Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +64 −65
Comparison against the immediately-prior release (V1R4). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 64
- V-228354 Medium Exchange must have Administrator audit logging enabled.
- V-228355 Medium Exchange servers must use approved DoD certificates.
- V-228356 Medium Exchange auto-forwarding email to remote domains must be disabled or restricted.
- V-228357 Medium Exchange Connectivity logging must be enabled.
- V-228358 Medium The Exchange Email Diagnostic log level must be set to the lowest level.
- V-228359 Low Exchange Audit record parameters must be set.
- V-228360 Low Exchange Circular Logging must be disabled.
- V-228361 Medium Exchange Email Subject Line logging must be disabled.
- V-228362 Medium Exchange Message Tracking Logging must be enabled.
- V-228363 Medium Exchange Queue monitoring must be configured with threshold and action.
- V-228364 Medium Exchange Send Fatal Errors to Microsoft must be disabled.
- V-228365 Medium Exchange must protect audit data against unauthorized read access.
- V-228366 Medium Exchange must not send Customer Experience reports to Microsoft.
- V-228367 Medium Exchange must protect audit data against unauthorized access.
- V-228368 Medium Exchange must protect audit data against unauthorized deletion.
- V-228369 Medium Exchange Audit data must be on separate partitions.
- V-228370 Medium Exchange Local machine policy must require signed scripts.
- V-228371 Medium The Exchange Internet Message Access Protocol 4 (IMAP4) service must be disabled.
- V-228372 Medium The Exchange Post Office Protocol 3 (POP3) service must be disabled.
- V-228373 Medium Exchange Mailbox databases must reside on a dedicated partition.
- V-228374 Medium Exchange Internet-facing Send connectors must specify a Smart Host.
- V-228375 Medium Exchange internal Receive connectors must require encryption.
- V-228376 Medium Exchange Mailboxes must be retained until backups are complete.
- V-228377 Medium Exchange email forwarding must be restricted.
- V-228378 Medium Exchange email-forwarding SMTP domains must be restricted.
- V-228379 Low Exchange Mail quota settings must not restrict receiving mail.
- V-228380 Low Exchange Mail Quota settings must not restrict receiving mail.
- V-228381 Low Exchange Mailbox Stores must mount at startup.
- V-228382 Low Exchange Message size restrictions must be controlled on Receive connectors.
- V-228383 Low Exchange Receive connectors must control the number of recipients per message.
- V-228384 Low The Exchange Receive Connector Maximum Hop Count must be 60.
- V-228385 Low Exchange Message size restrictions must be controlled on Send connectors.
- V-228386 Low The Exchange Send connector connections count must be limited.
- V-228387 Low The Exchange global inbound message size must be controlled.
- V-228388 Low The Exchange global outbound message size must be controlled.
- V-228389 Low The Exchange Outbound Connection Limit per Domain Count must be controlled.
- V-228390 Low The Exchange Outbound Connection Timeout must be 10 minutes or less.
- V-228391 Medium Exchange Internal Receive connectors must not allow anonymous connections.
- V-228392 Medium Exchange external/Internet-bound automated response messages must be disabled.
- V-228393 Medium Exchange must have anti-spam filtering installed.
- V-228394 Medium Exchange must have anti-spam filtering enabled.
- V-228395 Medium Exchange must have anti-spam filtering configured.
- V-228396 Medium Exchange must not send automated replies to remote domains.
- V-228397 High Exchange servers must have an approved DoD email-aware virus protection software installed.
- V-228398 Low The Exchange Global Recipient Count Limit must be set.
- V-228399 Low The Exchange Receive connector timeout must be limited.
- V-228400 Medium The Exchange application directory must be protected from unauthorized access.
- V-228401 Medium An Exchange software baseline copy must exist.
- V-228402 Medium Exchange software must be monitored for unauthorized changes.
- V-228403 Medium Exchange services must be documented and unnecessary services must be removed or disabled.
- V-228404 Medium Exchange Outlook Anywhere clients must use NTLM authentication to access email.
- V-228405 Medium The Exchange Email application must not share a partition with another application.
- V-228406 Medium Exchange must not send delivery reports to remote domains.
- V-228407 Medium Exchange must not send nondelivery reports to remote domains.
- V-228408 Medium The Exchange SMTP automated banner response must not reveal server details.
- V-228409 Medium Exchange Internal Send connectors must use an authentication level.
- V-228410 Medium Exchange must provide Mailbox databases in a highly available and redundant configuration.
- V-228411 Medium Exchange must have the most current, approved service pack installed.
- V-228412 Medium The application must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-228413 Medium The applications built-in Malware Agent must be disabled.
- V-228415 Medium Exchange must use encryption for RPC client access.
- V-228416 Medium Exchange must use encryption for Outlook Web App (OWA) access.
- V-228417 Medium Exchange must have Forms-based Authentication enabled.
- V-228418 Medium Exchange must have authenticated access set to Integrated Windows Authentication only.
Removed rules 65
- V-80623 Medium Exchange must have Administrator audit logging enabled.
- V-80625 Medium Exchange servers must use approved DoD certificates.
- V-80627 Medium Exchange auto-forwarding email to remote domains must be disabled or restricted.
- V-80629 Medium Exchange Connectivity logging must be enabled.
- V-80631 Medium The Exchange Email Diagnostic log level must be set to the lowest level.
- V-80633 Low Exchange Audit record parameters must be set.
- V-80635 Low Exchange Circular Logging must be disabled.
- V-80637 Medium Exchange Email Subject Line logging must be disabled.
- V-80639 Medium Exchange Message Tracking Logging must be enabled.
- V-80641 Medium Exchange Queue monitoring must be configured with threshold and action.
- V-80643 Medium Exchange Send Fatal Errors to Microsoft must be disabled.
- V-80645 Medium Exchange must protect audit data against unauthorized read access.
- V-80647 Medium Exchange must not send Customer Experience reports to Microsoft.
- V-80649 Medium Exchange must protect audit data against unauthorized access.
- V-80651 Medium Exchange must protect audit data against unauthorized deletion.
- V-80653 Medium Exchange Audit data must be on separate partitions.
- V-80655 Medium Exchange Local machine policy must require signed scripts.
- V-80657 Medium The Exchange Internet Message Access Protocol 4 (IMAP4) service must be disabled.
- V-80659 Medium The Exchange Post Office Protocol 3 (POP3) service must be disabled.
- V-80661 Medium Exchange Mailbox databases must reside on a dedicated partition.
- V-80663 Medium Exchange Internet-facing Send connectors must specify a Smart Host.
- V-80665 Medium Exchange internal Receive connectors must require encryption.
- V-80667 Medium Exchange Mailboxes must be retained until backups are complete.
- V-80669 Medium Exchange email forwarding must be restricted.
- V-80671 Medium Exchange email-forwarding SMTP domains must be restricted.
- V-80673 Low Exchange Mail quota settings must not restrict receiving mail.
- V-80675 Low Exchange Mail Quota settings must not restrict receiving mail.
- V-80677 Low Exchange Mailbox Stores must mount at startup.
- V-80679 Low Exchange Message size restrictions must be controlled on Receive connectors.
- V-80681 Low Exchange Receive connectors must control the number of recipients per message.
- V-80683 Low The Exchange Receive Connector Maximum Hop Count must be 60.
- V-80685 Low Exchange Message size restrictions must be controlled on Send connectors.
- V-80687 Low The Exchange Send connector connections count must be limited.
- V-80689 Low The Exchange global inbound message size must be controlled.
- V-80691 Low The Exchange global outbound message size must be controlled.
- V-80693 Low The Exchange Outbound Connection Limit per Domain Count must be controlled.
- V-80695 Low The Exchange Outbound Connection Timeout must be 10 minutes or less.
- V-80697 Medium Exchange Internal Receive connectors must not allow anonymous connections.
- V-80699 Medium Exchange external/Internet-bound automated response messages must be disabled.
- V-80701 Medium Exchange must have anti-spam filtering installed.
- V-80703 Medium Exchange must have anti-spam filtering enabled.
- V-80705 Medium Exchange must have anti-spam filtering configured.
- V-80707 Medium Exchange must not send automated replies to remote domains.
- V-80709 High Exchange servers must have an approved DoD email-aware virus protection software installed.
- V-80711 Low The Exchange Global Recipient Count Limit must be set.
- V-80713 Low The Exchange Receive connector timeout must be limited.
- V-80715 Medium The Exchange application directory must be protected from unauthorized access.
- V-80717 Medium Exchange must have authenticated access set to Integrated Windows Authentication only.
- V-80719 Medium Exchange must have Forms-based Authentication enabled.
- V-80721 Medium Exchange must use encryption for Outlook Web App (OWA) access.
- V-80723 Medium Exchange must use encryption for RPC client access.
- V-80725 Medium A DoD-approved third party Exchange-aware malicious code protection application must be implemented.
- V-80727 Medium The applications built-in Malware Agent must be disabled.
- V-80729 Medium An Exchange software baseline copy must exist.
- V-80731 Medium Exchange software must be monitored for unauthorized changes.
- V-80733 Medium Exchange services must be documented and unnecessary services must be removed or disabled.
- V-80735 Medium Exchange Outlook Anywhere clients must use NTLM authentication to access email.
- V-80737 Medium The Exchange Email application must not share a partition with another application.
- V-80739 Medium The application must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-80741 Medium Exchange must have the most current, approved service pack installed.
- V-80743 Medium Exchange must provide Mailbox databases in a highly available and redundant configuration.
- V-80745 Medium Exchange must not send delivery reports to remote domains.
- V-80747 Medium Exchange must not send nondelivery reports to remote domains.
- V-80749 Medium The Exchange SMTP automated banner response must not reveal server details.
- V-80751 Medium Exchange Internal Send connectors must use an authentication level.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- EX16-MB-000010
- Vuln IDs
-
- V-228354
- V-80623
- Rule IDs
-
- SV-228354r508018_rule
- SV-95333
Checks: C-30587r496858_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select Name, AdminAuditLogEnabled If the value of "AdminAuditLogEnabled" is not set to "True", this is a finding.
Fix: F-30572r496859_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogEnabled $true
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX16-MB-000020
- Vuln IDs
-
- V-228355
- V-80625
- Rule IDs
-
- SV-228355r508018_rule
- SV-95335
Checks: C-30588r496861_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeCertificate | Select CertificateDomains, issuer If the value of "CertificateDomains" does not indicate it is issued by the DoD, this is a finding.
Fix: F-30573r496862_fix
Remove the non-DoD certificate and import the correct DoD certificates.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- EX16-MB-000030
- Vuln IDs
-
- V-228356
- V-80627
- Rule IDs
-
- SV-228356r508018_rule
- SV-95337
Checks: C-30589r496864_chk
Non-Enterprise Mail Check Content: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Identity, AutoForwardEnabled If the value of AutoForwardEnabled is not set to "False", this is a finding. Enterprise Mail Check Content: If the value of "AutoForwardEnabled" is set to "True", this is not a finding. and In the Exchange Management Shell, enter the following command: Get-RemoteDomain If the value of "RemoteDomain" is not set to ".mil" and/or ".gov" domain(s), this is a finding.
Fix: F-30574r496865_fix
Non-Enterprise Mail Fix Text: Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AutoForwardEnabled $false Note: The <IdentityName> value must be in single quotes. Enterprise Mail Fix Text: New-RemoteDomain -Name <NewRemoteDomainName> -DomainName <SMTP Address> Note: <NewRemoteDomainName> must either be a .mil or .gov domain. Set-RemoteDomain -Identity <'RemoteDomainIdentity'> -AutoForwardEnabled $true Note: The <RemoteDomainIdentity> value must be in single quotes.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- EX16-MB-000040
- Vuln IDs
-
- V-228357
- V-80629
- Rule IDs
-
- SV-228357r508018_rule
- SV-95339
Checks: C-30590r496867_chk
Open the Exchange Management Shell and enter the following command: Get-TransportService | Select Name, Identity, ConnectivityLogEnabled If the value of "ConnectivityLogEnabled" is not set to "True", this is a finding.
