Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • Exch-1-002

    <GroupDescription></GroupDescription>
    Group
  • Encryption must be used for RPC client access.

    &lt;VulnDiscussion&gt;This setting controls whether client machines are forced to use secure channels to communicate with the server. If this feat...
    Rule Medium Severity
  • Exch-1-005

    <GroupDescription></GroupDescription>
    Group
  • The Microsoft Exchange IMAP4 service must be disabled.

    &lt;VulnDiscussion&gt;The IMAP4 protocol is not approved for use within the DoD. It uses a clear text based user name and password and does not sup...
    Rule Medium Severity
  • Exch-1-008

    <GroupDescription></GroupDescription>
    Group
  • The Microsoft Exchange POP3 service must be disabled.

    &lt;VulnDiscussion&gt;The POP3 protocol is not approved for use within the DoD. It uses a clear text based user name and password and does not supp...
    Rule Medium Severity
  • Exch-1-103

    <GroupDescription></GroupDescription>
    Group
  • The Public Folder virtual directory must be removed if not in use by the site.

    &lt;VulnDiscussion&gt;To reduce the vectors through which a server can be attacked, unneeded application components should be disabled or removed. ...
    Rule Low Severity
  • Exch-1-202

    <GroupDescription></GroupDescription>
    Group
  • Web email must use standard ports protocols.

    &lt;VulnDiscussion&gt;PPSM standard defined ports and protocols must be used for all Exchange services. The standard port for HTTP connections is ...
    Rule Medium Severity
  • Exch-1-203

    <GroupDescription></GroupDescription>
    Group
  • Encryption must be used for OWA access.

    &lt;VulnDiscussion&gt;This setting controls whether client machines should be forced to use secure channels to communicate with this virtual direct...
    Rule Medium Severity
  • Exch-1-205

    <GroupDescription></GroupDescription>
    Group
  • Forms-based Authentication must not be enabled.

    &lt;VulnDiscussion&gt;Identification and Authentication provide the foundation for access control. Access to email services applications in the Do...
    Rule Medium Severity
  • Exch-2-817

    <GroupDescription></GroupDescription>
    Group
  • Email Diagnostic log level must be set to low or lowest level.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...
    Rule Medium Severity
  • Exch-1-402

    <GroupDescription></GroupDescription>
    Group
  • Outlook Anywhere (OA) clients must use NTLM authentication to access email.

    &lt;VulnDiscussion&gt;Identification and Authentication provide the foundation for access control. Access to email services applications require N...
    Rule Medium Severity
  • Exch-2-820

    <GroupDescription></GroupDescription>
    Group
  • The Send Fatal Errors to Microsoft must be disabled.

    &lt;VulnDiscussion&gt;Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjust...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules