Microsoft Exchange 2013 Client Access Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX13-CA-000005
- Vuln IDs
-
- V-234765
- V-69715
- Rule IDs
-
- SV-234765r617236_rule
- SV-84337
Checks: C-37951r617234_chk
Open the Exchange Management Shell and enter the following command: Get-RpcClientAccess | Select Server, Name, EncryptionRequired If the value of EncryptionRequired is not set to True, this is a finding.
Fix: F-37914r617235_fix
Open the Exchange Management Shell and enter the following command: Set-RpcClientAccess -Server <ServerName> -EncryptionRequired $true
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX13-CA-000010
- Vuln IDs
-
- V-234766
- V-69717
- Rule IDs
-
- SV-234766r617239_rule
- SV-84339
Checks: C-37952r617237_chk
Open a Windows PowerShell and enter the following command: Import-module webadministration Enter cd “IIS:” At the IIS: prompt, enter cd Sites At the Sites: prompt, enter cd “Default Web Site” At the “Default Web Site”: prompt, enter cd owa At the IIS:\Sites\Default Web Site\owa>: prompt, enter Get-WebConfigurationProperty -filter /system.webServer/security/access -name sslflags If the value returned is not Ssl,Ssl128, this is a finding.
Fix: F-37915r617238_fix
Configure the OWA site to require SSL port 443.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX13-CA-000015
- Vuln IDs
-
- V-234767
- V-69719
- Rule IDs
-
- SV-234767r617242_rule
- SV-84341
Checks: C-37953r617240_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select ServerName, Name, Identity, FormsAuthentication If the value of FormsAuthentication is not set to False, this is a finding.
Fix: F-37916r617241_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity <'IdentityName'> -FormsAuthentication $false Note <IdentityName> must be in quotes. Example for the Identity Name: <ServerName>\owa (Default Web site) Restart the ISS service.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX13-CA-000020
- Vuln IDs
-
- V-234768
- V-69721
- Rule IDs
-
- SV-234768r617245_rule
- SV-84343
Checks: C-37954r617243_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select ServerName, Name,Identity,*Authentication If the value of WindowsAuthentication is not set to True, this is a finding.
Fix: F-37917r617244_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity '<IdentityName>' -WindowsAuthentication $true Note: The <IdentityName> value must be in quotes. Example for the Identity Name: <ServerName>\owa (Default Web site)
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- EX13-CA-000025
- Vuln IDs
-
- V-234769
- V-69723
- Rule IDs
-
- SV-234769r617248_rule
- SV-84345
Checks: C-37955r617246_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select Name, Identity, AdminAuditLogEnabled If the value of AdminAuditLogEnabled is not set to True, this is a finding.
Fix: F-37918r617247_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogEnabled $true
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX13-CA-000030
- Vuln IDs
-
- V-234770
- V-69725
- Rule IDs
-
- SV-234770r617251_rule
- SV-84347
Checks: C-37956r617249_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeCertificate | Select CertificateDomains, issuer If the value of CertificateDomains does not indicate it is issued by the DoD, this is a finding.
Fix: F-37919r617250_fix
Remove the non-DoD certificate and import the correct DoD certificates.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX13-CA-000035
- Vuln IDs
-
- V-234771
- V-69727
- Rule IDs
-
- SV-234771r617254_rule
- SV-84349
Checks: C-37957r617252_chk
Open the Exchange Management Shell and enter the following commands: Get-ActiveSyncVirtualDirectory | Select Name, Identity Get-ActiveSyncVirtualDirectory -Identity '<ServerName>Microsoft-Server-ActiveSync (Default Web Site)' | fl BasicAuthEnabled, WindowsAuthEnabled, ClientCertAuth, WebSiteSSLEnabled, InternalAuthenticationMethods, ExternalAuthenticationMethods Note: The <ServerName>Microsoft-Server-ActiveSync (Default Web Site) value must be in quotes. The command should return the following: BasicAuthEnabled : False WindowsAuthEnabled : False ClientCertAuth : Required WebSiteSSLEnabled : True InternalAuthenticationMethods : {Certificate} ExternalAuthenticationMethods : {Certificate} If the values above are not returned, this is a finding.
Fix: F-37920r617253_fix
Open the Exchange Management Shell and enter the following command: Set-ActiveSyncVirtualDirectory -Identity ‘<ServerName>\Microsoft-Server-ActiveSync (Default Web Site)’ -BasicAuthEnabled $False -WindowsAuthEnabled $False -ClientCertAuth ‘Required’ -WebSites-InternalAuthenticationMethods ‘Certificate’ -ExternalAuthenticationMethods ‘Certificate’ Note: The <ServerName>Microsoft-Server-ActiveSync (Default Web Site) value must be in quotes.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX13-CA-000040
- Vuln IDs
-
- V-234772
- V-69729
- Rule IDs
-
- SV-234772r617257_rule
- SV-84351
Checks: C-37958r617255_chk
Open a command window and enter the following commands: cd c:\Windows\SysWOW64\inetsrv Appcmd.exe list config "Default Web Site/Microsoft-Server-ActiveSync" -section:clientCertificateMappingAuthentication If clientCertificateMappingAuthentication Enabled is not set to True, this is a finding.
Fix: F-37921r617256_fix
Open a command window and enter the following commands: cd C:\Windows\SysWOW64\InetSrv appcmd unlock config /section:clientCertificateMappingAuthentication appcmd set config "Default Web Site/Microsoft-Server-ActiveSync" -section:clientCertificateMappingAuthentication /enabled:true
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- EX13-CA-000045
- Vuln IDs
-
- V-234773
- V-69731
- Rule IDs
-
- SV-234773r617260_rule
- SV-84353
Checks: C-37959r617258_chk
Open the Exchange Management Shell and enter the following command: Get-EventLogLevel If any Diagnostic EventLogLevel is not set to Lowest, this is a finding.
Fix: F-37922r617259_fix
Open the Exchange Management Shell and enter the following command: Set-EventLogLevel -Identity <'IdentityName\EventlogName'> -Level Lowest Note: The <IdentityName\EventlogName> value must be in quotes.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- EX13-CA-000050
- Vuln IDs
-
- V-234774
- V-69733
- Rule IDs
-
- SV-234774r617263_rule
- SV-84355
Checks: C-37960r617261_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select Name, Identity, AdminAuditLogParameters If the value of AdminAuditLogParameters is not set to {*}, this is a finding. Note: The value of {*} indicates all parameters are being audited.
Fix: F-37923r617262_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogParameters *
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- EX13-CA-000055
- Vuln IDs
-
- V-234775
- V-69735
- Rule IDs
-
- SV-234775r617266_rule
- SV-84357
Checks: C-37961r617264_chk
Note: If a third-party application is performing monitoring functions, the reviewer should verify the application is monitoring correctly and mark the vulnerability not applicable. Open the Exchange Management Shell and enter the following command: perfmon In the left pane, expand and navigate Performance >> Data Collector Sets >> User Defined. If no sets are defined or queues are not being monitored, this is a finding.
Fix: F-37924r617265_fix
Open the Exchange Management Shell and enter the following command: perfmon In the left pane, navigate to and select Performance >> Data Collector Sets >> User Defined. Right-click, navigate to, and configure User Defined >> New >> Data Collector Set to use user-defined data collection for monitoring the queues.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX13-CA-000060
- Vuln IDs
-
- V-234776
- V-69737
- Rule IDs
-
- SV-234776r617269_rule
- SV-84359
Checks: C-37962r617267_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeServer –status | Select Name, Identity, ErrorReportingEnabled For each Identity, if the value of ErrorReportingEnabled is not set to False, this is a finding.
Fix: F-37925r617268_fix
Open the Exchange Management Shell and enter the following command: Set-ExchangeServer -Identity <IdentityName> -ErrorReportingEnabled $false Note: The <IdentityName> value must be in quotes. Repeat the procedure for each Identity.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- EX13-CA-000065
- Vuln IDs
-
- V-234777
- V-69739
- Rule IDs
-
- SV-234777r811159_rule
- SV-84361
Checks: C-37963r617270_chk
Review the Email Domain Security Plan (EDSP). Determine the authorized groups or users that should have read access to the audit data. If any group or user has read access to the audit data that is not documented in the EDSP, this is a finding.
Fix: F-37926r811158_fix
Update the EDSP. Navigate to the location of the audit data. By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging Restrict any unauthorized groups' or users' read access to the audit logs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX13-CA-000070
- Vuln IDs
-
- V-234778
- V-69741
- Rule IDs
-
- SV-234778r617275_rule
- SV-84363
Checks: C-37964r617273_chk
Open the Exchange Management Shell and enter the following command: Get-OrganizationConfig | Select Name, Identity, CustomerFeedbackEnabled If the value for CustomerFeedbackEnabled is not set to False, this is a finding.
Fix: F-37927r617274_fix
Open the Exchange Management Shell and enter the following command: Set-OrganizationConfig -CustomerFeedbackEnabled $false
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- EX13-CA-000075
- Vuln IDs
-
- V-234779
- V-69743
- Rule IDs
-
- SV-234779r811161_rule
- SV-84365
Checks: C-37965r617276_chk
Review the Email Domain Security Plan (EDSP). Determine the authorized groups or users that should have access to the audit data. If any group or user has modify privileges for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-37928r811160_fix
Update the EDSP. Navigate to the location of the audit data. By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging Restrict any unauthorized groups' or users' modify permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- EX13-CA-000080
- Vuln IDs
-
- V-234780
- V-69745
- Rule IDs
-
- SV-234780r811163_rule
- SV-84367
Checks: C-37966r617279_chk
Review the Email Domain Security Plan (EDSP). Determine the authorized groups or users that should have delete permissions for the audit data. If any group or user has delete permissions for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-37929r811162_fix
Update the EDSP. Navigate to the location of the audit data. By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging Restrict any unauthorized groups' or users' delete permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- EX13-CA-000085
- Vuln IDs
-
- V-234781
- V-69747
- Rule IDs
-
- SV-234781r617284_rule
- SV-84369
Checks: C-37967r617282_chk
Review the Email Domain Security Plan (EDSP). Determine the audit logs' assigned partition. Note: By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging. If the log files are not on a separate partition from the application, this is a finding.
Fix: F-37930r617283_fix
Update the EDSP. Configure the audit log location to be on a partition drive separate from the application.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- EX13-CA-000090
- Vuln IDs
-
- V-234782
- V-69751
- Rule IDs
-
- SV-234782r617287_rule
- SV-84373
Checks: C-37968r617285_chk
Open the Exchange Management Shell and enter the following command: Get-ExecutionPolicy If the value returned is not RemoteSigned, this is a finding.
Fix: F-37931r617286_fix
Open the Exchange Management Shell and enter the following command: Set-ExecutionPolicy RemoteSigned
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX13-CA-000095
- Vuln IDs
-
- V-234783
- V-69753
- Rule IDs
-
- SV-234783r617290_rule
- SV-84375
Checks: C-37969r617288_chk
Open the Windows PowerShell and enter the following command: Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangeIMAP4' | Select Start Note: The hklm:\system\currentcontrolset\services\MSExchangeIMAP4 value must be in quotes. If the value of Start is not set to 4, this is a finding.
Fix: F-37932r617289_fix
Open the Windows PowerShell and enter the following command: services.msc Navigate to and double-click on Microsoft Exchange IMAP4 Backend. Click on the General tab. In the Startup Type: dropdown, select Disabled. Click the OK button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX13-CA-000100
- Vuln IDs
-
- V-234784
- V-69755
- Rule IDs
-
- SV-234784r617293_rule
- SV-84377
Checks: C-37970r617291_chk
Open the Windows PowerShell and enter the following command: Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangePOP3' | Select Start Note: The hklm:\system\currentcontrolset\services\MSExchangePOP3 value must be in quotes. If the value of Start is not set to 4, this is a finding.
Fix: F-37933r617292_fix
Open the Windows PowerShell and enter the following command: services.msc Navigate to and double-click on Microsoft Exchange POP3 Backend. Click on the General tab. In the Startup Type: dropdown, select Disabled. Click the OK button.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EX13-CA-000105
- Vuln IDs
-
- V-234785
- V-69757
- Rule IDs
-
- SV-234785r617296_rule
- SV-84379
Checks: C-37971r617294_chk
Review the Email Domain Security Plan (EDSP). Determine if public folders are being used. Open the Exchange Management Shell and enter the following command: Get-PublicFolder | Select Name, Identity Note: The value returns a root directory and subdirectories. If public folders are not in use and directories exist or are being used and are not documented in the EDSP, this is a finding.
Fix: F-37934r617295_fix
Open the Exchange Management Shell and enter the following command: Remove-PublicFolder -Identity 'IdentityName' -Recurse:$True Note: This command deletes the public folder Directory Folder and all its child public folders.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EX13-CA-000110
- Vuln IDs
-
- V-234786
- V-69759
- Rule IDs
-
- SV-234786r617299_rule
- SV-84381
Checks: C-37972r617297_chk
Open the Exchange Management Shell and enter the following command: Get-ActiveSyncVirtualDirectory | Select Server, Name, Identity, Path If the value of Path (the actual directory path) exists, this is a finding.
Fix: F-37935r617298_fix
Open an Exchange Command Shell and enter the following command: Remove-ActiveSyncVirtualDirectory <ServerName>\Microsoft-Server-ActiveSync -Confirm $true Note: The physical directory must also be deleted.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- EX13-CA-000115
- Vuln IDs
-
- V-234787
- V-69761
- Rule IDs
-
- SV-234787r617302_rule
- SV-84383
Checks: C-37973r617300_chk
Review the Email Domain Security Plan (EDSP). Determine the authorized groups and users that have access to the Exchange application directories. Verify the access permissions on the directory match the access permissions listed in the EDSP. If any group or user has different access permissions than those listed in the EDSP, this is a finding. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
Fix: F-37936r617301_fix
Update the EDSP. Remove or modify the group or user access permissions.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- EX13-CA-000120
- Vuln IDs
-
- V-234788
- V-69763
- Rule IDs
-
- SV-234788r617305_rule
- SV-84385
Checks: C-37974r617303_chk
Review the Email Domain Security Plan (EDSP). Review the application software baseline procedures and implementation artifacts. Note the list of files and directories included in the baseline procedure for completeness. If an email software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Fix: F-37937r617304_fix
Update the EDSP. Implement the email software baseline process.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- EX13-CA-000125
- Vuln IDs
-
- V-234789
- V-69765
- Rule IDs
-
- SV-234789r617308_rule
- SV-84387
Checks: C-37975r617306_chk
Review the Email Domain Security Plan (EDSP). Determine whether the site monitors system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on servers for unauthorized changes against a baseline on a weekly basis. If software files are not monitored for unauthorized changes on a weekly basis, this is a finding. Note: A properly configured HBSS Policy Auditor File Integrity Monitor (FIM) module will meet the requirement for file integrity checking. The Asset module within HBSS does not meet this requirement.
Fix: F-37938r617307_fix
Update the EDSP. Monitor the software files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on Exchange servers for unauthorized changes against a baseline on a weekly basis. Use an approved DoD monitoring tool.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- EX13-CA-000130
- Vuln IDs
-
- V-234790
- V-69767
- Rule IDs
-
- SV-234790r617311_rule
- SV-84389
Checks: C-37976r617309_chk
Review the Email Domain Security Plan (EDSP). Note: Required services will vary between organizations and will vary depending on the role of the individual system. Organizations will develop their own list of services, which will be documented and justified with the ISSO. The site’s list will be provided for any security review. Services that are common to multiple systems can be addressed in one document. Exceptions for individual systems should be identified separately by system. Open a Windows PowerShell and enter the following command: Get-Service | Where-Object {$_.status -eq 'running'} The command returns a list of installed services and the status of that service. If the site has not documented the services required for its system(s), this is a finding. If any undocumented or unnecessary services are running, this is a finding.
Fix: F-37939r617310_fix
Update the EDSP with the services required for the system to function. Remove or disable any services that are not required.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- EX13-CA-000135
- Vuln IDs
-
- V-234791
- V-69769
- Rule IDs
-
- SV-234791r617314_rule
- SV-84391
Checks: C-37977r617312_chk
Open the Exchange Management Shell and enter the following command: Get-OutlookAnywhere | Select Name, Identity, InternalClientAuthenticationMethod, ExternalClientAuthenticationMethod If the value of InternalClientAuthenticationMethod and the value of ExternalClientAuthenticationMethod is not set to NTLM, this is a finding.
Fix: F-37940r617313_fix
Open the Exchange Management Shell and enter the following commands: For InternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -InternalClientAuthenticationMethod NTLM For ExternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -ExternalClientAuthenticationMethod NTLM
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- EX13-CA-000140
- Vuln IDs
-
- V-234792
- V-69771
- Rule IDs
-
- SV-234792r617317_rule
- SV-84393
Checks: C-37978r617315_chk
Review the Email Domain Security Plan (EDSP). Determine where the directory Exchange is installed. Open Windows Explorer. Navigate to the directory or partition where Exchange is installed. If Exchange resides on a directory or partition other than that of the OS and does not have other applications installed (unless approved by the ISSO), this is not a finding.
Fix: F-37941r617316_fix
Update the EDSP. Install Exchange on a dedicated application directory or partition separate than that of the OS.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX13-CA-000145
- Vuln IDs
-
- V-234793
- V-69773
- Rule IDs
-
- SV-234793r617320_rule
- SV-84395
Checks: C-37979r617318_chk
Review the Email Domain Security Plan (EDSP). Determine if the Exchange Servers are using redundancy. Get-ClientAccessServer | Select Name, Site If the value returned is not at least two CAS servers, this is a finding.
Fix: F-37942r617319_fix
Update the EDSP. Configure two or more CAS servers for load balancing.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- EX13-CA-000150
- Vuln IDs
-
- V-234794
- V-69775
- Rule IDs
-
- SV-234794r617323_rule
- SV-84397
Checks: C-37980r617321_chk
If the exchange server does not provide OWA services, this check is Not Applicable. If the exchange server does not provide external OWA services, https does not need to be assigned to external URL, it may be blank. Open the Exchange Management Shell and enter the following command: Get-OWAVirtualDirectory | Select Name, Identity, ExternalUrl, InternalUrl If the value returned is not both ExternalUrl and InternalUrl and these are not set to https://, this is a finding.
Fix: F-37943r617322_fix
Open the Exchange Management Shell and enter the following command: Set-OWAVirtualDirectory -Identity '<IdentityName>\owa (Default Web Site)' -ExternalUrl 'https://URL' -InternalUrl 'https://URL' Note: The <IdentityName>\owa (default web site) value must be in quotes.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- EX13-CA-000155
- Vuln IDs
-
- V-234795
- V-69777
- Rule IDs
-
- SV-234795r617326_rule
- SV-84399
Checks: C-37981r617324_chk
Open the Exchange Management Shell and enter the following command: Get-OWAVirtualDirectory | Select Name, Identity, SmimeEnabled If the value returned is not set to True, this is a finding.
Fix: F-37944r617325_fix
Open the Exchange Management Shell and enter the following command: Set-OWAVirtualDirectory -Identity '<IdentityName>\owa (Default Web Site)' -SmimeEnabled $true Note: The <ServerName>\owa (Default Web Site) value must be in quotes.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- EX13-CA-000160
- Vuln IDs
-
- V-234796
- V-69779
- Rule IDs
-
- SV-234796r811165_rule
- SV-84401
Checks: C-37982r811164_chk
Determine the most current, approved service pack. Open the Exchange Management Shell and enter the following command: Get-ExchangeServer | fl Name, AdminDisplayVersion For each Name from the previous command, enter the following command: Invoke-Command -ComputerName [Name] -ScriptBlock {Get-Command Exsetup.exe | ForEach-Object {$_.FileversionInfo}} If the version displayed does not reflect the most current, approved service pack, this is a finding.
Fix: F-37945r617328_fix
Install the most current, approved service pack.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- EX13-CA-000165
- Vuln IDs
-
- V-234797
- V-69781
- Rule IDs
-
- SV-234797r617332_rule
- SV-84403
Checks: C-37983r617330_chk
Open a Windows PowerShell Module and enter the following commands: Get-Website | Select Name Get-WebBinding -Name <'WebSiteName'> | Format-List If the Web binding values returned are not on standard port 80 and 81 for HTTP connections or port 443 and 444 for HTTPS connections, this is a finding. Repeat the process for each website.
Fix: F-37946r617331_fix
Configure web ports to be 80, 81 and 443, 444, as specified by PPSM standards.