Fix: F-30575r496868_fix
Open the Exchange Management Shell and enter the following command: Set-TransportService -Identity <'IdentityName'> -ConnectivityLogEnabled $true Note: The <IdentityName> value must be in single quotes.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- EX16-MB-000050
- Vuln IDs
-
- V-228358
- V-80631
- Rule IDs
-
- SV-228358r508018_rule
- SV-95341
Checks: C-30591r496870_chk
Open the Exchange Management Shell and enter the following command: Get-EventLogLevel If the Diagnostic of any EventLevel is not set to "Lowest", this is a finding.
Fix: F-30576r496871_fix
Open the Exchange Management Shell and enter the following command: Set-EventLogLevel -Identity <'IdentityName\EventlogName'> -Level Lowest Note: The <IdentityName\EventlogName> value must be in single quotes.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- EX16-MB-000060
- Vuln IDs
-
- V-228359
- V-80633
- Rule IDs
-
- SV-228359r508018_rule
- SV-95343
Checks: C-30592r496873_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select AdminAuditLogParameters Note: The value of "*" indicates all parameters are being audited. If the value of "AdminAuditLogParameters" is not set to "*", this is a finding.
Fix: F-30577r496874_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogParameters *
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- EX16-MB-000070
- Vuln IDs
-
- V-228360
- V-80635
- Rule IDs
-
- SV-228360r508018_rule
- SV-95345
Checks: C-30593r496876_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, CircularLoggingEnabled If the value of "CircularLoggingEnabled" is not set to "False", this is a finding.
Fix: F-30578r496877_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -CircularLoggingEnabled $false Note: The <IdentityName> value must be in single quotes.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- EX16-MB-000080
- Vuln IDs
-
- V-228361
- V-80637
- Rule IDs
-
- SV-228361r508018_rule
- SV-95347
Checks: C-30594r496879_chk
Open the Exchange Management Shell and enter the following command: Get-TransportService | Select Name, Identity, MessageTrackingLogSubjectLoggingEnabled If the value of “MessageTrackingLogSubjectLoggingEnabled” is not set to “False”, this is a finding.
Fix: F-30579r496880_fix
Open the Exchange Management Shell and enter the following command: Set-Transportservice -MessageTrackingLogSubjectLoggingEnabled $False
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- EX16-MB-000090
- Vuln IDs
-
- V-228362
- V-80639
- Rule IDs
-
- SV-228362r508018_rule
- SV-95349
Checks: C-30595r496882_chk
Open the Exchange Management Shell and enter the following command: Get-Transportservice | Select Name, MessageTrackingLogEnabled If the value of MessageTrackingLogEnabled is not set to True, this is a finding.
Fix: F-30580r496883_fix
Open the Exchange Management Shell and enter the following command: Set-Transportservice <IdentityName> -MessageTrackingLogEnabled $true Note: The <IdentityName> value must be in quotes.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- EX16-MB-000100
- Vuln IDs
-
- V-228363
- V-80641
- Rule IDs
-
- SV-228363r508018_rule
- SV-95351
Checks: C-30596r496885_chk
Note: If a third-party application is performing monitoring functions, the reviewer should verify the application is monitoring correctly and mark the vulnerability not applicable (NA). Open the Exchange Management Shell and enter the following command: perfmon Get-MonitoringItemHelp -Identity <String> -Server <ServerIdParameter> If no sets are defined or queues are not being monitored, this is a finding.
Fix: F-30581r496886_fix
Open the Exchange Management Shell and enter the following command: perfmon In the left pane, navigate to and select Performance >> Data Collector Sets >> User Defined. Right-click on, navigate to, and configure User Defined >> New >> Data Collector Sets and configure the system to use the data collection set for monitoring the queues.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX16-MB-000110
- Vuln IDs
-
- V-228364
- V-80643
- Rule IDs
-
- SV-228364r508018_rule
- SV-95353
Checks: C-30597r496888_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeServer –status | Select Name, Identity, ErrorReportingEnabled For each Exchange Server, if the value of "ErrorReportingEnabled" is not set to "False", this is a finding.
Fix: F-30582r496889_fix
Open the Exchange Management Shell and enter the following command: Set-ExchangeServer -Identity <'IdentityName'> -ErrorReportingEnabled $false Note: The <IdentityName> value must be in single quotes. Repeat the process for each Exchange Server.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- EX16-MB-000120
- Vuln IDs
-
- V-228365
- V-80645
- Rule IDs
-
- SV-228365r508018_rule
- SV-95355
Checks: C-30598r496891_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups or users that should have "Read" access to the audit data. If any group or user has "Read" access to the audit data that is not documented in the EDSP, this is a finding.
Fix: F-30583r496892_fix
Update the EDSP to specify the authorized groups or users that should have "Read" access to the audit data or verify that this information is documented by the organization. Restrict any unauthorized groups' or users' "Read" access to the audit logs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX16-MB-000130
- Vuln IDs
-
- V-228366
- V-80647
- Rule IDs
-
- SV-228366r508018_rule
- SV-95357
Checks: C-30599r496894_chk
Open the Exchange Management Shell and enter the following command: Get-OrganizationConfig | Select CustomerFeedbackEnabled If the value for "CustomerFeedbackEnabled" is not set to "False", this is a finding.
Fix: F-30584r496895_fix
Open the Exchange Management Shell and enter the following command: Set-OrganizationConfig -CustomerFeedbackEnabled $false
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- EX16-MB-000140
- Vuln IDs
-
- V-228367
- V-80649
- Rule IDs
-
- SV-228367r508018_rule
- SV-95359
Checks: C-30600r496897_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups or users that should have access to the audit data. If any group or user has modify privileges for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-30585r496898_fix
Update the EDSP to specify the authorized groups or users that should have access to the audit data or verify that this information is documented by the organization. Restrict any unauthorized groups' or users' modify permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- EX16-MB-000150
- Vuln IDs
-
- V-228368
- V-80651
- Rule IDs
-
- SV-228368r508018_rule
- SV-95361
Checks: C-30601r496900_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups or users that should have "Delete" permissions for the audit data. If any group or user has "Delete" permissions for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-30586r496901_fix
Update the EDSP to specify the authorized groups or users that should have "Delete" permissions for the audit data or verify that this information is documented by the organization. Restrict any unauthorized groups' or users' "Delete" permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- EX16-MB-000160
- Vuln IDs
-
- V-228369
- V-80653
- Rule IDs
-
- SV-228369r508018_rule
- SV-95363
Checks: C-30602r496903_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the audit logs' assigned partition. By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging. If the log files are not on a separate partition from the application, this is a finding.
