Microsoft Exchange Server 2003
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-313 Exch2K3
- Vuln IDs
-
- V-18641
- Rule IDs
-
- SV-20214r1_rule
Checks: C-22339r1_chk
Ensure that mailbox stores are not configured. Procedure: Exchange System Manager >>Administrative Groups >> [administrative group]>> Servers >> [server name] >> First Storage Group Individual list of user mailboxes should be an empty list. Criteria: If user mailbox list is empty, this is not a finding.
Fix: F-19272r1_fix
Configure non-Mailbox Server role. Procedure: Exchange System Manager >>Administrative Groups >> [administrative group]>> Servers >> [server name] >> First Storage Group Remove Mailbox store and mailboxes. Note: Additional administrative tasks to modify dependent configurations may be necessary.
- RMF Control
- Severity
- H
- CCI
- Version
- EMG2-323 Exch2K3
- Vuln IDs
-
- V-18642
- Rule IDs
-
- SV-20216r1_rule
Checks: C-22340r1_chk
Ensure that E-Mail servers require S/MIME capable clients. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> General tab The “Clients support S/MIME signatures” should be selected. Criteria: If the “Clients support S/MIME signatures” is selected, this is not a finding.
Fix: F-19273r1_fix
Configure requirement for S/MIME capable clients. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> General tab Select the “Clients support S/MIME signatures” checkbox.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-136 Exch2K3
- Vuln IDs
-
- V-18643
- Rule IDs
-
- SV-20218r1_rule
Checks: C-22342r1_chk
First, make a note of the configured SMTP Virtual Server message size (example, the default is 10,240 KB). Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server name] >> Protocols >> SMTP >> [Specific SMTP Virtual Server] >> Properties >> Messages Tab >>Limit message size to: (KB) Use the SMTP Virtual Server Message Size to configure the Mail Store Quota values. Progression of configured values should be 'equal to' or 'greater than' one message size value to prevent an alert being skipped due to one message. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> Limits tab “Issue warning at (KB)” should be selected and have a value. “Prohibit send at (KB)” should be selected and have a value. "Prohibit send and receive at (KB)" should not be selected. Criteria: If “Issue warning at (KB)” and “Prohibit send at (KB)” are selected, and have assigned values, with "Prohibit send and receive at (KB)" not selected, this is not a finding.
Fix: F-19275r1_fix
Make a note of SMTP Virtual Server Message size limitation. Administrative Groups >> [administrative group] >> Servers >> [server name] >> Protocols >> SMTP ? [Specific SMTP Virtual Server] >> Properties >> Messages Tab >>Limit message size to: (KB) Use the message size value to configure Mail Store Quota values. Limits should be at least as big as SMTP message size. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server name] >> [storage group] >> Mailbox store [server name] >> Properties >> Limits tab Select “Issue warning at (KB)” and enter a quota value. Select “Prohibit send at (KB)" and enter a quota value at least as large as "Issue warning at (KB) plus the value of SMTP Virtual Server message size. Do not Select "Prohibit send and Receive at (KB)" Note: Progression of configured actions should be equal to or greater than one message size to prevent an alert being skipped due to one message.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-139 Exch2K3
- Vuln IDs
-
- V-18644
- Rule IDs
-
- SV-20220r1_rule
Checks: C-22343r1_chk
If site is not using Public Folders, this is N/A. First, make a note of the Public Folder stores item size. Administrative Groups >> [administrative group] >> Servers >> [server name] >> Storage group >> Public Folder store [Server name] >> Properties >> Limits Tab >>Maximum item size: (KB) Use the Maximum item size value to configure the Public Folder Store quota values. Progression of configured values should be 'equal to' or 'greater than' one message size value to prevent an alert being skipped due to one message. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public Folder store [server name] >> properties >> Limits tab “Issue warning at (KB)” should be selected, and have a value . No other limit should be selected. Criteria: If "Issue warning at (KB)" is selected and has value that is a multiple of a message size, with no other limits selected, this is not a finding.
Fix: F-19514r1_fix
Make a note of the Public Folder stores item size as follows: Administrative Groups >> [administrative group] >> Servers >> [server name] >> Storage group >> Public Folder store [Server name] >> Properties >> Limits Tab >>Maximum item size: (KB) Use Maximum Item size to configure Public Folder Store quota. The value should be 'equal to' or 'greater than' one Public Folder limit on item size. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public folder store [server name] >> properties >> Limits tab Select “Issue warning at (KB)” and assign a value. Do not select “Prohibit post at (KB). Note: Configured actions should be multiples of one item size to prevent an alert being skipped due to one message.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-507 Exch2K3
- Vuln IDs
-
- V-18645
- Rule IDs
-
- SV-20222r1_rule
Checks: C-22344r1_chk
If Public Folders are not in use at the site, this check is N/A. For each Public Folder, assess Public Folder overrides for storage limitation alerts. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Folders >> Public Folders >> [Public Folder] >> Properties >> Limits tab >> Storage limits The “Use public store defaults” checkbox should be selected. Criteria: If the “Use public store defaults” checkbox is selected, this is not a finding.
Fix: F-19276r1_fix
Configure the Public Folder Store Limit setting. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Folders >> Public Folders >> [Public Folder] >> Properties >> Limits tab >> Storage limits Select the “Use public store defaults” checkbox.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-318 Exch2K3
- Vuln IDs
-
- V-18646
- Rule IDs
-
- SV-20224r1_rule
Checks: C-22345r1_chk
Ensure that Mailbox Stores Mount at Startup. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> Database tab The “Do not mount this store at startup” should be cleared. Criteria: If the “Do not mount this store at startup” checkbox is cleared, this is not a finding.
Fix: F-19277r1_fix
Configure Mailbox Mount at Startup. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> Database tab Clear the “Do not mount this store at startup” checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-320 Exch2K3
- Vuln IDs
-
- V-18655
- Rule IDs
-
- SV-20254r1_rule
Checks: C-22374r1_chk
If Public Folder stores are not in use at the site, this is N/A. Ensure that Public Folder Stores "Do not Mount at Startup" is disabled. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public Folder store [server name] >> properties >> Database tab The “Do not mount this store at startup” should be cleared. Criteria: If the “Do not mount this store at startup” checkbox is cleared, this is not a finding.
Fix: F-19303r1_fix
Enable Public Folder Stores "Mount at Startup" feature. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public Folder store [server name] >> properties >> Database tab Clear the “Do not mount this store at startup” checkbox.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-511 Exch2K3
- Vuln IDs
-
- V-18658
- Rule IDs
-
- SV-20260r1_rule
Checks: C-22377r1_chk
If Public Folders are not in use, this is N/A. Review the 'Send on behalf of' field. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Folders >> Public Folders >> [Public Folder] >> Properties >> Exchange General tab >> Delivery Options button. The “Send on Behalf of” list should be empty. Criteria: If the “Send on Behalf” list is empty, this is not a finding.
Fix: F-19306r1_fix
Disable the Public Folder “send on behalf of” feature. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Folders >> Public Folders [Public Folder] >> Properties >> Exchange General Tab >> Delivery Options Button. Empty the “Send on Behalf of” list.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-046 Exch2K3
- Vuln IDs
-
- V-18660
- Rule IDs
-
- SV-20264r1_rule
Checks: C-22379r1_chk
Procedure: Exchange System Manager >> Global Settings >> Internet Messages >>Formats >> {specific format name} >> Properties >> Advanced tab >> {item list} The "Automated Response Messages" checkbox should be cleared. Criteria: For each listed format, if the "Automated Response Messages" checkbox is cleared, this is not a finding.
Fix: F-19308r1_fix
Disable automated responses. Procedure: Exchange System Manager >> Global Settings >> Internet Messages >>Formats >> {specific format name} >> Properties >> Advanced tab >> {item list} For each profile in the list, clear the "Automated Response Messages" checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-013 Exch2K3
- Vuln IDs
-
- V-18661
- Rule IDs
-
- SV-20266r1_rule
Checks: C-22380r1_chk
Interview the E-mail Administrator or the IAO. Request documentation that indicates any manually entered Global Accept and Deny list configurations are in place on an E-mail Secure Gateway at the network perimeter. Ensure that the local domain appears in the 'Deny' list for the domain to prevent spoofed SPAM. Criteria: If Perimeter Gateway configurations indicate that the local domain exists in the 'Deny' List and that no entries exist in the 'Accept' List, this is not a finding.
Fix: F-19528r1_fix
Procedure: Implement perimeter protection in the form of a secure E-mail filtering mechanism that performs, among other protections, manually configured 'Deny' List entries (that include the local domain, minimally) to supplement the commercial 'Block List' service. Ensure also, that no 'Accept' List entries exist in the configuration.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-029 Exch2K3
- Vuln IDs
-
- V-18662
- Rule IDs
-
- SV-20268r1_rule
Checks: C-22381r1_chk
Interview the E-mail Administrator or the IAO. Request documentation that indicates SPAM evaluation filters are in place on an Edge Transport Server (E-mail Secure Gateway Server) role outside the network perimeter. Criteria: If the mailbox servers are protected by a perimeter-based Edge Transport Server role (E-mail Secure Gateway) which performs SPAM filtering prior to forwarding E-mail to the mailbox servers, this is not a finding.
Fix: F-19309r1_fix
Implement perimeter protection in the form of a secure email filtering mechanism that performs, among other protections, SPAM elimination prior to forwarding message traffic to mailbox servers.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-015 Exch2K3
- Vuln IDs
-
- V-18663
- Rule IDs
-
- SV-20270r1_rule
Checks: C-22382r1_chk
Interview the E-mail Administrator or the IAO. Request documentation that indicates Block List Services filters are in place on an E-mail Secure Gateway outside the enclave at the perimeter. Criteria: If the Exchange 2003 mailbox servers are protected by a perimeter-based Edge Transport Server role (E-mail Secure Gateway), which performs 'Block List' filtering prior to forwarding E-mail to the mailbox servers, this is not a finding.
Fix: F-19310r1_fix
Subscribe to, and configure, Block List Services. Implement perimeter-based protection in the form of a secure E-mail filtering mechanism that performs, among other protections, Block List Services filtering for SPAM elimination prior to forwarding message traffic to mailbox servers.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-017 Exch2K3
- Vuln IDs
-
- V-18664
- Rule IDs
-
- SV-20272r1_rule
Checks: C-22383r1_chk
Interview the E-mail Administrator or the IAO. Request documentation that indicates Block List Services filters are in place, with no exceptions (or exceptions documented as to reasons), on an E-mail Secure Gateway outside the enclave at the network perimeter. Criteria: If Block List Exceptions are configured and approved on an Edge Transport Server role (perimeter-based E-mail Secure Gateway), this is not a finding.
Fix: F-19311r1_fix
Implement perimeter-based protection in the form of a secure E-mail filtering mechanism that performs, among other protections, Block List exceptions filtering for SPAM elimination prior to forwarding message traffic to mailbox servers.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-043 Exch2K3
- Vuln IDs
-
- V-18665
- Rule IDs
-
- SV-20274r1_rule
Checks: C-22384r1_chk
Interview the E-mail Administrator or the IAO. Request documentation that indicates sender authentication techniques are in place on a secure email gateway server outside the enclave at the perimeter. Sender authentication for anonymous connections may take the form of Sender ID Framework (SIDF) or Domain Keys Internet Mail (DKIM), both DNS-based methods of sender authentication. Note: Sender authentication is not always reliable, because not all senders of electronic mail participate in creating public DNS sender profiles for their E-mail infrastructure. Criteria: If sender authentication is configured and approved on a perimeter-based E-mail Secure Gateway, this is not a finding.
Fix: F-19312r1_fix
Implement perimeter-based protection in the form of an Edge Transport Server role (E-mail Secure Gateway) filtering mechanism that performs, among other protections, Sender Authentication upon receipt.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-005 Exch2K3
- Vuln IDs
-
- V-18666
- Rule IDs
-
- SV-20276r1_rule
Checks: C-22385r1_chk
Verify that the “Set message size”, is not set to Unlimited. Procedure: Exchange System Manager >> Global Settings >> Message Delivery>> Properties >> Defaults tab The "Send Size" and "Receive Size" should have a value, and not have "unlimited" selected. Criteria: If "Send Size" and "Receive Size" have a value, and have not selected "unlimited", this is not a finding.
Fix: F-19313r1_fix
Set the Global Send and Receive message sizes. Procedure: Exchange System Manager >> Global Settings >> Message Delivery>> Properties >> Defaults tab Set "Send Size" and "Receive Size" to a value (do not select Unlimited). Default size limits are as follows (to be used if other sizes are not justified): Send Size =10,240 Receive Size = 10,240
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-010 Exch2K3
- Vuln IDs
-
- V-18667
- Rule IDs
-
- SV-20278r1_rule
Checks: C-22386r1_chk
Review Message Size setting for each SMTP virtual server. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages tab Note: If “administrative groups” do not display in the list, highlight the topmost “Exchange” item in the left hand list, then access the Action menu, select Properties, check the “Display Routing Groups” box, and the “display administrative groups” box. Exit Exchange Manager, then restart it, and repeat the “check” steps. The checkbox for “Limit Message size to (KB)” should be cleared. Criteria: If the “Limit Message Size to (KB)" is cleared, this is not a finding.
Fix: F-19314r1_fix
Set the sending and receiving message size for the SMTP virtual server to unlimited. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages tab Clear the checkbox for “Limit Message size to (KB)”
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-129 Exch2K3
- Vuln IDs
-
- V-18668
- Rule IDs
-
- SV-20280r1_rule
Checks: C-22387r1_chk
Perform for each SMTP virtual server: Note: If “administrative groups” do not display in the list, highlight the topmost “Exchange” item in the left hand list, then access the Action menu, select Properties, check the “Display Routing Groups” box, and the “display administrative groups” box. Exit Exchange Manager, then restart it, and repeat the “check” steps. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages Tab The "Limit Session Size to (KB)" field should be cleared. Criteria: If the “Limit Session Size to (KB)" is cleared, this is not a finding.
Fix: F-19315r1_fix
Set the SMTP Session Size Limit. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages Tab Clear the “Limit Session size to (KB)” field.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-149 Exch2K3
- Vuln IDs
-
- V-18669
- Rule IDs
-
- SV-20282r1_rule
Checks: C-22388r1_chk
Perform for each SMTP virtual server. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages tab The “Limit number of messages per connection” should be set to 20. Criteria: If “Limit number of messages per connection” is set to 20 (or other value with justifying documentation), this is not a finding.
Fix: F-19316r1_fix
Configure the SMTP Session messages count limit. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages tab Set “Limit number of messages per connection” at 20 or the value determined necessary for the site.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-107 Exch2K3
- Vuln IDs
-
- V-18670
- Rule IDs
-
- SV-20284r1_rule
Checks: C-22389r1_chk
Verify the SMTP Virtual Server Recipient Count Limit. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMPT >> [specific SMPT server] >> Properties >>Messages Tab The “Limit number of recipients per message” should be is set to a numeric value of 64000 (default) or less. Criteria: If “Limit number of recipients per message” is set to a numeric value of 64000 (default) or less, and the System Security Plan documentation has a documented reason, this is not a finding.
Fix: F-19317r1_fix
Set the SMTP Virtual Server Message Recipient Count limit.. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages Tab Select “Limit number of recipients per message" to 64000.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-006 Exch2K3
- Vuln IDs
-
- V-18671
- Rule IDs
-
- SV-20286r1_rule
Checks: C-22390r1_chk
Ensure that Global Recipient Count is not set to "Unlimited". Proceure: Exchange System Manager >> Global Settings >> Message Delivery>> Properties >> Defaults tab >> Recipient Limits The "Recipient Count" should be set to a value, not "Unlimited". Criteria: If "Recipient Count" is set to a value, not "Unlimited", this is not a finding.
Fix: F-19318r1_fix
Set the Recipient Count limit. Procedure: Exchange System Manager >> Global Settings >> Message Delivery>> Properties >> Defaults tab Set "Recipients" to a value (do not select Unlimited). The default value is 5000, but can be set lower if local site conditions warrant it and the reason is documented in the System Security Plan.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-031 Exch2K3
- Vuln IDs
-
- V-18672
- Rule IDs
-
- SV-20288r1_rule
Checks: C-22391r1_chk
Interview the E-mail Administrator or the IAO. Request documentation that indicates Nonexistent Recipient filters are in place and set to allow messages, on an Edge Transport Server role (E-mail Secure Gateway)at the network perimeter. Criteria: If non-existent recipients' messages are received for evaluation, this is not a finding
Fix: F-19319r1_fix
Implement perimeter-based protection in the form of an Edge Transport Server role (E-mail Secure Gateway) filtering mechanism that performs, among other protections, Non-Existent Recipient filtering that does not alert senders to non-existent recipients.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-024 Exch2K3
- Vuln IDs
-
- V-18673
- Rule IDs
-
- SV-20290r1_rule
Checks: C-22392r1_chk
Interview the E-mail Administrator or the IAO. Request documentation that indicates Filtered messages are archived on a secure email gateway server outside the enclave at the perimeter. Criteria: If inbound messages filtered by the sender filter are archived, this is not a finding.
Fix: F-19320r1_fix
Implement perimeter-based protection in the form of a secure email filtering mechanism that performs, among other protections, filtered messages archiving for SPAM elimination prior to forwarding message traffic to mailbox servers inside the enclave.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-026 Exch2K3
- Vuln IDs
-
- V-18674
- Rule IDs
-
- SV-20292r1_rule
Checks: C-22393r1_chk
Interview the E-mail Administrator or the IAO. Request documentation that indicates Messages with blank senders are filtered at the perimeter by an Edge Tranport Server role (E-mail Secure Gateway). Criteria: If inbound messages with blank sender are filtered and archived, this is not a finding.
Fix: F-19321r1_fix
Implement perimeter-based protection in the form of an Edge Transport Role server (E-mail Secure Gateway) filtering mechanism that performs, among other protections, filtering messages with blank sender and archiving them for SPAM elimination.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-021 Exch2K3
- Vuln IDs
-
- V-18675
- Rule IDs
-
- SV-20294r1_rule
Checks: C-22394r1_chk
Interview the E-mail Administrator or the IAO. Request documentation that indicates connections from sources matching sender filters are dropped on an Edge Transport Role (E-mail Secure Gateway) server outside the enclave at the perimeter. Criteria: If incoming connections from “sender filter” sources are dropped, this is not a finding.
Fix: F-19322r1_fix
Implement perimeter-based protection in the form of a Secure E-mail Gateway that performs, among other protections, dropping connections when the address matches “sender filter” sources, for SPAM elimination prior to forwarding message traffic to mailbox servers.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-801 Exch2K3FE
- Vuln IDs
-
- V-18676
- Rule IDs
-
- SV-20296r1_rule
Checks: C-22395r1_chk
Verify that unneeded Front End services are disabled. Procedure: Microsoft Exchange Information Store Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\MSExchangeIS Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange MTA Stacks Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\MSExchangeMTA Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange Routing Engine Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\RESVC Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange IMAP4 Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\IMAP4SVC Key: START Value: Reg_DWORD 0x00000004. Microsoft Exchange POP3 Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\POP3SVC Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange Event Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\MSExchangeES Key: START Value: Reg_DWORD 0x00000004 Network News Transfer Protocol (NNTP) Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\NNTPSVC Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange Site Replication Service Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\MSExchangeSRS Key: START Value: Reg_DWORD 0x00000004 Criteria: If unnecessary services are disabled, this is not a finding.
Fix: F-19323r1_fix
Disable unneeded services. Procedure: Navigate to Start >> Settings >> Administrative Tools >> Services Create correct configurations. Microsoft Exchange IMAP4 – Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange Information Store Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange POP3 Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Search Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange Event Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange Site Replication Service Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange MTA Stacks Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange Routing Engine Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Network News Transfer Protocol (NNTP) Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable
- RMF Control
- Severity
- L
- CCI
- Version
- EMG1-002 Exch2K3
- Vuln IDs
-
- V-18681
- Rule IDs
-
- SV-20302r1_rule
Checks: C-22399r1_chk
Verify that OMA Virtual Directory is removed. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify the OMA virtual directory in the list. Criteria: If the OMA virtual directory is deleted, this is not a finding.
Fix: F-19327r1_fix
Delete the OMA virtual directory. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site >>OMA Delete the OMA virtual directory.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG1-004 Exch2K3
- Vuln IDs
-
- V-18682
- Rule IDs
-
- SV-20304r1_rule
Checks: C-22400r1_chk
Verify that ActiveSync Virtual Directory is removed. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify the Microsoft Server-Active Sync virtual directory. Criteria: If the Active Sync virtual directory is deleted, this is not a finding.
Fix: F-19328r1_fix
Delete the Active Sync virtual directory. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify and delete the Microsoft Server-Active Sync virtual directory.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG1-012 Exch2K3
- Vuln IDs
-
- V-18683
- Rule IDs
-
- SV-20306r1_rule
Checks: C-22401r1_chk
If Public Folders are in use at the site, this check is N/A. Verify that "Public" Virtual Directory is removed. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site The "Public" virtual directory should be missing from the list. Criteria: If the "Public" virtual directory is missing from the list, this is not a finding.
Fix: F-19329r1_fix
Delete the Public Folder virtual directory. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify and delete the "Public" Virtual Directory.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-713 Exch2K3
- Vuln IDs
-
- V-18685
- Rule IDs
-
- SV-20310r1_rule
Checks: C-22403r1_chk
Review connectors created for the site. Procedure: Exchange System Manager >> Administrative Groups >> [administrative groups] >> Routing Groups >> Connectors List of connectors should be clearly named as to purpose and direction. Criteria: If connectors are clearly named as to purpose and direction, this is not a finding.
Fix: F-19331r1_fix
Revise connectors to ensure they are named clearly as to purpose and direction. Procedure: Exchange System Manager >> Administrative Groups >> [administrative groups] >> Routing Groups >> Connectors Revise names to clearly show purpose and direction.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-710 Exch2K3
- Vuln IDs
-
- V-18686
- Rule IDs
-
- SV-20312r1_rule
Checks: C-22404r1_chk
Validate Simple Mail Transfer Protocol (SMTP) connector configurations. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Routing Groups >> [routing group] >> Connectors>> [Routing Group connector] >> Properties >> Content Restriction tab >> Allowed Sizes The “Only messages less than (KB)” checkbox should be cleared. Criteria: If “Only messages less than (KB)” checkbox is cleared, this is not a finding.
Fix: F-19332r1_fix
Configure Simple Mail Tranfer Protocol (SMTP) Connectors. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Routing Groups >> [routing group] >> Connectors>> [Routing Group connector] >> Properties >> Content Restriction tab >> Allowed Sizes Clear the “Only messages less than (KB)” checkbox.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-123 Exch2K3
- Vuln IDs
-
- V-18687
- Rule IDs
-
- SV-20314r1_rule
Checks: C-22405r1_chk
Access the Simple Mail Transfer Protocol (SMTP) Connection Retry configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> Outbound The default values should be in use, or alternate values may be in use, but they should also be documented in the System Security Plan. - the “First retry interval” (10 min) - the “Second retry interval” (15 min) - the “Third retry interval” (15 min) - the “Subsequent retry interval” (15 min). - the “delay notification” (12 hrs) - the “expiration timeout” (2 days) Criteria: If the message delivery retry settings are as shown above, or have alternate values justified in the System Security Plan, this is not a finding.
Fix: F-19333r1_fix
Set Outbound Delivery Retry values. If alternate values are desired, they must also be documented in the System Security Plan. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> outbound Enter values as shown: - the “First retry interval” (10 min) - the “Second retry interval” (15 min) - the “Third retry interval” (15 min) - the “Subsequent retry interval” (15 min). - the “delay notification” (12 hrs) - the “expiration timeout” (2 days)
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-130 Exch2K3
- Vuln IDs
-
- V-18688
- Rule IDs
-
- SV-20316r1_rule
Checks: C-22406r1_chk
Access the SMTP Maximum Hop Count configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> Advanced button The “Enter maximum hop count” value should be 30. Criteria: If the “Enter maximum hop count” value is 30, this is not a finding.
