Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-80637 Medium checkfix Exchange Email Subject Line logging must be disabled.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- EX16-MB-000010
- Vuln IDs
-
- V-80623
- Rule IDs
-
- SV-95333r1_rule
Checks: C-80355r1_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select Name, AdminAuditLogEnabled If the value of "AdminAuditLogEnabled" is not set to "True", this is a finding.
Fix: F-87475r1_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogEnabled $true
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX16-MB-000020
- Vuln IDs
-
- V-80625
- Rule IDs
-
- SV-95335r1_rule
Checks: C-80359r1_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeCertificate | Select CertificateDomains, issuer If the value of "CertificateDomains" does not indicate it is issued by the DoD, this is a finding.
Fix: F-87479r1_fix
Remove the non-DoD certificate and import the correct DoD certificates.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- EX16-MB-000030
- Vuln IDs
-
- V-80627
- Rule IDs
-
- SV-95337r1_rule
Checks: C-80361r1_chk
Non-Enterprise Mail Check Content: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Identity, AutoForwardEnabled If the value of AutoForwardEnabled is not set to "False", this is a finding. Enterprise Mail Check Content: If the value of "AutoForwardEnabled" is set to "True", this is not a finding. and In the Exchange Management Shell, enter the following command: Get-RemoteDomain If the value of "RemoteDomain" is not set to ".mil" and/or ".gov" domain(s), this is a finding.
Fix: F-87481r1_fix
Non-Enterprise Mail Fix Text: Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AutoForwardEnabled $false Note: The <IdentityName> value must be in single quotes. Enterprise Mail Fix Text: New-RemoteDomain -Name <NewRemoteDomainName> -DomainName <SMTP Address> Note: <NewRemoteDomainName> must either be a .mil or .gov domain. Set-RemoteDomain -Identity <'RemoteDomainIdentity'> -AutoForwardEnabled $true Note: The <RemoteDomainIdentity> value must be in single quotes.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- EX16-MB-000040
- Vuln IDs
-
- V-80629
- Rule IDs
-
- SV-95339r1_rule
Checks: C-80363r1_chk
Open the Exchange Management Shell and enter the following command: Get-TransportService | Select Name, Identity, ConnectivityLogEnabled If the value of "ConnectivityLogEnabled" is not set to "True", this is a finding.
Fix: F-87483r1_fix
Open the Exchange Management Shell and enter the following command: Set-TransportService -Identity <'IdentityName'> -ConnectivityLogEnabled $true Note: The <IdentityName> value must be in single quotes.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- EX16-MB-000050
- Vuln IDs
-
- V-80631
- Rule IDs
-
- SV-95341r1_rule
Checks: C-80365r1_chk
Open the Exchange Management Shell and enter the following command: Get-EventLogLevel If the Diagnostic of any EventLevel is not set to "Lowest", this is a finding.
Fix: F-87485r1_fix
Open the Exchange Management Shell and enter the following command: Set-EventLogLevel -Identity <'IdentityName\EventlogName'> -Level Lowest Note: The <IdentityName\EventlogName> value must be in single quotes.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- EX16-MB-000060
- Vuln IDs
-
- V-80633
- Rule IDs
-
- SV-95343r1_rule
Checks: C-80367r1_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select AdminAuditLogParameters Note: The value of "*" indicates all parameters are being audited. If the value of "AdminAuditLogParameters" is not set to "*", this is a finding.
Fix: F-87487r1_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogParameters *
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- EX16-MB-000070
- Vuln IDs
-
- V-80635
- Rule IDs
-
- SV-95345r1_rule
Checks: C-80369r1_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, CircularLoggingEnabled If the value of "CircularLoggingEnabled" is not set to "False", this is a finding.
Fix: F-87489r1_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -CircularLoggingEnabled $false Note: The <IdentityName> value must be in single quotes.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- EX16-MB-000080
- Vuln IDs
-
- V-80637
- Rule IDs
-
- SV-95347r4_rule
Checks: C-80371r4_chk
Open the Exchange Management Shell and enter the following command: Get-TransportService | Select Name, Identity, MessageTrackingLogSubjectLoggingEnabled If the value of “MessageTrackingLogSubjectLoggingEnabled” is not set to “False”, this is a finding.
Fix: F-87491r2_fix
Open the Exchange Management Shell and enter the following command: Set-Transportservice -MessageTrackingLogSubjectLoggingEnabled $False
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- EX16-MB-000090
- Vuln IDs
-
- V-80639
- Rule IDs
-
- SV-95349r1_rule
Checks: C-80373r1_chk
Open the Exchange Management Shell and enter the following command: Get-Transportservice | Select Name, MessageTrackingLogEnabled If the value of MessageTrackingLogEnabled is not set to True, this is a finding.
Fix: F-87493r1_fix
Open the Exchange Management Shell and enter the following command: Set-Transportservice <IdentityName> -MessageTrackingLogEnabled $true Note: The <IdentityName> value must be in quotes.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- EX16-MB-000100
- Vuln IDs
-
- V-80641
- Rule IDs
-
- SV-95351r1_rule
Checks: C-80375r1_chk
Note: If a third-party application is performing monitoring functions, the reviewer should verify the application is monitoring correctly and mark the vulnerability not applicable (NA). Open the Exchange Management Shell and enter the following command: perfmon Get-MonitoringItemHelp -Identity <String> -Server <ServerIdParameter> If no sets are defined or queues are not being monitored, this is a finding.
Fix: F-87495r1_fix
Open the Exchange Management Shell and enter the following command: perfmon In the left pane, navigate to and select Performance >> Data Collector Sets >> User Defined. Right-click on, navigate to, and configure User Defined >> New >> Data Collector Sets and configure the system to use the data collection set for monitoring the queues.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX16-MB-000110
- Vuln IDs
-
- V-80643
- Rule IDs
-
- SV-95353r1_rule
Checks: C-80377r1_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeServer –status | Select Name, Identity, ErrorReportingEnabled For each Exchange Server, if the value of "ErrorReportingEnabled" is not set to "False", this is a finding.
Fix: F-87497r1_fix
Open the Exchange Management Shell and enter the following command: Set-ExchangeServer -Identity <'IdentityName'> -ErrorReportingEnabled $false Note: The <IdentityName> value must be in single quotes. Repeat the process for each Exchange Server.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- EX16-MB-000120
- Vuln IDs
-
- V-80645
- Rule IDs
-
- SV-95355r1_rule
Checks: C-80379r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups or users that should have "Read" access to the audit data. If any group or user has "Read" access to the audit data that is not documented in the EDSP, this is a finding.
Fix: F-87499r1_fix
Update the EDSP to specify the authorized groups or users that should have "Read" access to the audit data or verify that this information is documented by the organization. Restrict any unauthorized groups' or users' "Read" access to the audit logs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX16-MB-000130
- Vuln IDs
-
- V-80647
- Rule IDs
-
- SV-95357r1_rule
Checks: C-80381r1_chk
Open the Exchange Management Shell and enter the following command: Get-OrganizationConfig | Select CustomerFeedbackEnabled If the value for "CustomerFeedbackEnabled" is not set to "False", this is a finding.
Fix: F-87501r1_fix
Open the Exchange Management Shell and enter the following command: Set-OrganizationConfig -CustomerFeedbackEnabled $false
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- EX16-MB-000140
- Vuln IDs
-
- V-80649
- Rule IDs
-
- SV-95359r1_rule
Checks: C-80383r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups or users that should have access to the audit data. If any group or user has modify privileges for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-87503r1_fix
Update the EDSP to specify the authorized groups or users that should have access to the audit data or verify that this information is documented by the organization. Restrict any unauthorized groups' or users' modify permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- EX16-MB-000150
- Vuln IDs
-
- V-80651
- Rule IDs
-
- SV-95361r1_rule
Checks: C-80385r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups or users that should have "Delete" permissions for the audit data. If any group or user has "Delete" permissions for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-87505r1_fix
Update the EDSP to specify the authorized groups or users that should have "Delete" permissions for the audit data or verify that this information is documented by the organization. Restrict any unauthorized groups' or users' "Delete" permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- EX16-MB-000160
- Vuln IDs
-
- V-80653
- Rule IDs
-
- SV-95363r1_rule
Checks: C-80387r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the audit logs' assigned partition. By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging. If the log files are not on a separate partition from the application, this is a finding.
Fix: F-87507r1_fix
Update the EDSP to specify the audit logs' assigned partition or verify that this information is documented by the organization. Configure the audit log location to be on a partition drive separate from the application.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- EX16-MB-000170
- Vuln IDs
-
- V-80655
- Rule IDs
-
- SV-95365r1_rule
Checks: C-80389r1_chk
Open the Exchange Management Shell and enter the following command: Get-ExecutionPolicy If the value returned is not "RemoteSigned", this is a finding.
Fix: F-87509r1_fix
Open the Exchange Management Shell and enter the following command: Set-ExecutionPolicy RemoteSigned
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX16-MB-000180
- Vuln IDs
-
- V-80657
- Rule IDs
-
- SV-95367r1_rule
Checks: C-80391r1_chk
Open the Windows Power Shell and enter the following command: Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangeIMAP4' | Select Start Note: The hklm:\system\currentcontrolset\services\MSExchangeIMAP4 value must be in single quotes. If the value of "Start" is not set to "4", this is a finding.
Fix: F-87511r1_fix
Open the Windows Power Shell and enter the following command: services.msc Navigate to and double-click on "Microsoft Exchange IMAP4 Backend". Click on the "General" tab. In the "Startup Type" dropdown, select "Disabled". Click the "OK" button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX16-MB-000190
- Vuln IDs
-
- V-80659
- Rule IDs
-
- SV-95369r1_rule
Checks: C-80393r1_chk
Open the Windows Power Shell and enter the following command: Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangePOP3' | Select Start Note: The hklm:\system\currentcontrolset\services\MSExchangePOP3 value must be in single quotes. If the value of "Start" is not set to "4", this is a finding.
Fix: F-87513r1_fix
Open the Windows Power Shell and enter the following command: services.msc Navigate to and double-click on "Microsoft Exchange POP3 Backend". Click on the "General" tab. In the "Startup Type" dropdown, select "Disabled". Click the "OK" button.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- EX16-MB-000200
- Vuln IDs
-
- V-80661
- Rule IDs
-
- SV-95371r1_rule
Checks: C-80395r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the location where the Exchange Mailbox databases reside. Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, EdbFilePath Open Windows Explorer, navigate to the mailbox databases, and verify they are on a dedicated partition. If the mailbox databases are not on a dedicated partition, this is a finding.
Fix: F-87515r1_fix
Update the EDSP to specify the location where the Exchange Mailbox databases reside or verify that this information is documented by the organization. Configure the mailbox databases on a dedicated partition.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001178
- Version
- EX16-MB-000210
- Vuln IDs
-
- V-80663
- Rule IDs
-
- SV-95373r1_rule
Checks: C-80397r1_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, SmartHosts Identify the Internet-facing connectors. For each Send connector, if the value of "SmartHosts" does not return the Smart Host IP address, this is a finding.
Fix: F-87517r1_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -SmartHosts <'IP Address of Smart Host'> -DNSRoutingEnabled $false Note: The <IdentityName> and <IP Address of Smart Host> values must be in single quotes. Repeat the procedure for each Send connector.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- EX16-MB-000220
- Vuln IDs
-
- V-80665
- Rule IDs
-
- SV-95375r1_rule
Checks: C-80399r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, AuthMechanism For each Receive connector, if the value of "AuthMechanism" is not set to "Tls", this is a finding.
Fix: F-87519r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -AuthMechanism 'Tls' Note: The <IdentityName> value must be in single quotes. Repeat the procedures for each Receive connector.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- EX16-MB-000270
- Vuln IDs
-
- V-80667
- Rule IDs
-
- SV-95377r1_rule
Checks: C-80401r1_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase| Select Name, Identity, RetainDeletedItemsUntilBackup If the value of "RetainDeletedItemsUntilBackup" is not set to "True", this is a finding.
Fix: F-87521r1_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -RetainDeletedItemsUntilBackup $true Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- EX16-MB-000290
- Vuln IDs
-
- V-80669
- Rule IDs
-
- SV-95379r1_rule
Checks: C-80403r1_chk
Review the Email Domain Security Plan (EDSP). Determine any accounts that have been authorized to have email auto-forwarded. Note: If email auto-forwarding is not being used, this check is not applicable. . Open the Exchange Management Shell and enter the following commands: Get-Mailbox | Select Name, Identity, Filter If any user has a forwarding SMTP address and is not documented in the EDSP, this is a finding. Note: If no remote SMTP domain matching the mail-enabled user or contact that allows forwarding is configured for users identified with a forwarding address, this function will not work properly.
Fix: F-87523r1_fix
Update the EDSP. Open the Exchange Management Shell and enter the following command: Set-Mailbox -Identity <'IdentityName'> -ForwardingSMTPAdddress $null Note: The <IdentityName> value must be in quotes.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- EX16-MB-000300
- Vuln IDs
-
- V-80671
- Rule IDs
-
- SV-95381r1_rule
Checks: C-80405r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine any accounts that have been authorized to have email auto-forwarded. Note: If email auto-forwarding is not being used, this check is not applicable (NA). Open the Exchange Management Shell and enter the following commands: Get-RemoteDomain | Select Name, Identity, DomainName, AutoForwardEnabled If any domain for a user forwarding SMTP address is not documented in the EDSP, this is a finding. Note: If no remote SMTP domain matching the mail-enabled user or contact that allows forwarding is configured for users identified with a forwarding address, this function will not work properly.