Fix: F-30587r496904_fix
Update the EDSP to specify the audit logs' assigned partition or verify that this information is documented by the organization. Configure the audit log location to be on a partition drive separate from the application.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- EX16-MB-000170
- Vuln IDs
-
- V-228370
- V-80655
- Rule IDs
-
- SV-228370r508018_rule
- SV-95365
Checks: C-30603r496906_chk
Open the Exchange Management Shell and enter the following command: Get-ExecutionPolicy If the value returned is not "RemoteSigned", this is a finding.
Fix: F-30588r496907_fix
Open the Exchange Management Shell and enter the following command: Set-ExecutionPolicy RemoteSigned
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX16-MB-000180
- Vuln IDs
-
- V-228371
- V-80657
- Rule IDs
-
- SV-228371r557506_rule
- SV-95367
Checks: C-30604r557505_chk
Note: This requirement applies to IMAP4. IMAP Secure is not restricted and does not apply to this requirement. Open the Windows Power Shell and enter the following command: Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangeIMAP4' | Select Start Note: The hklm:\system\currentcontrolset\services\MSExchangeIMAP4 value must be in single quotes. If the value of "Start" is not set to "4", this is a finding.
Fix: F-30589r496910_fix
Open the Windows Power Shell and enter the following command: services.msc Navigate to and double-click on "Microsoft Exchange IMAP4 Backend". Click on the "General" tab. In the "Startup Type" dropdown, select "Disabled". Click the "OK" button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX16-MB-000190
- Vuln IDs
-
- V-228372
- V-80659
- Rule IDs
-
- SV-228372r508018_rule
- SV-95369
Checks: C-30605r496912_chk
Open the Windows Power Shell and enter the following command: Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangePOP3' | Select Start Note: The hklm:\system\currentcontrolset\services\MSExchangePOP3 value must be in single quotes. If the value of "Start" is not set to "4", this is a finding.
Fix: F-30590r496913_fix
Open the Windows Power Shell and enter the following command: services.msc Navigate to and double-click on "Microsoft Exchange POP3 Backend". Click on the "General" tab. In the "Startup Type" dropdown, select "Disabled". Click the "OK" button.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- EX16-MB-000200
- Vuln IDs
-
- V-228373
- V-80661
- Rule IDs
-
- SV-228373r508018_rule
- SV-95371
Checks: C-30606r496915_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the location where the Exchange Mailbox databases reside. Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, EdbFilePath Open Windows Explorer, navigate to the mailbox databases, and verify they are on a dedicated partition. If the mailbox databases are not on a dedicated partition, this is a finding.
Fix: F-30591r496916_fix
Update the EDSP to specify the location where the Exchange Mailbox databases reside or verify that this information is documented by the organization. Configure the mailbox databases on a dedicated partition.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001178
- Version
- EX16-MB-000210
- Vuln IDs
-
- V-228374
- V-80663
- Rule IDs
-
- SV-228374r508018_rule
- SV-95373
Checks: C-30607r496918_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, SmartHosts Identify the Internet-facing connectors. For each Send connector, if the value of "SmartHosts" does not return the Smart Host IP address, this is a finding.
Fix: F-30592r496919_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -SmartHosts <'IP Address of Smart Host'> -DNSRoutingEnabled $false Note: The <IdentityName> and <IP Address of Smart Host> values must be in single quotes. Repeat the procedure for each Send connector.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- EX16-MB-000220
- Vuln IDs
-
- V-228375
- V-80665
- Rule IDs
-
- SV-228375r557511_rule
- SV-95375
Checks: C-30608r557510_chk
Note: AuthMechanism may include other mechanisms as long as the "Tls" is identified. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, AuthMechanism For each Receive connector, if the value of "AuthMechanism" is not set to "Tls", this is a finding.
Fix: F-30593r496922_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -AuthMechanism 'Tls' Note: The <IdentityName> value must be in single quotes. Repeat the procedures for each Receive connector.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- EX16-MB-000270
- Vuln IDs
-
- V-228376
- V-80667
- Rule IDs
-
- SV-228376r508018_rule
- SV-95377
Checks: C-30609r496924_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase| Select Name, Identity, RetainDeletedItemsUntilBackup If the value of "RetainDeletedItemsUntilBackup" is not set to "True", this is a finding.
Fix: F-30594r496925_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -RetainDeletedItemsUntilBackup $true Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- EX16-MB-000290
- Vuln IDs
-
- V-228377
- V-80669
- Rule IDs
-
- SV-228377r508018_rule
- SV-95379
Checks: C-30610r496927_chk
Review the Email Domain Security Plan (EDSP). Determine any accounts that have been authorized to have email auto-forwarded. Note: If email auto-forwarding is not being used, this check is not applicable. . Open the Exchange Management Shell and enter the following commands: Get-Mailbox | Select Name, Identity, Filter If any user has a forwarding SMTP address and is not documented in the EDSP, this is a finding. Note: If no remote SMTP domain matching the mail-enabled user or contact that allows forwarding is configured for users identified with a forwarding address, this function will not work properly.
Fix: F-30595r496928_fix
Update the EDSP. Open the Exchange Management Shell and enter the following command: Set-Mailbox -Identity <'IdentityName'> -ForwardingSMTPAdddress $null Note: The <IdentityName> value must be in quotes.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- EX16-MB-000300
- Vuln IDs
-
- V-228378
- V-80671
- Rule IDs
-
- SV-228378r508018_rule
- SV-95381
Checks: C-30611r496930_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine any accounts that have been authorized to have email auto-forwarded. Note: If email auto-forwarding is not being used, this check is not applicable (NA). Open the Exchange Management Shell and enter the following commands: Get-RemoteDomain | Select Name, Identity, DomainName, AutoForwardEnabled If any domain for a user forwarding SMTP address is not documented in the EDSP, this is a finding. Note: If no remote SMTP domain matching the mail-enabled user or contact that allows forwarding is configured for users identified with a forwarding address, this function will not work properly.
Fix: F-30596r496931_fix
Update the EDSP to specify any accounts that have been authorized to have email auto-forwarded or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set- RemoteDomain -Identity <RemoteDomainIdParameter>
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001094
- Version
- EX16-MB-000310
- Vuln IDs
-
- V-228379
- V-80673
- Rule IDs
-
- SV-228379r508018_rule
- SV-95383
Checks: C-30612r496933_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, ProhibitSendReceiveQuota If the value of "ProhibitSendReceiveQuota" is not set to "Unlimited", this is a finding. or If the value of "ProhibitSendReceiveQuota" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30597r496934_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -ProhibitSendReceiveQuota Unlimited Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001094
- Version
- EX16-MB-000320
- Vuln IDs
-
- V-228380
- V-80675
- Rule IDs
-
- SV-228380r508018_rule
- SV-95385
Checks: C-30613r496936_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the value for the Prohibit Send Quota limit. Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, ProhibitSendQuota If the value of "ProhibitSendQuota" is not set to the site's Prohibit Send Quota limit, this is a finding.
Fix: F-30598r496937_fix
Update the EDSP to specify the value for the Prohibit Send Quota limit or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -ProhibitSendQuota <'QuotaLimit'> Note: The <IdentityName> and <QuotaLimit> values must be in single quotes.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001094
- Version
- EX16-MB-000340
- Vuln IDs
-
- V-228381
- V-80677
- Rule IDs
-
- SV-228381r508018_rule
- SV-95387
Checks: C-30614r496939_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select Name, Identity, MountAtStartup If the value of "MountAtStartup" is not set to "True", this is a finding.
Fix: F-30599r496940_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -MountAtStartup $true Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000350
- Vuln IDs
-
- V-228382
- V-80679
- Rule IDs
-
- SV-228382r508018_rule
- SV-95389
Checks: C-30615r496942_chk
Review the EDSP or document that contains this information. Determine the global maximum message receive size and whether signoff with risk acceptance is documented for the Receive connector to have a different value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxMessageSize Identify Internet-facing connectors. For each Receive connector, if the value of "MaxMessageSize" is not the same as the global value, this is a finding. or If "MaxMessageSize" is set to a numeric value different from the global value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30600r496943_fix
Update the EDSP to specify the global maximum message receive size and, if operationally necessary, to document signoff with risk acceptance for the Receive connector to have a different value, or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -MaxMessageSize <'MaxReceiveSize'> Note: The <IdentityName> and <MaxReceiveSize> values must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedure for each Receive connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000360
- Vuln IDs
-
- V-228383
- V-80681
- Rule IDs
-
- SV-228383r557508_rule
- SV-95391
Checks: C-30616r557507_chk
Note: This requirement applies to IMAP4. IMAP Secure is not restricted and does not apply to this requirement. Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the Maximum Recipients per Message value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxRecipientsPerMessage For each Receive connector, evaluate the "MaxRecipientsPerMessage" value. For each Receive connector, if the value of "MaxRecipientsPerMessage" is not set to "5000", this is a finding. or If the value of "MaxRecipientsPerMessage" is set to a value other than "5000" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30601r496946_fix
Update the EDSP to specify the "MaxRecipientsPerMessage" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -MaxRecipientsPerMessage 5000 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedure for each Receive connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000380
- Vuln IDs
-
- V-228384
- V-80683
- Rule IDs
-
- SV-228384r508018_rule
- SV-95393
Checks: C-30617r496948_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the Max Hop Count value for Receive connectors. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, MaxHopCount For each Receive connector, if the value of "MaxHopCount" is not set to "60", this is a finding. or If the value of "MaxHopCount" is set to a value other than "60" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30602r496949_fix
Update the EDSP to specify the "MaxHopCount" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -MaxHopCount 60 or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedure for each Receive connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000410
- Vuln IDs
-
- V-228385
- V-80685
- Rule IDs
-
- SV-228385r508018_rule
- SV-95395
Checks: C-30618r496951_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the maximum message send size. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, MaxMessageSize For each Send connector, if the value of "MaxMessageSize" is not the same as the global value, this is a finding. or If "MaxMessageSize" is set to a numeric value different from the maximum message send size value documented in the EDSP, this is a finding.
