteristi...
    Rule Medium Severity
  • SRG-APP-000089

    Group
  • Exchange audit record parameters must be set.

    Log files help establish a history of activities and can be useful in detecting attack attempts. This item declares the fields that must be available in the audit log file to adequately research ev...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules