Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 2
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 2
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX19-MB-000006
- Vuln IDs
-
- V-259645
- Rule IDs
-
- SV-259645r960759_rule
Checks: C-63384r942247_chk
Open the Exchange Management Shell and enter the following command: Get-RpcClientAccess | Select-Object -Property Server, Name, EncryptionRequired If the value of "EncryptionRequired" is not set to "True", this is a finding. Note: This is configured as "True" by default.
Fix: F-63292r942248_fix
Open the Exchange Management Shell and enter the following command: Set-RpcClientAccess -Server <ServerName> -EncryptionRequired $true
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX19-MB-000007
- Vuln IDs
-
- V-259646
- Rule IDs
-
- SV-259646r960759_rule
Checks: C-63385r942250_chk
Open an Exchange Management Shell and enter the following command: Get-ExchangeCertificate |Select-Object -Property Subject,Services,Thumbprint If the certificate associated with the IIS service is not a trusted public certificate, this is a finding. In the same Exchange Management Shell, run the following cmdlets: Get-OwaVirtualDirectory | Select-Object -Property internalurl, externalurl If the value returned is not https://, this is a finding. Open IIS Manager and locate the Exchange Server. In the navigation pane on the left, navigate to Sites >> Default Web Site >> owa. In the pane on the right, under /owa Home, in the IIS section, double-click "SSL Settings". If the box "Require SSL" is not checked, this is a finding.
Fix: F-63293r942251_fix
Ensure a trusted public certificate is installed for the Exchange server with the correct FQDNs that will service the domain. This will allow secure communications between clients and the server. This should be done before the server is put into production. Once installed, in an elevated Exchange Management Shell, run the following cmdlet to associate the certificate with the IIS service: Enable-ExchangeCertificate -Thumbprint <thumbprint of public cert> -Services IIS Set the OWA URL to use HTTPS instead of HTTP by updating the URLs to HTTPS. If the website is "http://mail.contoso.com" for both internal and external (for example), run the following cmdlet to set it to HTTPS: Set-OwaVirtualDirectory -Identity "<Server>\owa (Default Web Site) -InternalUrl "https://mail.contoso.com/owa" -ExternalUrl "https://mail.contoso.com/owa" Note: If this change is made, it must be done for the ECP virtual directory as well. A warning notifies users that this must be done. Open IIS Manager and locate the Exchange Server. In the navigation pane on the left, navigate to Sites >> Default Web Site >> owa. In the pane on the right, under /owa Home, in the IIS section, double-click "SSL Settings". Check the box for "Require SSL".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX19-MB-000008
- Vuln IDs
-
- V-259647
- Rule IDs
-
- SV-259647r960759_rule
Checks: C-63386r942253_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select-Object -Property ServerName, Name, Identity, *Authentication If the value of "FormsAuthentication" is not set to "False", this is a finding.
Fix: F-63294r942254_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity <'IdentityName'> -FormsAuthentication $false Note: <IdentityName> must be in quotes. Example for the Identity Name: <ServerName>\owa (Default website) Restart the IIS service.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- EX19-MB-000016
- Vuln IDs
-
- V-259648
- Rule IDs
-
- SV-259648r960780_rule
Checks: C-63387r942256_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select-Object -Property Name, AdminAuditLogEnabled If the value of "AdminAuditLogEnabled" is not set to "True", this is a finding.
Fix: F-63295r942257_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogEnabled $true
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX19-MB-000019
- Vuln IDs
-
- V-259649
- Rule IDs
-
- SV-259649r960792_rule
Checks: C-63388r942259_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeCertificate | Select-Object -Property CertificateDomains, issuer If the value of "CertificateDomains" does not indicate it is issued by the DOD, this is a finding.
Fix: F-63296r942260_fix
Remove the non-DOD certificate and import the correct DOD certificates.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX19-MB-000020
- Vuln IDs
-
- V-259650
- Rule IDs
-
- SV-259650r960792_rule
Checks: C-63389r942262_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select-Object -Property ServerName, Name, Identity,*Authentication If the value of "WindowsAuthentication" is not set to "True", this is a finding.
Fix: F-63297r942263_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity '<IdentityName>' -WindowsAuthentication $true Note: The <IdentityName> value must be in quotes. Example for the Identity Name: <ServerName>\owa (Default website)
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- EX19-MB-000021
- Vuln IDs
-
- V-259651
- Rule IDs
-
- SV-259651r960801_rule
Checks: C-63390r942265_chk
Note: This requirement is not applicable on classified or completely closed networks. For Non-Enterprise Mail: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select-Object -Property Identity, AutoForwardEnabled If the value of AutoForwardEnabled is not set to "False", this is a finding. For Enterprise Mail: If the value of "AutoForwardEnabled" is set to "True", this is not a finding. and In the Exchange Management Shell, enter the following command: Get-RemoteDomain If the value of "RemoteDomain" is not set to ".mil" and/or ".gov" domain(s), this is a finding.
Fix: F-63298r942266_fix
For Non-Enterprise Mail: Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AutoForwardEnabled $false Note: The <IdentityName> value must be in quotes. For Enterprise Mail: New-RemoteDomain -Name <NewRemoteDomainName> -DomainName <SMTP Address> Note: <NewRemoteDomainName> must either be a .mil or .gov domain. Set-RemoteDomain -Identity <'RemoteDomainIdentity'> -AutoForwardEnabled $true Note: The <RemoteDomainIdentity> value must be in quotes.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- EX19-MB-000031
- Vuln IDs
-
- V-259652
- Rule IDs
-
- SV-259652r960879_rule
Checks: C-63391r942268_chk
Open the Exchange Management Shell and enter the following command: Get-TransportService | Select-Object -Property Name, Identity, ConnectivityLogEnabled If the value of "ConnectivityLogEnabled" is not set to "True", this is a finding.
Fix: F-63299r942269_fix
Open the Exchange Management Shell and enter the following command: Set-TransportService -Identity <'IdentityName'> -ConnectivityLogEnabled $true Note: The <IdentityName> value must be in quotes.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- EX19-MB-000032
- Vuln IDs
-
- V-259653
- Rule IDs
-
- SV-259653r960879_rule
Checks: C-63392r942271_chk
Open the Exchange Management Shell and enter the following command: Get-EventLogLevel If the Diagnostic of any EventLevel is not set to "Lowest", this is a finding. Note: Default installation of Exchange has all Event Levels set to Lowest with exception of the following: MSExchange ADAccess\Topology - Low MSExchangeADAccess\Validation - Low MSExchange BackEndRehydration\Configuration - Low MSExchange BackEndRehydration\Server - 2 MSExchange OAuth\Configuration - Low MSExchange OAuth\Server - 2 MSExchange RBAC\RBAC - Low MSExchangeADTopology\Topology - Low All of these must be set to "Lowest".
Fix: F-63300r942272_fix
Open the Exchange Management Shell and enter the following command: Set-EventLogLevel -Identity <'IdentityName\EventlogName'> -Level Lowest Note: The <IdentityName\EventlogName> value must be in quotes.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- EX19-MB-000033
- Vuln IDs
-
- V-259654
- Rule IDs
-
- SV-259654r960879_rule
Checks: C-63393r942274_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select-Object -Property AdminAuditLogParameters Note: The value of "*" indicates all parameters are being audited. If the value of "AdminAuditLogParameters" is not set to "*", this is a finding.
Fix: F-63301r942275_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogParameters *
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- EX19-MB-000034
- Vuln IDs
-
- V-259655
- Rule IDs
-
- SV-259655r960882_rule
Checks: C-63394r942277_chk
Refer to the EDSP on who should be in the RBAC role group "Audit Log". It is automatically assigned to those in the Organization Management role group. In an Exchange management shell, run the following cmdlet: Get-RoleGroup "Records Management"|Get-RoleGroupMember Unless specified in the EDSP that custom role group is specified for this permission, if this role group is empty this is a finding.
Fix: F-63302r942278_fix
Refer to the EDSP on who should have the RBAC role "Audit Log". If a custom RBAC role is designated for the Audit Log role, ensure that the custom RBAC role group is populated. Follow the rule of least privilege. Otherwise, in an Exchange management shell, run the following: "Add-RoleGroupMember -Identity "Records Management" -Member <user>" Where <user> is the personnel responsible for handling audit logs.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- EX19-MB-000040
- Vuln IDs
-
- V-259656
- Rule IDs
-
- SV-259656r960900_rule
Checks: C-63395r942280_chk
Open the Exchange Management Shell and enter the following command: Get-TransportService | Select-Object -Property Name, Identity, MessageTrackingLogSubjectLoggingEnabled If the value of "MessageTrackingLogSubjectLoggingEnabled" is not set to "False", this is a finding.
Fix: F-63303r942281_fix
Open the Exchange Management Shell and enter the following command: Set-Transportservice -MessageTrackingLogSubjectLoggingEnabled $False
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- EX19-MB-000041
- Vuln IDs
-
- V-259657
- Rule IDs
-
- SV-259657r960900_rule
Checks: C-63396r942283_chk
Open the Exchange Management Shell and enter the following command: Get-TransportService | Select-Object -Property Name, MessageTrackingLogEnabled If the value of MessageTrackingLogEnabled is not set to True, this is a finding.
Fix: F-63304r942284_fix
Open the Exchange Management Shell and enter the following command: Set-TransportService <IdentityName> -MessageTrackingLogEnabled $true Note: The <IdentityName> value must be in quotes.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- EX19-MB-000042
- Vuln IDs
-
- V-259658
- Rule IDs
-
- SV-259658r960900_rule
Checks: C-63397r942286_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select-Object -Property Name, Identity, CircularLoggingEnabled If the value of "CircularLoggingEnabled" is not set to "False", this is a finding.
Fix: F-63305r942287_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -CircularLoggingEnabled $false Note: The <IdentityName> value must be in quotes.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- EX19-MB-000048
- Vuln IDs
-
- V-259659
- Rule IDs
-
- SV-259659r960918_rule
Checks: C-63398r942289_chk
Note: If a third-party application is performing monitoring functions, the reviewer should verify the application is monitoring correctly and mark the vulnerability not applicable (NA). Open the Exchange Management Shell and enter the following command: perfmon Get-MonitoringItemHelp -Identity <String> -Server <ServerIdParameter> If no sets are defined or queues are not being monitored, this is a finding.
Fix: F-63306r942290_fix
Open the Exchange Management Shell and enter the following command: perfmon In the left pane, navigate to and select Performance >> Data Collector Sets >> User Defined. Right-click and navigate to User Defined >> New >> Data Collector Sets and configure the system to use the data collection set for monitoring the queues.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- EX19-MB-000052
- Vuln IDs
-
- V-259660
- Rule IDs
-
- SV-259660r960930_rule
Checks: C-63399r942292_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups or users that should have "Read" access to the audit data. By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging. If any group or user has "Read" access to the audit data that is not documented in the EDSP, this is a finding.
Fix: F-63307r942293_fix
Update the EDSP to specify the authorized groups or users that should have "Read" access to the audit data or verify that this information is documented by the organization. Restrict any unauthorized groups' or users' "Read" access to the audit logs.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- EX19-MB-000053
- Vuln IDs
-
- V-259661
- Rule IDs
-
- SV-259661r960933_rule
Checks: C-63400r942295_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups or users that should have access to the audit data. By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging. If any group or user has modify privileges for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-63308r942296_fix
Update the EDSP to specify the authorized groups or users that should have access to the audit data or verify that this information is documented by the organization. Restrict any unauthorized groups' or users' modify permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- EX19-MB-000054
- Vuln IDs
-
- V-259662
- Rule IDs
-
- SV-259662r960936_rule
Checks: C-63401r942298_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups or users that should have "Delete" permissions for the audit data. By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging. If any group or user has "Delete" permissions for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-63309r942299_fix
Update the EDSP to specify the authorized groups or users that should have "Delete" permissions for the audit data or verify that this information is documented by the organization. Restrict any unauthorized groups' or users' "Delete" permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- EX19-MB-000058
- Vuln IDs
-
- V-259663
- Rule IDs
-
- SV-259663r960948_rule
Checks: C-63402r942301_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the audit logs' assigned partition. By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging. If the log files are not on a separate partition from the application, this is a finding.
Fix: F-63310r942302_fix
Update the EDSP to specify the audit logs' assigned partition or verify that this information is documented by the organization. Configure the audit log location to be on a partition drive separate from the application.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- EX19-MB-000061
- Vuln IDs
-
- V-259664
- Rule IDs
-
- SV-259664r986142_rule
Checks: C-63403r942304_chk
Open the Exchange Management Shell and enter the following command: Get-ExecutionPolicy If the value returned is not "RemoteSigned", this is a finding.
Fix: F-63311r942305_fix
Open the Exchange Management Shell and enter the following command: Set-ExecutionPolicy RemoteSigned
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX19-MB-000063
- Vuln IDs
-
- V-259665
- Rule IDs
-
- SV-259665r960963_rule
Checks: C-63404r942307_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeServer -status | Select-Object -Property Name, Identity, ErrorReportingEnabled For each Exchange Server, if the value of "ErrorReportingEnabled" is not set to "False", this is a finding.
Fix: F-63312r942308_fix
Open the Exchange Management Shell and enter the following command: Set-ExchangeServer -Identity <'IdentityName'> -ErrorReportingEnabled $false Note: The <IdentityName> value must be in quotes. Repeat the process for each Exchange Server.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX19-MB-000064
- Vuln IDs
-
- V-259666
- Rule IDs
-
- SV-259666r960963_rule
Checks: C-63405r942310_chk
Open the Exchange Management Shell and enter the following command: Get-OrganizationConfig | Select-Object -Property CustomerFeedbackEnabled If the value for "CustomerFeedbackEnabled" is not set to "False", this is a finding.
Fix: F-63313r942311_fix
Open the Exchange Management Shell and enter the following command: Set-OrganizationConfig -CustomerFeedbackEnabled $false
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX19-MB-000065
- Vuln IDs
-
- V-259667
- Rule IDs
-
- SV-259667r960963_rule
Checks: C-63406r942313_chk
Note: This requirement applies to IMAP4. IMAP Secure is not restricted and does not apply to this requirement. Open the Windows PowerShell and enter the following command: Get-Service -Name MSExchangeIMAPBE,MSExchangeImap4 |Select-Object -Property Name,StartType If ANY of the IMAP services StartType is NOT set to "Disabled", this is a finding.
Fix: F-63314r942314_fix
Open the Windows PowerShell in an Elevated Prompt and enter the following commands: Get-Service -Name MSExchangeIMAPBE,MSExchangeImap4 |ForEach-Object {Set-Service -Name $_.Name -StartupType Disabled}
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX19-MB-000066
- Vuln IDs
-
- V-259668
- Rule IDs
-
- SV-259668r960963_rule
Checks: C-63407r942316_chk
Get-Service -Name MSExchangePop3,MSExchangePOP3BE |Select-Object -Property Name,StartType If any of the POP3 services StartType is NOT set to "Disabled", this is a finding.
Fix: F-63315r942317_fix
Open the Windows PowerShell in an Elevated Prompt and enter the following commands: Get-Service -Name MSExchangePop3,MSExchangePOP3BE |ForEach-Object {Set-Service -Name $_.Name -StartupType Disabled}
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- EX19-MB-000105
- Vuln IDs
-
- V-259669
- Rule IDs
-
- SV-259669r961095_rule
Checks: C-63408r942319_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the location where the Exchange Mailbox databases reside. Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select-Object -Property Name, Identity, EdbFilePath Open Windows Explorer, navigate to the mailbox databases, and verify they are on a dedicated partition. If the mailbox databases are not on a dedicated partition, this is a finding.
Fix: F-63316r945442_fix
Update the EDSP to specify the location where the Exchange Mailbox databases reside or verify that this information is documented by the organization. Configure the mailbox databases on a dedicated partition. Ensure the drive that its being moved to has enough space for the database and logs (if not moving the logs to their own partition). Consult the EDSP and ensure that this is done within a maintenance window as this will incur downtime for any users connected to this mailbox database. Ensure backups are not running at the time this needs to be done. If this server is in a Database Availability Group, this cannot be done until all replicated copies of that database are removed first. Then the move operation can be performed. Once completed, replicated copies can be recreated appropriately. In an Exchange Management Shell, run the following (assuming copies of the database is removed if replicated or if it is a single copy database): Move-DatabasePath -Identity "<name of database>" -EdbFilePath "<drive>:\PathToDatabase\<MailboxDatabase.edb>" -LogFolderPath "<drive>:\LogFolderPath\" Example: Move-DatabasePath -Identity "Database1" -EdbFilePath "D:\MailboxDBs\Database1.edb" -LogFolderPath "D:\MailboxDBLogs\"
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001178
- Version
- EX19-MB-000106
- Vuln IDs
-
- V-259670
- Rule IDs
-
- SV-259670r961101_rule
Checks: C-63409r942322_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select-Object -Property Name, Identity, SmartHosts Identify the internet-facing connectors. For each Send connector, if the value of "SmartHosts" does not return the Smart Host IP address, this is a finding.
Fix: F-63317r942323_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -SmartHosts <'IP Address of Smart Host'> -DNSRoutingEnabled $false Note: The <IdentityName> and <IP Address of Smart Host> values must be in quotes. Repeat the procedure for each Send connector.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- EX19-MB-000115
- Vuln IDs
-
- V-259671
- Rule IDs
-
- SV-259671r961128_rule
Checks: C-63410r942325_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase| Select-Object -Property Name, Identity, RetainDeletedItemsUntilBackup If the value of "RetainDeletedItemsUntilBackup" is not set to "True", this is a finding.
Fix: F-63318r942326_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -RetainDeletedItemsUntilBackup $true Note: The <IdentityName> value must be in quotes.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- EX19-MB-000116
- Vuln IDs
-
- V-259672
- Rule IDs
-
- SV-259672r961128_rule
Checks: C-63411r942328_chk
Review the Email Domain Security Plan (EDSP). Determine any accounts that have been authorized to have email auto-forwarded. Note: If email auto-forwarding is not being used, this check is not applicable. Open the Exchange Management Shell and enter the following commands: Get-Mailbox | Select-Object -Property Name, Identity, Forward* Note: The asterisk (*) will grab both ForwardingAddress and ForwardingSMTPAddress. If any user has a forwarding SMTP address and is not documented in the EDSP, this is a finding. Note: If no remote SMTP domain matching the mail-enabled user or contact that allows forwarding is configured for users identified with a forwarding address, this function will not work properly.
Fix: F-63319r942329_fix
Update the EDSP. Open the Exchange Management Shell and enter the following command: Set-Mailbox -Identity <'IdentityName'> -ForwardingSMTPAdddress $null Note: The <IdentityName> value must be in quotes.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- EX19-MB-000117
- Vuln IDs
-
- V-259673
- Rule IDs
-
- SV-259673r961128_rule
Checks: C-63412r942331_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine any accounts that have been authorized to have email auto-forwarded. Note: If email auto-forwarding is not being used, this check is not applicable (NA). Open the Exchange Management Shell and enter the following commands: Get-RemoteDomain | Select Name, Identity, DomainName, AutoForwardEnabled |Format-List If any domain for a user forwarding SMTP address is not documented in the EDSP, this is a finding. Note: If no remote SMTP domain matching the mail-enabled user or contact that allows forwarding is configured for users identified with a forwarding address, this function will not work properly.
Fix: F-63320r942332_fix
Update the EDSP to specify any accounts that have been authorized to have email auto-forwarded or verify that this information is documented by the organization. For domains that are listed in the EDSP to allow AutoForwarding, open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <RemoteDomainIdParameter> -AutoForwardEnabled $true If the Remote Domain is NOT listed in the EDSP to allow for AutoForwarding, open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity [RemoteDomainIdentity] -AutoForwardingEnabled $false
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001094
- Version
- EX19-MB-000121
- Vuln IDs
-
- V-259674
- Rule IDs
-
- SV-259674r961152_rule
Checks: C-63413r942334_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select-Object -Property Name, Identity, MountAtStartup If the value of "MountAtStartup" is not set to "True", this is a finding.
Fix: F-63321r942335_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -MountAtStartup $true Note: The <IdentityName> value must be in quotes.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001094
- Version
- EX19-MB-000122
- Vuln IDs
-
- V-259675
- Rule IDs
-
- SV-259675r961152_rule
Checks: C-63414r942337_chk
Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select-Object -Property Name, Identity, ProhibitSendReceiveQuota If the value of "ProhibitSendReceiveQuota" is not set to "Unlimited", this is a finding. or If the value of "ProhibitSendReceiveQuota" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63322r942338_fix
Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -ProhibitSendReceiveQuota Unlimited Note: The <IdentityName> value must be in quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001094
- Version
- EX19-MB-000123
- Vuln IDs
-
- V-259676
- Rule IDs
-
- SV-259676r961152_rule
Checks: C-63415r942340_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the value for the Prohibit Send Quota limit. Open the Exchange Management Shell and enter the following command: Get-MailboxDatabase | Select-Object -Property Name, Identity, ProhibitSendQuota If the value of "ProhibitSendQuota" is not set to the site's Prohibit Send Quota limit, this is a finding.
Fix: F-63323r942341_fix
Update the EDSP to specify the value for the Prohibit Send Quota limit or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-MailboxDatabase -Identity <'IdentityName'> -ProhibitSendQuota <'QuotaLimit'> Note: The <IdentityName> and <QuotaLimit> values must be in quotes.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX19-MB-000124
- Vuln IDs
-
- V-259677
- Rule IDs
-
- SV-259677r961155_rule
Checks: C-63416r942343_chk
Review the EDSP or document that contains this information. Determine the global maximum message receive size and whether signoff with risk acceptance is documented for the Receive connector to have a different value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select-Object -Property Name, Identity, MaxMessageSize Identify internet-facing connectors. For each Receive connector, if the value of "MaxMessageSize" is not the same as the global value, this is a finding. or If "MaxMessageSize" is set to a numeric value different from the global value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63324r942344_fix
Update the EDSP to specify the global maximum message receive size and, if operationally necessary, to document signoff with risk acceptance for the receive connector to have a different value, or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -MaxMessageSize <'MaxReceiveSize'> Note: The <IdentityName> and <MaxReceiveSize> values must be in quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedure for each Receive connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX19-MB-000125
- Vuln IDs
-
- V-259678
- Rule IDs
-
- SV-259678r961155_rule
Checks: C-63417r942346_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the Max Hop Count value for Receive connectors. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select-Object -Property Name, MaxHopCount For each Receive connector, if the value of "MaxHopCount" is not set to "60", this is a finding. or If the value of "MaxHopCount" is set to a value other than "60" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63325r942347_fix
Update the EDSP to specify the "MaxHopCount" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -MaxHopCount 60 or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedure for each Receive connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX19-MB-000126
- Vuln IDs
-
- V-259679
- Rule IDs
-
- SV-259679r961155_rule
Checks: C-63418r942349_chk
Review the Email Domain Security Plan (EDSP). Determine the value for SMTP Server Maximum Outbound Connections. Open the Exchange Management Shell and enter the following command: Get-TransportService | Select-Object -Property Name, Identity, MaxOutboundConnections If the value of "MaxOutboundConnections" is not set to "1000", this is a finding. or If "MaxOutboundConnections" is set to a value other than "1000" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63326r942350_fix
Update the EDSP to specify the "MaxOutboundConnections" value. Open the Exchange Management Shell and enter the following command: Set-TransportService -Identity <'IdentityName'> -MaxOutboundConnections 1000 Note: The <IdentityName> value must be in quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX19-MB-000127
- Vuln IDs
-
- V-259680
- Rule IDs
-
- SV-259680r961155_rule
Checks: C-63419r942352_chk
Note: This requirement applies to IMAP4. IMAP Secure is not restricted and does not apply to this requirement. Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the Maximum Recipients per Message value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select-Object -Property Name, Identity, MaxRecipientsPerMessage For each Receive connector, evaluate the "MaxRecipientsPerMessage" value. For each Receive connector, if the value of "MaxRecipientsPerMessage" is not set to "5000", this is a finding. or If the value of "MaxRecipientsPerMessage" is set to a value other than "5000" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63327r942353_fix
Update the EDSP to specify the "MaxRecipientsPerMessage" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -MaxRecipientsPerMessage 5000 Note: The <IdentityName> value must be in quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedure for each Receive connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX19-MB-000128
- Vuln IDs
-
- V-259681
- Rule IDs
-
- SV-259681r961155_rule
Checks: C-63420r942355_chk
Review the EDSP or document that contains this information. Determine the maximum message send size. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select-Object -Property Name, Identity, MaxMessageSize For each Send connector, if the value of "MaxMessageSize" is not the same as the global value, this is a finding. or If "MaxMessageSize" is set to a numeric value different from the maximum message send size value documented in the EDSP, this is a finding.
Fix: F-63328r942356_fix
Update the EDSP to specify the "MaxMessageSize" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -MaxMessageSize <MaxSendSize> Note: The <IdentityName> value must be in quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Repeat the procedures for each Send connector.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX19-MB-000129
- Vuln IDs
-
- V-259682
- Rule IDs
-
- SV-259682r961155_rule
Checks: C-63421r942358_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the global maximum message receive size. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select-Object -Property Name, Identity, MaxReceiveSize If the value of "MaxReceiveSize" is not set to "10MB", this is a finding. or If "MaxReceiveSize" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63329r942359_fix
Update the EDSP to specify the "MaxReceiveSize" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-TransportConfig -MaxReceiveSize 10MB or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX19-MB-000130
- Vuln IDs
-
- V-259683
- Rule IDs
-
- SV-259683r961155_rule
Checks: C-63422r942361_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the global maximum message send size. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select-Object -Property Name, Identity, MaxSendSize If the value of "MaxSendSize" is not set to "10MB", this is a finding. or If "MaxSendSize" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63330r942362_fix
Update the EDSP to specify the "MaxSendSize" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-TransportConfig -MaxSendSize 10MB or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX19-MB-000131
- Vuln IDs
-
- V-259684
- Rule IDs
-
- SV-259684r961155_rule
Checks: C-63423r942364_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the value for Maximum Outbound Domain Connections. Open the Exchange Management Shell and enter the following command: Get-TransportService | Select-Object -Property Name, Identity, MaxPerDomainOutboundConnections If the value of "MaxPerDomainOutboundConnections" is not set to "20", this is a finding. or If "MaxPerDomainOutboundConnections" is set to a value other than "20" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63331r942365_fix
Update the EDSP to specify the "MaxPerDomainOutboundConnection" value or verify that this information is documented by the organization. Open the Exchange Management Shell and enter the following command: Set-TransportService -Identity <'IdentityName'> -MaxPerDomainOutboundConnections 20 Note: The <IdentityName> value must be in quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-001095
- Version
- EX19-MB-000132
- Vuln IDs
-
- V-259685
- Rule IDs
-
- SV-259685r961155_rule
Checks: C-63424r942367_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select-Object -Property Name, Identity, ConnectionInactivityTimeOut For each Send connector, if the value of "ConnectionInactivityTimeOut" is not set to "00:10:00", this is a finding. or If "ConnectionInactivityTimeOut" is set to a value other than "00:10:00" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63332r942368_fix
Update the EDSP to specify the "ConnectionInactivityTimeOut" value. Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -ConnectionInactivityTimeOut 00:10:00 Note: The <IdentityName> value must be in quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- SI-8
- Severity
- H
- CCI
- CCI-001308
- Version
- EX19-MB-000134
- Vuln IDs
-
- V-259686
- Rule IDs
-
- SV-259686r961161_rule
Checks: C-63425r942370_chk
Review the Email Domain Security Plan (EDSP). Determine the antivirus strategy. Verify the email-aware antivirus scanner product is Exchange 2019 compatible and DOD approved. If email servers are using an email-aware antivirus scanner product that is not DOD approved and Exchange 2019 compatible, this is a finding.
Fix: F-63333r942371_fix
Update the EDSP to specify the organization's antivirus strategy. Install and configure a DOD-approved compatible Exchange 2019 email-aware antivirus scanner product.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX19-MB-000135
- Vuln IDs
-
- V-259687
- Rule IDs
-
- SV-259687r961161_rule
Checks: C-63426r942373_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select-Object -Property Name, Identity, PermissionGroups |Format-List For each Receive connector, if the value of "PermissionGroups" is "AnonymousUsers" for any receive connector, this is a finding.
Fix: F-63334r942374_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity ['IdentityName'] -PermissionGroups and enter a valid value user group. Note: The <IdentityName> value must be in quotes. Example: Set-ReceiveConnector -Identity <'IdentityName'> -PermissionGroups ExchangeUsers Repeat the procedures for each Receive connector. This will remove the AnonymousUsers value simultaneously.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX19-MB-000136
- Vuln IDs
-
- V-259688
- Rule IDs
-
- SV-259688r961161_rule
Checks: C-63427r942376_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select-Object -Property Name, DomainName, Identity, AllowedOOFType If the value of "AllowedOOFType" is not set to "InternalLegacy", this is a finding.
Fix: F-63335r942377_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AllowedOOFType 'InternalLegacy' Note: The <IdentityName> and InternalLegacy values must be in quotes.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX19-MB-000137
- Vuln IDs
-
- V-259689
- Rule IDs
-
- SV-259689r961161_rule
Checks: C-63428r945436_chk
Review the Email Domain Security Plan (EDSP). Note: If using another DOD-approved anti-spam product for email or a DOD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable. Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig |Select-Object -Property Name, Enabled |Format-Table If no value is returned, this is a finding.
Fix: F-63336r942380_fix
Update the EDSP with the anti-spam mechanism used. Install the AntiSpam module. Open the Exchange Management Shell and enter the following command: & $env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX19-MB-000138
- Vuln IDs
-
- V-259690
- Rule IDs
-
- SV-259690r961161_rule
Checks: C-63429r942382_chk
Review the Email Domain Security Plan (EDSP). Note: If using another DOD-approved anti-spam product for email or a DOD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable. Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig | Select-Object -Property Name, Enabled|Format-Table; Get-SenderFilterConfig |Select-Object -Property Name, Enabled |Format-Table; Get-SenderIDConfig |Select-Object -Property Name, Enabled |Format-Table; Get-SenderReputationConfig |Select-Object -Property Name, Enabled |Format-Table If any of the above values returned are not set to "True", this is a finding.
Fix: F-63337r942383_fix
Update the EDSP with the anti-spam mechanism used. Open the Exchange Management Shell and enter the following command for any values that were not set to "True": Set-ContentFilterConfig -Enabled $true Set-SenderFilterConfig -Enabled $true Set-SenderIDConfig -Enabled $true Set-SenderReputationConfig -Enabled $true
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX19-MB-000139
- Vuln IDs
-
- V-259691
- Rule IDs
-
- SV-259691r961161_rule
Checks: C-63430r945437_chk
Review the Email Domain Security Plan (EDSP). Note: If using another DOD-approved anti-spam product for email or a DOD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable. Determine the internal SMTP servers. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Format-List InternalSMTPServers If any internal SMTP server IP address returned does not reflect the list of accepted SMTP server IP addresses, this is a finding.
Fix: F-63338r945438_fix
Note: Configure the IP addresses of every internal SMTP server. If the Mailbox server is the only SMTP server running the anti-spam agents, configure the IP address of the Mailbox server. Update the EDSP with the anti-spam mechanism used. Open the Exchange Management Shell and enter the following command: Single SMTP server address: Set-TransportConfig -InternalSMTPServers @{Add='<ip address1>'} Multiple SMTP server addresses: Set-TransportConfig -InternalSMTPServers @{Add='<ip address1>','<ip address2>'}
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- EX19-MB-000140
- Vuln IDs
-
- V-259692
- Rule IDs
-
- SV-259692r961161_rule
Checks: C-63431r942388_chk
Note: Automated replies to .mil or .gov sites are allowed. Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select-Object -Property Name, Identity, AutoReplyEnabled If the value of "AutoReplyEnabled" is set to "True" and is configured to only reply to .mil or .gov sites, this is not a finding. If the value of "AutoReplyEnabled" is not set to "False", this is a finding.
Fix: F-63339r942389_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AutoReplyEnabled $false Note: The <IdentityName> value must be in quotes.
- RMF Control
- SI-8
- Severity
- L
- CCI
- CCI-001308
- Version
- EX19-MB-000142
- Vuln IDs
-
- V-259693
- Rule IDs
-
- SV-259693r961161_rule
Checks: C-63432r942391_chk
Review the Email Domain Security Plan (EDSP). Determine the global maximum message recipient count. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select-Object -Property Name, Identity, MaxRecipientEnvelopeLimit If the value of "MaxRecipientEnvelopeLimit" is not set to "5000", this is a finding. or If "MaxRecipientEnvelopeLimit" is set to an alternate value and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63340r942392_fix
Update the EDSP to specify the global maximum message recipient count. Set-TransportConfig -MaxRecipientEnvelopeLimit 5000 or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Restart the Microsoft Exchange Information Store service.
- RMF Control
- Severity
- M
- CCI
- CCI-004964
- Version
- EX19-MB-000146
- Vuln IDs
-
- V-259694
- Rule IDs
-
- SV-259694r986143_rule
Checks: C-63433r942394_chk
Open the Exchange Management Shell and run the following cmdlets: Get-TransportAgent "Malware Agent" If the identity "Malware Agent" is not set to "Enabled", this is a finding.
Fix: F-63341r942395_fix
Open the Exchange Management Shell and run the following command: & $env:ExchangeInstallPath\Scripts\Enable-AntimalwareScanning.ps1 This will automatically enable the anti-malware agent. After the script completes, run the following cmdlet to complete the process: Restart-Service MSExchangeTransport This may take up to 10 minutes to take effect.
- RMF Control
- Severity
- M
- CCI
- CCI-004964
- Version
- EX19-MB-000147
- Vuln IDs
-
- V-259695
- Rule IDs
-
- SV-259695r986145_rule
Checks: C-63434r942397_chk
In Exchange Management shell, run the following cmdlet: Get-MalwareFilteringServer |Select-Object -Property Name, *Update* If the property "Update frequency" is not set, this is a finding. If the Malware agent is not installed, then this is not applicable.
Fix: F-63342r986144_fix
In an elevated Exchange management shell, run the following cmdlet: Set-MalwareFilteringServer -Identity <Identity> -UpdateFrequency <integer> Where <Identity> is the name of the Exchange Server and <integer> is the update frequency (in minutes). Refer to the Enterprise Domain Security Plan (EDSP) for the update cadence that best aligns with the user's organization.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- EX19-MB-000151
- Vuln IDs
-
- V-259696
- Rule IDs
-
- SV-259696r986146_rule
Checks: C-63435r942400_chk
Open the Exchange Management Shell and enter the following command: Get-TransportAgent "Malware Agent" If the value of "Enabled" is set to "True", this is a finding.
Fix: F-63343r942401_fix
Open the Exchange Management Shell and enter the following command: & env:ExchangeInstallPath\Scripts\Disable-Antimalwarescanning.ps1
- RMF Control
- AC-12
- Severity
- L
- CCI
- CCI-002361
- Version
- EX19-MB-000158
- Vuln IDs
-
- V-259697
- Rule IDs
-
- SV-259697r961221_rule
Checks: C-63436r942403_chk
Review the Email Domain Security Plan (EDSP) and determine the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select-Object -Property Name, Identity, ConnectionTimeout For each Receive connector, if the value of "ConnectionTimeout" is not set to "00:10:00", this is a finding. or If "ConnectionTimeout" is set to other than "00:10:00" and has signoff and risk acceptance in the EDSP, this is not a finding.
Fix: F-63344r942404_fix
Update the EDSP to specify the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -ConnectionTimeout 00:10:00 Note: The <IdentityName> value must be in quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- EX19-MB-000173
- Vuln IDs
-
- V-259698
- Rule IDs
-
- SV-259698r961353_rule
Checks: C-63437r945441_chk
Review the Email Domain Security Plan (EDSP) to verify which users should be in each built-in RBAC management role group. If this is not found, this is a finding.
Fix: F-63345r942407_fix
Update the EDSP and define which users should and should not have elevated privileges within the organization. Follow the rule of least privilege and ensure that administrators are given just enough access to complete their job. Referenced Document: https://docs.microsoft.com/en-us/exchange/understanding-management-role-groups-exchange-2013-help?view=exchserver-2019
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- EX19-MB-000194
- Vuln IDs
-
- V-259699
- Rule IDs
-
- SV-259699r986147_rule
Checks: C-63438r942409_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the authorized groups and users that have access to the Exchange application directories. Verify the access permissions on the directory match the access permissions listed in the EDSP. If any group or user has different access permissions, this is a finding. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
Fix: F-63346r942410_fix
Update the EDSP to specify the authorized groups and users that have access to the Exchange application directories or verify that this information is documented by the organization. Navigate to the Exchange application directory and remove or modify the group or user access permissions. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- EX19-MB-000196
- Vuln IDs
-
- V-259700
- Rule IDs
-
- SV-259700r961461_rule
Checks: C-63439r942412_chk
Review the Email Domain Security Plan (EDSP) or document that contains this information. Determine the software baseline. Review the application software baseline procedures and implementation artifacts. Note the list of files and directories included in the baseline procedure for completeness. If an email software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Fix: F-63347r942413_fix
Update the EDSP to specify the software baseline, procedures, and implementation artifacts or verify that this information is documented by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- EX19-MB-000197
- Vuln IDs
-
- V-259701
- Rule IDs
-
- SV-259701r986148_rule
Checks: C-63440r942415_chk
Review the Email Domain Security Plan (EDSP). Determine whether the site monitors system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on servers for unauthorized changes against a baseline on a weekly basis. If software files are not monitored for unauthorized changes, this is a finding. Note: An approved and properly configured solution will contain both a list of baselines that includes all system file locations and a file comparison task that is scheduled to run at least weekly.
Fix: F-63348r942416_fix
Update the EDSP to specify that the organization monitors system files on servers for unauthorized changes against a baseline on a weekly basis or verify that this information is documented by the organization. Monitor the software files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on Exchange servers for unauthorized changes against a baseline on a weekly basis. Note: This can be done with the use of various monitoring tools.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- EX19-MB-000198
- Vuln IDs
-
- V-259702
- Rule IDs
-
- SV-259702r961470_rule
Checks: C-63441r942418_chk
Review the Email Domain Security Plan (EDSP). Note: Required services will vary among organizations depending on the role of the individual system. Organizations will develop their own list of services, which will be documented and justified with the information system security officer (ISSO). The site's list will be provided for any security review. Services that are common to multiple systems can be addressed in one document. Exceptions for individual systems should be identified separately by system. Open a Windows PowerShell and enter the following command: Get-Service | Where-Object {$_.status -eq 'running'} Note: The command returns a list of installed services and the status of that service. If the services required are not documented in the EDSP, this is a finding. If any undocumented or unnecessary services are running, this is a finding.
Fix: F-63349r942419_fix
Update the EDSP to specify the services required for the system to function. Remove or disable any services that are not required.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- EX19-MB-000203
- Vuln IDs
-
- V-259703
- Rule IDs
-
- SV-259703r961494_rule
Checks: C-63442r942421_chk
Open the Exchange Management Shell and enter the following command: Get-OutlookAnywhere Get-OutlookAnywhere | Select-Object -Property Name, Identity, InternalClientAuthenticationMethod, ExternalClientAuthenticationMethod If the value of "InternalClientAuthenticationMethod" and the value of "ExternalClientAuthenticationMethod" are not set to NTLM, this is a finding.
Fix: F-63350r942422_fix
Open the Exchange Management Shell and enter the following command: For InternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -InternalClientAuthenticationMethod NTLM For ExternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -ExternalClientAuthenticationMethod NTLM
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- EX19-MB-000229
- Vuln IDs
-
- V-259704
- Rule IDs
-
- SV-259704r961608_rule
Checks: C-63443r942424_chk
Review the Email Domain Security Plan (EDSP). Determine if the directory Exchange is installed: 1. Open Windows Explorer. 2. Navigate to where Exchange is installed. If Exchange resides on a directory or partition other than that of the operating system and does not have other applications installed (unless approved by the Information System Security Officer [ISSO]), this is not a finding.
Fix: F-63351r942425_fix
Update the EDSP with the location of where Exchange is installed. Install Exchange on a dedicated application directory or partition separate than that of the operating system.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX19-MB-000230
- Vuln IDs
-
- V-259705
- Rule IDs
-
- SV-259705r961620_rule
Checks: C-63444r942427_chk
Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select-Object -Property Identity, DeliveryReportEnabled If the value of "DeliveryReportEnabled" is not set to "False", this is a finding.
Fix: F-63352r942428_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -DeliveryReportEnabled $false Note: The <IdentityName> value must be in quotes.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX19-MB-000231
- Vuln IDs
-
- V-259706
- Rule IDs
-
- SV-259706r961620_rule
Checks: C-63445r942430_chk
Note: For the purpose of this requirement, "remote" refers to those domains external to the DODIN, whether classified or unclassified. NDRs between DODIN networks is permitted. Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select-Object -Property Name, Identity, NDREnabled If the value of "NDREnabled" is not set to "False", this is a finding.