Fix: F-30603r496952_fix
Update the EDSP to specify the "MaxMessageSize" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -MaxMessageSize <MaxSendSize> Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedures for each Send connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000420
- Vuln IDs
-
- V-228386
- V-80687
- Rule IDs
-
- SV-228386r508018_rule
- SV-95397
Checks: C-30619r496954_chk
Review the Email Domain Security Plan (EDSP). Determine the value for SMTP Server Maximum Outbound Connections. Open the Exchange Management Shell and enter the following command: Get-TransportService | Select Name, Identity, MaxOutboundConnections If the value of "MaxOutboundConnections" is not set to "1000", this is a finding. or If "MaxOutboundConnections" is set to a value other than "1000" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30604r496955_fix
Update the EDSP to specify the "MaxOutboundConnections" value. Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'IdentityName'> -MaxOutboundConnections 1000 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000430
- Vuln IDs
-
- V-228387
- V-80689
- Rule IDs
-
- SV-228387r508018_rule
- SV-95399
Checks: C-30620r496957_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the global maximum message receive size. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Name, Identity, MaxReceiveSize If the value of "MaxReceiveSize" is not set to "10MB", this is a finding. or If "MaxReceiveSize" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30605r496958_fix
Update the EDSP to specify the "MaxReceiveSize" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-TransportConfig -MaxReceiveSize 10MB or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000440
- Vuln IDs
-
- V-228388
- V-80691
- Rule IDs
-
- SV-228388r508018_rule
- SV-95401
Checks: C-30621r496960_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the global maximum message send size. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Name, Identity, MaxSendSize If the value of "MaxSendSize" is not set to "10MB", this is a finding. or If "MaxSendSize" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30606r496961_fix
Update the EDSP to specify the "MaxSendSize" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-TransportConfig -MaxSendSize 10MB or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000450
- Vuln IDs
-
- V-228389
- V-80693
- Rule IDs
-
- SV-228389r508018_rule
- SV-95403
Checks: C-30622r496963_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the value for Maximum Outbound Domain Connections. Open the Exchange Management Shell and enter the following command: Get-TransportService | Select Name, Identity, MaxPerDomainOutboundConnections If the value of "MaxPerDomainOutboundConnections" is not set to "20", this is a finding. or If "MaxPerDomainOutboundConnections" is set to a value other than "20" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30607r496964_fix
Update the EDSP to specify the "MaxPerDomainOutboundConnection" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-TransportService -Identity <'IdentityName'> -MaxPerDomainOutboundConnections 20 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX16-MB-000460
- Vuln IDs
-
- V-228390
- V-80695
- Rule IDs
-
- SV-228390r508018_rule
- SV-95405
Checks: C-30623r496966_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, ConnectionInactivityTimeOut For each Send connector, if the value of "ConnectionInactivityTimeOut" is not set to "00:10:00", this is a finding. or If "ConnectionInactivityTimeOut" is set to a value other than "00:10:00" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30608r496967_fix
Update the EDSP to specify the "ConnectionInactivityTimeOut" value. Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -ConnectionInactivityTimeOut 00:10:00 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000470
- Vuln IDs
-
- V-228391
- V-80697
- Rule IDs
-
- SV-228391r508018_rule
- SV-95407
Checks: C-30624r496969_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, PermissionGroups For each Receive connector, if the value of "PermissionGroups" is "AnonymousUsers" for any receive connector, this is a finding.
Fix: F-30609r496970_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -PermissionGroups and enter a valid value user group. Note: The <IdentityName> value must be in single quotes. Example: Set-ReceiveConnector -Identity <'IdentityName'> -PermissionGroups ExchangeUsers Repeat the procedures for each Receive connector.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000480
- Vuln IDs
-
- V-228392
- V-80699
- Rule IDs
-
- SV-228392r508018_rule
- SV-95409
Checks: C-30625r496972_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, DomainName, Identity, AllowedOOFType If the value of "AllowedOOFType" is not set to "InternalLegacy", this is a finding.
Fix: F-30610r496973_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AllowedOOFType 'InternalLegacy' Note: The <IdentityName> and InternalLegacy values must be in single quotes.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000490
- Vuln IDs
-
- V-228393
- V-80701
- Rule IDs
-
- SV-228393r508018_rule
- SV-95411
Checks: C-30626r496975_chk
Review the Email Domain Security Plan (EDSP). Note: If using another DoD-approved antispam product for email or a DoD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable (NA). Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig | Format-Table Name,Enabled If no value is returned, this is a finding.
Fix: F-30611r496976_fix
Update the EDSP with the anti-spam mechanism used. Install the AntiSpam module. Open the Exchange Management Shell and enter the following command: & $env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000500
- Vuln IDs
-
- V-228394
- V-80703
- Rule IDs
-
- SV-228394r508018_rule
- SV-95413
Checks: C-30627r496978_chk
Review the Email Domain Security Plan (EDSP). Note: If using another DoD-approved anti-spam product for email or a DoD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable (NA). Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig | Format-Table Name,Enabled; Get-SenderFilterConfig | Format-Table Name,Enabled; Get-SenderIDConfig | Format-Table Name,Enabled; Get-SenderReputationConfig | Format-Table Name,Enabled If any of the following values returned are not set to "True", this is a finding: Set-ContentFilterConfig Set-SenderFilterConfig Set-SenderIDConfig Set-SenderReputationConfig
Fix: F-30612r496979_fix
Update the EDSP with the anti-spam mechanism used. Open the Exchange Management Shell and enter the following command for any values that were not set to "True": Set-ContentFilterConfig -Enabled $true Set-SenderFilterConfig -Enabled $true Set-SenderIDConfig -Enabled $true Set-SenderReputationConfig -Enabled $true
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000510
- Vuln IDs
-
- V-228395
- V-80705
- Rule IDs
-
- SV-228395r508018_rule
- SV-95415
Checks: C-30628r496981_chk
Review the Email Domain Security Plan (EDSP). Note: If using another DoD-approved antispam product for email or a DoD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable (NA). Determine the internal SMTP servers. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Format-List InternalSMTPServers If any internal SMTP server IP address returned does not reflect the list of accepted SMTP server IP addresses, this is a finding.
Fix: F-30613r496982_fix
Note: Configure the IP addresses of every internal SMTP server. If the Mailbox server is the only SMTP server running the antispam agents, configure the IP address of the Mailbox server. Update the EDSP with the anti-spam mechanism used. Open the Exchange Management Shell and enter the following command: Single SMTP server address: Set-TransportConfig -InternalSMTPServers @{Add='<ip address1>'} Multiple SMTP server addresses: Set-TransportConfig -InternalSMTPServers @{Add='<ip address1>','<ip address2>'}
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX16-MB-000520
- Vuln IDs
-
- V-228396
- V-80707
- Rule IDs
-
- SV-228396r508018_rule
- SV-95417
Checks: C-30629r497053_chk
Note: Automated replies to .MIL or .GOV sites are allowed. Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, Identity, AutoReplyEnabled If the value of “AutoReplyEnabled” is set to “True” and is configured to only Reply to .MIL or .GOV sites, this is not a finding. If the value of "AutoReplyEnabled" is not set to "False", this is a finding.
Fix: F-30614r496985_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AutoReplyEnabled $false Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SI-8
- Severity
- H
- CCI
- CCI-001308
- Version
- EX16-MB-000530
- Vuln IDs
-
- V-228397
- V-80709
- Rule IDs
-
- SV-228397r508018_rule
- SV-95419
Checks: C-30630r496987_chk
Review the Email Domain Security Plan (EDSP). Determine the anti-virus strategy. Verify the email-aware anti-virus scanner product is Exchange 2016 compatible and DoD approved. If email servers are using an email-aware anti-virus scanner product that is not DoD approved and Exchange 2016 compatible, this is a finding.
Fix: F-30615r496988_fix
Update the EDSP to specify the organization's anti-virus strategy. Install and configure a DoD-approved compatible Exchange 2016 email-aware anti-virus scanner product.
- RMF Control
- SI-8
- Severity
- L
- CCI
- CCI-001308
- Version
- EX16-MB-000540
- Vuln IDs
-
- V-228398
- V-80711
- Rule IDs
-
- SV-228398r508018_rule
- SV-95421
Checks: C-30631r496990_chk
Review the Email Domain Security Plan (EDSP). Determine the global maximum message recipient count. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Name, Identity, MaxRecipientEnvelopeLimit If the value of "MaxRecipientEnvelopeLimit" is not set to "5000", this is a finding. or If "MaxRecipientEnvelopeLimit" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30616r496991_fix
Update the EDSP to specify the global maximum message recipient count. Set-TransportConfig -MaxRecipientEnvelopeLimit 5000 or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Restart the Microsoft Exchange Information Store service.
- RMF Control
- AC-12
- Severity
- L
- CCI
- CCI-002361
- Version
- EX16-MB-000550
- Vuln IDs
-
- V-228399
- V-80713
- Rule IDs
-
- SV-228399r508018_rule
- SV-95423
Checks: C-30632r496993_chk
Review the Email Domain Security Plan (EDSP). Determine the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, ConnectionTimeout For each Receive connector, if the value of "ConnectionTimeout" is not set to "00:10:00", this is a finding. or If "ConnectionTimeout" is set to other than "00:10:00" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-30617r496994_fix
Update the EDSP to specify the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -ConnectionTimeout 00:10:00 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- EX16-MB-000570
- Vuln IDs
-
- V-228400
- V-80715
- Rule IDs
-
- SV-228400r508018_rule
- SV-95425
Checks: C-30633r496996_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups and users that have access to the Exchange application directories. Verify the access permissions on the directory match the access permissions listed in the EDSP. If any group or user has different access permissions, this is a finding. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
Fix: F-30618r496997_fix
Update the EDSP to specify the authorized groups and users that have access to the Exchange application directories or verify that this information is documented by the organization. Navigate to the Exchange application directory and remove or modify the group or user access permissions. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- EX16-MB-000580
- Vuln IDs
-
- V-228401
- V-80729
- Rule IDs
-
- SV-228401r508018_rule
- SV-95439
Checks: C-30634r496999_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the software baseline. Review the application software baseline procedures and implementation artifacts. Note the list of files and directories included in the baseline procedure for completeness. If an email software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Fix: F-30619r497000_fix
Update the EDSP to specify the software baseline, procedures, and implementation artifacts or verify that this information is documented by the organization.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- EX16-MB-000590
- Vuln IDs
-
- V-228402
- V-80731
- Rule IDs
-
- SV-228402r508018_rule
- SV-95441
Checks: C-30635r497002_chk
Review the Email Domain Security Plan (EDSP). Determine whether the site monitors system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on servers for unauthorized changes against a baseline on a weekly basis. If software files are not monitored for unauthorized changes, this is a finding. Note: A properly configured HBSS Policy Auditor File Integrity Monitor (FIM) module will meet the requirement for file integrity checking. The Asset module within HBSS does not meet this requirement.
Fix: F-30620r497003_fix
Update the EDSP to specify that the organization monitors system files on servers for unauthorized changes against a baseline on a weekly basis or verify that this information is documented by the organization. Monitor the software files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on Exchange servers for unauthorized changes against a baseline on a weekly basis. Note: This can be done with the use of various monitoring tools.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- EX16-MB-000600
- Vuln IDs
-
- V-228403
- V-80733
- Rule IDs
-
- SV-228403r557509_rule
- SV-95443
Checks: C-30636r497005_chk
Review the Email Domain Security Plan (EDSP). Note: Required services will vary among organizations and will vary depending on the role of the individual system. Organizations will develop their own list of services, which will be documented and justified with the Information System Security Officer (ISSO). The site’s list will be provided for any security review. Services that are common to multiple systems can be addressed in one document. Exceptions for individual systems should be identified separately by system. Open a Windows PowerShell and enter the following command: Get-Service | Where-Object {$_.status -eq 'running'} Note: The command returns a list of installed services and the status of that service. If the services required are not documented in the EDSP, this is a finding. If any undocumented or unnecessary services are running, this is a finding.
Fix: F-30621r497006_fix
Update the EDSP to specify the services required for the system to function. Remove or disable any services that are not required.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- EX16-MB-000610
- Vuln IDs
-
- V-228404
- V-80735
- Rule IDs
-
- SV-228404r508018_rule
- SV-95445
Checks: C-30637r497008_chk
Open the Exchange Management Shell and enter the following command: Get-OutlookAnywhere Get-OutlookAnywhere | Select Name, Identity, InternalClientAuthenticationMethod, ExternalClientAuthenticationMethod If the value of "InternalClientAuthenticationMethod" and the value of "ExternalClientAuthenticationMethod" are not set to NTLM, this is a finding.
Fix: F-30622r497009_fix
Open the Exchange Management Shell and enter the following command: For InternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -InternalClientAuthenticationMethod NTLM For ExternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -ExternalClientAuthenticationMethod NTLM
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- EX16-MB-000620
- Vuln IDs
-
- V-228405
- V-80737
- Rule IDs
-
- SV-228405r508018_rule
- SV-95447
Checks: C-30638r497011_chk
Review the Email Domain Security Plan (EDSP). Determine if the directory Exchange is installed. Open Windows Explorer. Navigate to where Exchange is installed. If Exchange resides on a directory or partition other than that of the operating system and does not have other applications installed (unless approved by the Information System Security Officer [ISSO]), this is not a finding.