Fix: F-87525r1_fix
Update the EDSP to specify any accounts that have been authorized to have email auto-forwarded or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set- RemoteDomain -Identity <RemoteDomainIdParameter>
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001094
- Version
- EX16-MB-000310
- Vuln IDs
-
- V-80673
- Rule IDs
-
- SV-95383r1_rule
Checks: C-80407r1_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, ProhibitSendReceiveQuota If the value of "ProhibitSendReceiveQuota" is not set to "Unlimited", this is a finding. or If the value of "ProhibitSendReceiveQuota" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87527r1_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -ProhibitSendReceiveQuota Unlimited Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001094
- Version
- EX16-MB-000320
- Vuln IDs
-
- V-80675
- Rule IDs
-
- SV-95385r1_rule
Checks: C-80409r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the value for the Prohibit Send Quota limit. Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, ProhibitSendQuota If the value of "ProhibitSendQuota" is not set to the site's Prohibit Send Quota limit, this is a finding.
Fix: F-87529r1_fix
Update the EDSP to specify the value for the Prohibit Send Quota limit or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -ProhibitSendQuota <'QuotaLimit'> Note: The <IdentityName> and <QuotaLimit> values must be in single quotes.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001094
- Version
- EX16-MB-000340
- Vuln IDs
-
- V-80677
- Rule IDs
-
- SV-95387r1_rule
Checks: C-80411r1_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, MountAtStartup If the value of "MountAtStartup" is not set to "True", this is a finding.
Fix: F-87531r1_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -MountAtStartup $true Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000350
- Vuln IDs
-
- V-80679
- Rule IDs
-
- SV-95389r1_rule
Checks: C-80413r1_chk
Review the EDSP or document that contains this information. Determine the global maximum message receive size and whether signoff with risk acceptance is documented for the Receive connector to have a different value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxMessageSize Identify Internet-facing connectors. For each Receive connector, if the value of "MaxMessageSize" is not the same as the global value, this is a finding. or If "MaxMessageSize" is set to a numeric value different from the global value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87533r1_fix
Update the EDSP to specify the global maximum message receive size and, if operationally necessary, to document signoff with risk acceptance for the Receive connector to have a different value, or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -MaxMessageSize <'MaxReceiveSize'> Note: The <IdentityName> and <MaxReceiveSize> values must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedure for each Receive connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000360
- Vuln IDs
-
- V-80681
- Rule IDs
-
- SV-95391r1_rule
Checks: C-80415r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the Maximum Recipients per Message value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxRecipientsPerMessage For each Receive connector, evaluate the "MaxRecipientsPerMessage" value. For each Receive connector, if the value of "MaxRecipientsPerMessage" is not set to "5000", this is a finding. or If the value of "MaxRecipientsPerMessage" is set to a value other than "5000" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87535r1_fix
Update the EDSP to specify the "MaxRecipientsPerMessage" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -MaxRecipientsPerMessage 5000 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedure for each Receive connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000380
- Vuln IDs
-
- V-80683
- Rule IDs
-
- SV-95393r1_rule
Checks: C-80417r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the Max Hop Count value for Receive connectors. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, MaxHopCount For each Receive connector, if the value of "MaxHopCount" is not set to "60", this is a finding. or If the value of "MaxHopCount" is set to a value other than "60" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87537r1_fix
Update the EDSP to specify the "MaxHopCount" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -MaxHopCount 60 or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedure for each Receive connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000410
- Vuln IDs
-
- V-80685
- Rule IDs
-
- SV-95395r1_rule
Checks: C-80419r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the maximum message send size. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, MaxMessageSize For each Send connector, if the value of "MaxMessageSize" is not the same as the global value, this is a finding. or If "MaxMessageSize" is set to a numeric value different from the maximum message send size value documented in the EDSP, this is a finding.
Fix: F-87539r1_fix
Update the EDSP to specify the "MaxMessageSize" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -MaxMessageSize <MaxSendSize> Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedures for each Send connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000420
- Vuln IDs
-
- V-80687
- Rule IDs
-
- SV-95397r1_rule
Checks: C-80421r1_chk
Review the Email Domain Security Plan (EDSP). Determine the value for SMTP Server Maximum Outbound Connections. Open the Exchange Management Shell and enter the following command: Get-TransportService | Select Name, Identity, MaxOutboundConnections If the value of "MaxOutboundConnections" is not set to "1000", this is a finding. or If "MaxOutboundConnections" is set to a value other than "1000" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87541r1_fix
Update the EDSP to specify the "MaxOutboundConnections" value. Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'IdentityName'> -MaxOutboundConnections 1000 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000430
- Vuln IDs
-
- V-80689
- Rule IDs
-
- SV-95399r1_rule
Checks: C-80423r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the global maximum message receive size. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Name, Identity, MaxReceiveSize If the value of "MaxReceiveSize" is not set to "10MB", this is a finding. or If "MaxReceiveSize" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87543r1_fix
Update the EDSP to specify the "MaxReceiveSize" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-TransportConfig -MaxReceiveSize 10MB or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000440
- Vuln IDs
-
- V-80691
- Rule IDs
-
- SV-95401r1_rule
Checks: C-80425r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the global maximum message send size. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Name, Identity, MaxSendSize If the value of "MaxSendSize" is not set to "10MB", this is a finding. or If "MaxSendSize" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87545r1_fix
Update the EDSP to specify the "MaxSendSize" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-TransportConfig -MaxSendSize 10MB or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000450
- Vuln IDs
-
- V-80693
- Rule IDs
-
- SV-95403r1_rule
Checks: C-80427r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the value for Maximum Outbound Domain Connections. Open the Exchange Management Shell and enter the following command: Get-TransportService | Select Name, Identity, MaxPerDomainOutboundConnections If the value of "MaxPerDomainOutboundConnections" is not set to "20", this is a finding. or If "MaxPerDomainOutboundConnections" is set to a value other than "20" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87547r1_fix
Update the EDSP to specify the "MaxPerDomainOutboundConnection" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-TransportService -Identity <'IdentityName'> -MaxPerDomainOutboundConnections 20 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000460
- Vuln IDs
-
- V-80695
- Rule IDs
-
- SV-95405r1_rule
Checks: C-80429r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, ConnectionInactivityTimeOut For each Send connector, if the value of "ConnectionInactivityTimeOut" is not set to "00:10:00", this is a finding. or If "ConnectionInactivityTimeOut" is set to a value other than "00:10:00" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87549r1_fix
Update the EDSP to specify the "ConnectionInactivityTimeOut" value. Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -ConnectionInactivityTimeOut 00:10:00 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000470
- Vuln IDs
-
- V-80697
- Rule IDs
-
- SV-95407r1_rule
Checks: C-80431r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, PermissionGroups For each Receive connector, if the value of "PermissionGroups" is "AnonymousUsers" for any receive connector, this is a finding.
Fix: F-87551r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -PermissionGroups and enter a valid value user group. Note: The <IdentityName> value must be in single quotes. Example: Set-ReceiveConnector -Identity <'IdentityName'> -PermissionGroups ExchangeUsers Repeat the procedures for each Receive connector.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000480
- Vuln IDs
-
- V-80699
- Rule IDs
-
- SV-95409r1_rule
Checks: C-80433r1_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, DomainName, Identity, AllowedOOFType If the value of "AllowedOOFType" is not set to "InternalLegacy", this is a finding.
Fix: F-87553r1_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AllowedOOFType 'InternalLegacy' Note: The <IdentityName> and InternalLegacy values must be in single quotes.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000490
- Vuln IDs
-
- V-80701
- Rule IDs
-
- SV-95411r1_rule
Checks: C-80435r1_chk
Review the Email Domain Security Plan (EDSP). Note: If using another DoD-approved antispam product for email or a DoD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable (NA). Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig | Format-Table Name,Enabled If no value is returned, this is a finding.
Fix: F-87555r1_fix
Update the EDSP with the anti-spam mechanism used. Install the AntiSpam module. Open the Exchange Management Shell and enter the following command: & $env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000500
- Vuln IDs
-
- V-80703
- Rule IDs
-
- SV-95413r1_rule
Checks: C-80437r1_chk
Review the Email Domain Security Plan (EDSP). Note: If using another DoD-approved anti-spam product for email or a DoD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable (NA). Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig | Format-Table Name,Enabled; Get-SenderFilterConfig | Format-Table Name,Enabled; Get-SenderIDConfig | Format-Table Name,Enabled; Get-SenderReputationConfig | Format-Table Name,Enabled If any of the following values returned are not set to "True", this is a finding: Set-ContentFilterConfig Set-SenderFilterConfig Set-SenderIDConfig Set-SenderReputationConfig
Fix: F-87557r1_fix
Update the EDSP with the anti-spam mechanism used. Open the Exchange Management Shell and enter the following command for any values that were not set to "True": Set-ContentFilterConfig -Enabled $true Set-SenderFilterConfig -Enabled $true Set-SenderIDConfig -Enabled $true Set-SenderReputationConfig -Enabled $true
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000510
- Vuln IDs
-
- V-80705
- Rule IDs
-
- SV-95415r1_rule
Checks: C-80439r1_chk
Review the Email Domain Security Plan (EDSP). Note: If using another DoD-approved antispam product for email or a DoD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable (NA). Determine the internal SMTP servers. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Format-List InternalSMTPServers If any internal SMTP server IP address returned does not reflect the list of accepted SMTP server IP addresses, this is a finding.
Fix: F-87559r1_fix
Note: Configure the IP addresses of every internal SMTP server. If the Mailbox server is the only SMTP server running the antispam agents, configure the IP address of the Mailbox server. Update the EDSP with the anti-spam mechanism used. Open the Exchange Management Shell and enter the following command: Single SMTP server address: Set-TransportConfig -InternalSMTPServers @{Add='<ip address1>'} Multiple SMTP server addresses: Set-TransportConfig -InternalSMTPServers @{Add='<ip address1>','<ip address2>'}
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000520
- Vuln IDs
-
- V-80707
- Rule IDs
-
- SV-95417r1_rule
Checks: C-80441r1_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, Identity, AutoReplyEnabled If the value of "AutoReplyEnabled" is not set to "False", this is a finding.
Fix: F-87561r1_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AutoReplyEnabled $false Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SI-8
- Severity
- H
- CCI
- CCI-001308
- Version
- EX16-MB-000530
- Vuln IDs
-
- V-80709
- Rule IDs
-
- SV-95419r1_rule
Checks: C-80443r1_chk
Review the Email Domain Security Plan (EDSP). Determine the anti-virus strategy. Verify the email-aware anti-virus scanner product is Exchange 2016 compatible and DoD approved. If email servers are using an email-aware anti-virus scanner product that is not DoD approved and Exchange 2016 compatible, this is a finding.
Fix: F-87563r1_fix
Update the EDSP to specify the organization's anti-virus strategy. Install and configure a DoD-approved compatible Exchange 2016 email-aware anti-virus scanner product.
- RMF Control
- SI-8
- Severity
- L
- CCI
- CCI-001308
- Version
- EX16-MB-000540
- Vuln IDs
-
- V-80711
- Rule IDs
-
- SV-95421r1_rule
Checks: C-80445r1_chk
Review the Email Domain Security Plan (EDSP). Determine the global maximum message recipient count. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Name, Identity, MaxRecipientEnvelopeLimit If the value of "MaxRecipientEnvelopeLimit" is not set to "5000", this is a finding. or If "MaxRecipientEnvelopeLimit" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87565r1_fix
Update the EDSP to specify the global maximum message recipient count. Set-TransportConfig -MaxRecipientEnvelopeLimit 5000 or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Restart the Microsoft Exchange Information Store service.
- RMF Control
- AC-12
- Severity
- L
- CCI
- CCI-002361
- Version
- EX16-MB-000550
- Vuln IDs
-
- V-80713
- Rule IDs
-
- SV-95423r1_rule
Checks: C-80447r1_chk
Review the Email Domain Security Plan (EDSP). Determine the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, ConnectionTimeout For each Receive connector, if the value of "ConnectionTimeout" is not set to "00:10:00", this is a finding. or If "ConnectionTimeout" is set to other than "00:10:00" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-87567r1_fix
Update the EDSP to specify the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -ConnectionTimeout 00:10:00 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- EX16-MB-000570
- Vuln IDs
-
- V-80715
- Rule IDs
-
- SV-95425r1_rule
Checks: C-80449r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups and users that have access to the Exchange application directories. Verify the access permissions on the directory match the access permissions listed in the EDSP. If any group or user has different access permissions, this is a finding. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
Fix: F-87569r1_fix
Update the EDSP to specify the authorized groups and users that have access to the Exchange application directories or verify that this information is documented by the organization. Navigate to the Exchange application directory and remove or modify the group or user access permissions. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX16-MB-002930
- Vuln IDs
-
- V-80717
- Rule IDs
-
- SV-95427r1_rule
Checks: C-80451r1_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select ServerName, Name, Identity,*Authentication If the value of "WindowsAuthentication" is not set to "True", this is a finding.
Fix: F-87571r1_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity '<IdentityName>' -WindowsAuthentication $true Note: The <IdentityName> value must be in single quotes. Example for the Identity Name: <ServerName>\owa (Default website)
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX16-MB-002920
- Vuln IDs
-
- V-80719
- Rule IDs
-
- SV-95429r1_rule
Checks: C-80453r1_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select ServerName, Name, Identity, FormsAuthentication If the value of "FormsAuthentication" is not set to "False", this is a finding.