Fix: F-63353r942431_fix
Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -NDREnabled $false Note: The <IdentityName> value must be in quotes.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX19-MB-000232
- Vuln IDs
-
- V-259707
- Rule IDs
-
- SV-259707r961620_rule
Checks: C-63446r942433_chk
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select-Object -Property Name, Identity, Banner For each Receive connector, if the value of "Banner" is not set to "220 SMTP Server Ready", this is a finding.
Fix: F-63354r942434_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -Banner '220 SMTP Server Ready' Note: The <IdentityName> and 220 SMTP Server Ready values must be in quotes. Repeat the procedures for each Receive connector.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX19-MB-000233
- Vuln IDs
-
- V-259708
- Rule IDs
-
- SV-259708r961620_rule
Checks: C-63447r942436_chk
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select-Object -Property Name, Identity, TlsAuthLevel For each Send connector, if the value of "TlsAuthLevel" is not set to "DomainValidation", this is a finding.
Fix: F-63355r942437_fix
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'IdentityName'> -TlsAuthLevel DomainValidation Note: The <IdentityName> value must be in quotes. Repeat the procedure for each Send connector.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX19-MB-000234
- Vuln IDs
-
- V-259709
- Rule IDs
-
- SV-259709r961620_rule
Checks: C-63448r942439_chk
Review the Email Domain Security Plan (EDSP). Determine if a Database Availability Group exists. From Exchange Admin Center: 1. In the pane on the left, navigate to "servers". 2. In the pane on the right, navigate to the "database availability groups" tab. 3. Verify a database availability group is configured with member servers. If two or more member servers are not listed, this is a finding. From Exchange PowerShell, run the following cmdlet: Get-DatabaseAvailabilityGroup If no DatabaseAvailabilityGroup is listed or a Database Availability Group is listed but has no member servers, this is a finding. Determine if the Exchange Mailbox databases are using redundancy. From Exchange Admin Center: 1. In the pane on the left, navigate to "servers". 2. In the pane on the right, navigate to the "databases" tab. 3. For each database, check the column "SERVERS WITH COPIES". Unless specified in the EDSP, if the "SERVERS WITH COPIES" column does not have two or more servers listed, this is a finding. From Exchange PowerShell, run the following cmdlet: Get-MailboxDatabaseCopyStatus -Identity <DatabaseName> Unless specified in the EDSP, if the output of this cmdlet does not show more than one copy, this is a finding.
Fix: F-63356r942440_fix
Update the EDSP to specify how Exchange Mailbox databases use redundancy. Add two or more Mailbox servers to the database availability group. Add a database copy to one or more member servers within the database availability group.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001184
- Version
- EX19-MB-000236
- Vuln IDs
-
- V-259710
- Rule IDs
-
- SV-259710r961632_rule
Checks: C-63449r942442_chk
Note: AuthMechanism may include other mechanisms as long as the "Tls" is identified. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select-Object -Property Name, Identity, AuthMechanism For each Receive connector, if the value of "AuthMechanism" is not set to "Tls", this is a finding.
Fix: F-63357r942443_fix
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -AuthMechanism 'Tls' Note: The <IdentityName> value must be in quotes. Repeat the procedures for each Receive connector.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- EX19-MB-000244
- Vuln IDs
-
- V-259711
- Rule IDs
-
- SV-259711r961683_rule
Checks: C-63450r942445_chk
Determine the most current, approved service pack. Open the Exchange Management Shell and enter the following command: Get-ExchangeServer | Select-Object -Property Name, AdminDisplayVersion |Format-List If the value of "AdminDisplayVersion" does not return the most current, approved Cumulative Update (CU), this is a finding.
Fix: F-63358r942446_fix
Consult the EDSP for the accepted update process within the organization. Install the most current, approved CU. Microsoft recommends as a best practice to always install the latest CU when creating a new server. Existing servers keep as up-to-date as possible and backup any customizations. Follow any additional recommendations by going to the following website: https://learn.microsoft.com/en-us/Exchange/plan-and-deploy/install-cumulative-updates?view=exchserver-2019 All Exchange 2019 updates can be found on the Microsoft Exchange update site: https://learn.microsoft.com/en-us/Exchange/new-features/updates?view=exchserver-2019 Exchange CUs must be manually downloaded. Since CUs are full installations of Exchange, there is no need to install the "Release to Manufacturer" version first. However, once installed, it cannot be uninstalled. Installation must be done on a test server first before placing in production to ensure that it does not disrupt services or conflict with existing configurations. Note: Some CUs will require an Active Directory Schema extension, which adds new Exchange attributes. Consult the EDSP and ensure appropriate permissions before beginning an update. Note: Security updates (SUs) can be downloaded and triggered through Windows Updates by going to Windows Update >>Advanced Options >> "Choose how updates are installed" and select the box "Give me updates for other Microsoft products when I update Windows" if the Exchange server is connected to the web or internal Windows Update Services.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- EX19-MB-000283
- Vuln IDs
-
- V-259712
- Rule IDs
-
- SV-259712r961863_rule
Checks: C-63451r942448_chk
Open a Windows PowerShell Module and enter the following commands: Get-Website | Select-Object -Property Name Get-WebBinding -Name <'WebSiteName'> | Format-List If the Web binding values returned are not on standard port 80 for HTTP connections or port 443 for HTTPS connections, this is a finding. Note: This is excluding the Exchange Back End website which uses 81/444. Repeat the process for each website.
Fix: F-63359r942449_fix
Configure web ports to be ports 80 and 443, as specified by PPSM standards. In an Exchange Management Shell, run the following cmdlet on the "Default Web Site": Set-WebBinding -Name 'Default Web Site' -BindingInformation "127.0.0.1:443:" -PropertyName Port -Value 443 Set-WebBinding -Name 'Default Web Site' -BindingInformation ":443:" -PropertyName Port -Value 443 Note: This does not apply to the Exchange Back End website.