Fix: F-30623r497012_fix
Update the EDSP with the location of where Exchange is installed. Install Exchange on a dedicated application directory or partition separate than that of the operating system.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000630
- Vuln IDs
-
- V-228406
- V-80745
- Rule IDs
-
- SV-228406r508018_rule
- SV-95455
Checks: C-30639r497014_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Identity, DeliveryReportEnabled If the value of "DeliveryReportEnabled" is not set to "False", this is a finding.
Fix: F-30624r497015_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -DeliveryReportEnabled $false Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000640
- Vuln IDs
-
- V-228407
- V-80747
- Rule IDs
-
- SV-228407r508018_rule
- SV-95457
Checks: C-30640r497017_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, Identity, NDREnabled If the value of "NDREnabled" is not set to "False", this is a finding.
Fix: F-30625r497018_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -NDREnabled $false Note: The <IdentityName> value must be in single quotes.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000650
- Vuln IDs
-
- V-228408
- V-80749
- Rule IDs
-
- SV-228408r508018_rule
- SV-95459
Checks: C-30641r497020_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, Banner For each Receive connector, if the value of "Banner" is not set to "220 SMTP Server Ready", this is a finding.
Fix: F-30626r497021_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -Banner '220 SMTP Server Ready' Note: The <IdentityName> and 220 SMTP Server Ready values must be in single quotes. Repeat the procedures for each Receive connector.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000660
- Vuln IDs
-
- V-228409
- V-80751
- Rule IDs
-
- SV-228409r508018_rule
- SV-95461
Checks: C-30642r497023_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, TlsAuthLevel For each Send connector, if the value of "TlsAuthLevel" is not set to "DomainValidation", this is a finding.
Fix: F-30627r497024_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -TlsAuthLevel DomainValidation Note: The <IdentityName> value must be in single quotes. Repeat the procedure for each Send connector.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX16-MB-000670
- Vuln IDs
-
- V-228410
- V-80743
- Rule IDs
-
- SV-228410r508018_rule
- SV-95453
Checks: C-30643r497026_chk
Review the Email Domain Security Plan (EDSP). Determine if the Exchange Mailbox databases are using redundancy. Open an Exchange Admin Center. Navigate to and select Microsoft Exchange >> Microsoft Exchange On - Premises <server.domain> >> Organization Configuration >> Mailbox. In the right pane, if two or more Mailbox servers are not listed, this is a finding.
Fix: F-30628r497027_fix
Update the EDSP to specify how Exchange Mailbox databases use redundancy. Add two or more Mailbox servers to the database availability group.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- EX16-MB-000680
- Vuln IDs
-
- V-228411
- V-80741
- Rule IDs
-
- SV-228411r508018_rule
- SV-95451
Checks: C-30644r497029_chk
Determine the most current, approved service pack. Open the Exchange Management Shell and enter the following command: Get-ExchangeServer | fl Name, AdminDisplayVersion If the value of "AdminDisplayVersion" does not return the most current, approved service pack, this is a finding.
Fix: F-30629r497030_fix
Install the most current, approved service pack.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- EX16-MB-002870
- Vuln IDs
-
- V-228412
- V-80739
- Rule IDs
-
- SV-228412r508018_rule
- SV-95449
Checks: C-30645r497032_chk
Open a Windows PowerShell Module and enter the following commands: Get-Website | Select Name Get-WebBinding -Name <'WebSiteName'> | Format-List If the Web binding values returned are not on standard port 80 for HTTP connections or port 443 for HTTPS connections, this is a finding. Note: This is excluding the Exchange Back End website which uses 81/444. Repeat the process for each website.
Fix: F-30630r497033_fix
Configure web ports to be ports 80 and 443, as specified by PPSM standards.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- EX16-MB-002880
- Vuln IDs
-
- V-228413
- V-80727
- Rule IDs
-
- SV-228413r508018_rule
- SV-95437
Checks: C-30646r497035_chk
Open the Exchange Management Shell and enter the following command: Get-TransportAgent "Malware Agent" If the value of "Enabled" is set to "True", this is a finding.
Fix: F-30631r497036_fix
Open the Exchange Management Shell and enter the following command: & env:ExchangeInstallPath\Scripts\Disable-Antimalwarescanning.ps1
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX16-MB-002900
- Vuln IDs
-
- V-228415
- V-80723
- Rule IDs
-
- SV-228415r508018_rule
- SV-95433
Checks: C-30648r497041_chk
Open the Exchange Management Shell and enter the following command: Get-RpcClientAccess | Select Server, Name, EncryptionRequired If the value of "EncryptionRequired" is not set to "True", this is a finding.
Fix: F-30633r497042_fix
Open the Exchange Management Shell and enter the following command: Set-RpcClientAccess -Server <ServerName> -EncryptionRequired $true
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX16-MB-002910
- Vuln IDs
-
- V-228416
- V-80721
- Rule IDs
-
- SV-228416r508018_rule
- SV-95431
Checks: C-30649r497044_chk
Open a Windows PowerShell and enter the following command: Get-OwaVirtualDirectory | select internalurl, externalurl If the value returned is not https://, this is a finding.
Fix: F-30634r497045_fix
Configure the OWA site to require SSL port 443.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX16-MB-002920
- Vuln IDs
-
- V-228417
- V-80719
- Rule IDs
-
- SV-228417r508018_rule
- SV-95429
Checks: C-30650r497047_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select ServerName, Name, Identity, FormsAuthentication If the value of "FormsAuthentication" is not set to "False", this is a finding.
Fix: F-30635r497048_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity <'IdentityName'> -FormsAuthentication $false Note: <IdentityName> must be in single quotes. Example for the Identity Name: <ServerName>\owa (Default website) Restart the ISS service.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX16-MB-002930
- Vuln IDs
-
- V-228418
- V-80717
- Rule IDs
-
- SV-228418r508018_rule
- SV-95427
Checks: C-30651r497050_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select ServerName, Name, Identity,*Authentication If the value of "WindowsAuthentication" is not set to "True", this is a finding.
Fix: F-30636r497051_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity '<IdentityName>' -WindowsAuthentication $true Note: The <IdentityName> value must be in single quotes. Example for the Identity Name: <ServerName>\owa (Default website)