Fix: F-87573r1_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity <'IdentityName'> -FormsAuthentication $false Note: <IdentityName> must be in single quotes. Example for the Identity Name: <ServerName>\owa (Default website) Restart the ISS service.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX16-MB-002910
- Vuln IDs
-
- V-80721
- Rule IDs
-
- SV-95431r1_rule
Checks: C-80455r1_chk
Open a Windows PowerShell and enter the following command: Get-OwaVirtualDirectory | select internalurl, externalurl If the value returned is not https://, this is a finding.
Fix: F-87575r1_fix
Configure the OWA site to require SSL port 443.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX16-MB-002900
- Vuln IDs
-
- V-80723
- Rule IDs
-
- SV-95433r1_rule
Checks: C-80457r1_chk
Open the Exchange Management Shell and enter the following command: Get-RpcClientAccess | Select Server, Name, EncryptionRequired If the value of "EncryptionRequired" is not set to "True", this is a finding.
Fix: F-87577r1_fix
Open the Exchange Management Shell and enter the following command: Set-RpcClientAccess -Server <ServerName> -EncryptionRequired $true
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- EX16-MB-002890
- Vuln IDs
-
- V-80725
- Rule IDs
-
- SV-95435r1_rule
Checks: C-80459r1_chk
Verify the site uses an approved DoD third-party malicious code scanner. Consult with the System Administrator (SA) to demonstrate the application being used to provide malicious code protection in the Exchange implementation. If the SA is unable to demonstrate a third-party malicious code protection application, this is a finding. If the SA is unaware of a third-party malicious code protection application, this is a finding.
Fix: F-87579r1_fix
Following vendor best practice guidance, install and configure the third-party malicious code protection application.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- EX16-MB-002880
- Vuln IDs
-
- V-80727
- Rule IDs
-
- SV-95437r1_rule
Checks: C-80461r1_chk
Open the Exchange Management Shell and enter the following command: Get-TransportAgent "Malware Agent" If the value of "Enabled" is set to "True", this is a finding.
Fix: F-87581r1_fix
Open the Exchange Management Shell and enter the following command: & env:ExchangeInstallPath\Scripts\Disable-Antimalwarescanning.ps1
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- EX16-MB-000580
- Vuln IDs
-
- V-80729
- Rule IDs
-
- SV-95439r1_rule
Checks: C-80463r1_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the software baseline. Review the application software baseline procedures and implementation artifacts. Note the list of files and directories included in the baseline procedure for completeness. If an email software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Fix: F-87583r1_fix
Update the EDSP to specify the software baseline, procedures, and implementation artifacts or verify that this information is documented by the organization.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- EX16-MB-000590
- Vuln IDs
-
- V-80731
- Rule IDs
-
- SV-95441r1_rule
Checks: C-80465r1_chk
Review the Email Domain Security Plan (EDSP). Determine whether the site monitors system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on servers for unauthorized changes against a baseline on a weekly basis. If software files are not monitored for unauthorized changes, this is a finding. Note: A properly configured HBSS Policy Auditor File Integrity Monitor (FIM) module will meet the requirement for file integrity checking. The Asset module within HBSS does not meet this requirement.
Fix: F-87585r1_fix
Update the EDSP to specify that the organization monitors system files on servers for unauthorized changes against a baseline on a weekly basis or verify that this information is documented by the organization. Monitor the software files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on Exchange servers for unauthorized changes against a baseline on a weekly basis. Note: This can be done with the use of various monitoring tools.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- EX16-MB-000600
- Vuln IDs
-
- V-80733
- Rule IDs
-
- SV-95443r1_rule
Checks: C-80467r1_chk
Review the Email Domain Security Plan (EDSP). Note: Required services will vary among organizations and will vary depending on the role of the individual system. Organizations will develop their own list of services, which will be documented and justified with the Information System Security Officer (ISSO). The site’s list will be provided for any security review. Services that are common to multiple systems can be addressed in one document. Exceptions for individual systems should be identified separately by system. Open a Windows PowerShell and enter the following command: Get-Service | Where-Object {$_.status -eq 'running'} Note: The command returns a list of installed services and the status of that service. If the services required are not documented in the EDSP, this is a finding. If any undocumented or unnecessary services are running, this is a finding.
Fix: F-87587r1_fix
Update the EDSP to specify the services required for the system to function. Remove or disable any services that are not required.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- EX16-MB-000610
- Vuln IDs
-
- V-80735
- Rule IDs
-
- SV-95445r1_rule
Checks: C-80469r1_chk
Open the Exchange Management Shell and enter the following command: Get-OutlookAnywhere Get-OutlookAnywhere | Select Name, Identity, InternalClientAuthenticationMethod, ExternalClientAuthenticationMethod If the value of "InternalClientAuthenticationMethod" and the value of "ExternalClientAuthenticationMethod" are not set to NTLM, this is a finding.
Fix: F-87589r1_fix
Open the Exchange Management Shell and enter the following command: For InternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -InternalClientAuthenticationMethod NTLM For ExternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -ExternalClientAuthenticationMethod NTLM
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- EX16-MB-000620
- Vuln IDs
-
- V-80737
- Rule IDs
-
- SV-95447r1_rule
Checks: C-80471r1_chk
Review the Email Domain Security Plan (EDSP). Determine if the directory Exchange is installed. Open Windows Explorer. Navigate to where Exchange is installed. If Exchange resides on a directory or partition other than that of the operating system and does not have other applications installed (unless approved by the Information System Security Officer [ISSO]), this is not a finding.
Fix: F-87591r1_fix
Update the EDSP with the location of where Exchange is installed. Install Exchange on a dedicated application directory or partition separate than that of the operating system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- EX16-MB-002870
- Vuln IDs
-
- V-80739
- Rule IDs
-
- SV-95449r1_rule
Checks: C-80473r1_chk
Open a Windows PowerShell Module and enter the following commands: Get-Website | Select Name Get-WebBinding -Name <'WebSiteName'> | Format-List If the Web binding values returned are not on standard port 80 for HTTP connections or port 443 for HTTPS connections, this is a finding. Note: This is excluding the Exchange Back End website which uses 81/444. Repeat the process for each website.
Fix: F-87593r1_fix
Configure web ports to be ports 80 and 443, as specified by PPSM standards.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- EX16-MB-000680
- Vuln IDs
-
- V-80741
- Rule IDs
-
- SV-95451r1_rule
Checks: C-80475r1_chk
Determine the most current, approved service pack. Open the Exchange Management Shell and enter the following command: Get-ExchangeServer | fl Name, AdminDisplayVersion If the value of "AdminDisplayVersion" does not return the most current, approved service pack, this is a finding.
Fix: F-87595r1_fix
Install the most current, approved service pack.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000670
- Vuln IDs
-
- V-80743
- Rule IDs
-
- SV-95453r1_rule
Checks: C-80477r1_chk
Review the Email Domain Security Plan (EDSP). Determine if the Exchange Mailbox databases are using redundancy. Open an Exchange Admin Center. Navigate to and select Microsoft Exchange >> Microsoft Exchange On - Premises <server.domain> >> Organization Configuration >> Mailbox. In the right pane, if two or more Mailbox servers are not listed, this is a finding.
Fix: F-87597r1_fix
Update the EDSP to specify how Exchange Mailbox databases use redundancy. Add two or more Mailbox servers to the database availability group.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000630
- Vuln IDs
-
- V-80745
- Rule IDs
-
- SV-95455r1_rule
Checks: C-80479r1_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Identity, DeliveryReportEnabled If the value of "DeliveryReportEnabled" is not set to "False", this is a finding.
Fix: F-87599r1_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -DeliveryReportEnabled $false Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000640
- Vuln IDs
-
- V-80747
- Rule IDs
-
- SV-95457r1_rule
Checks: C-80481r1_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, Identity, NDREnabled If the value of "NDREnabled" is not set to "False", this is a finding.
Fix: F-87601r1_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -NDREnabled $false Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000650
- Vuln IDs
-
- V-80749
- Rule IDs
-
- SV-95459r1_rule
Checks: C-80483r1_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, Banner For each Receive connector, if the value of "Banner" is not set to "220 SMTP Server Ready", this is a finding.
Fix: F-87603r1_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -Banner '220 SMTP Server Ready' Note: The <IdentityName> and 220 SMTP Server Ready values must be in single quotes. Repeat the procedures for each Receive connector.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000660
- Vuln IDs
-
- V-80751
- Rule IDs
-
- SV-95461r1_rule
Checks: C-80485r1_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, TlsAuthLevel For each Send connector, if the value of "TlsAuthLevel" is not set to "DomainValidation", this is a finding.
Fix: F-87605r1_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -TlsAuthLevel DomainValidation Note: The <IdentityName> value must be in single quotes. Repeat the procedure for each Send connector.