Fix: F-19334r1_fix
Set the maximum hop count value. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> advanced button. For "Enter maximum hop count", enter 30.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-126 Exch2K3
- Vuln IDs
-
- V-18689
- Rule IDs
-
- SV-20318r1_rule
Checks: C-22407r1_chk
Access the mail server outbound connection configuration. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> Outbound Connections button The “Maximum Outbound Connections” should be set to 1000, or an alternate value that is documented in the System Security Plan. Criteria: If the "Maximum Outbound Connections" is at 1000, or set to an alternate value that is explained in the System Securtiy Plan, this is not a finding.
Fix: F-19335r1_fix
Set the maximum outbound connection count. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> Outbound Connections button Enter 1000 for "Maximum Outbound Connections", or enter an alternate value if local site conditions warrant it, and document it in the System Security Plan.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-114 Exch2K3
- Vuln IDs
-
- V-18690
- Rule IDs
-
- SV-20320r1_rule
Checks: C-22408r1_chk
Access the mail server outbound connection timeout configuration. Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> outbound connections button. Ensure that the “Outbound Connections Timeout” value is = 10 or less. Criteria: If outbound connections timeout limit is at 10 or less, this is not a finding.
Fix: F-19336r1_fix
Procedure: Set the outbound connection timeout limit. Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> Outbound Connections button. Enter Outbound Connections Timeout value = 10 or less.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-120 Exch2K3
- Vuln IDs
-
- V-18691
- Rule IDs
-
- SV-20322r1_rule
Checks: C-22409r1_chk
Access the mail server Outbound Connection configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> Outbound Connections button. The “Outbound Connections per Domain Count” should be = 100 or less. Criteria: If "Outbound connections per domain count" is 100 or less, this is not a finding.
Fix: F-19337r1_fix
Set the Outbound Connections per Domain Count. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> Outbound Connections button. Enter Outbound Connections per Domain Count = 100 or less.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-125 Exch2K3
- Vuln IDs
-
- V-18692
- Rule IDs
-
- SV-20324r1_rule
Checks: C-22410r1_chk
Access the SMTP Inbound Connections configuration. Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab The “Limit number of connections to” checkbox should be cleared. Criteria: If the "Limit Number of Connections to" is cleared, this is not a finding.
Fix: F-19338r1_fix
Set the Limit Inbound Connections limit. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab Clear the “Limit number of connections to” checkbox.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-117 Exch2K3
- Vuln IDs
-
- V-18693
- Rule IDs
-
- SV-20326r1_rule
Checks: C-22411r1_chk
Access the mail server connection timeout configuration. Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab Ensure the “Connection Timeout” value is = 10 or less. Criteria: If the ‘Inbound Connections Timeout Limit’ value is at 10 or less, this is not a finding.
Fix: F-19339r1_fix
Set the Inbound Connection Timeout limit. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab Enter "Connection timeout" value = 10. If a value less than 10 is desired for the site, and is documented in the System Security Plan, then enter a value less than 10.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-250 Exch2K3
- Vuln IDs
-
- V-18694
- Rule IDs
-
- SV-20328r1_rule
Checks: C-22412r1_chk
Access the mail server inbound connections configuration. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access tab >> Connection control >> Connection button "Only the list below” should be selected, with a list of addresses or subnets authorized to connect to this server. Criteria: If "Only the list below” is selected, with a list of addresses or subnets authorized to connect to this server, this is not a finding.
Fix: F-19340r1_fix
Set the Inbound Connections configuration. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access tab >> Connection control >> Connection button Select “Only the list below” and list addresses or subnets authorized to connect to this server.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-272 Exch2K3
- Vuln IDs
-
- V-18695
- Rule IDs
-
- SV-20330r1_rule
Checks: C-22413r1_chk
Verify that Exchange Filters are enabled. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab >> Advanced >> Edit The “Apply Sender Filter” “Apply Recipient Filter” and “Apply Connection Filter” checkbox should be selected. Criteria: If “Apply Sender Filter” “Apply Recipient Filter” and “Apply Connection Filter” checkboxes are selected, this is not a finding.
Fix: F-19341r1_fix
Enable the Sender, Recipient, and Connection Filters. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab >> Advanced >> Edit Select checkboxes for “Apply Sender Filter” “Apply Recipient Filter” and “Apply Connection Filter”.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-251 Exch2K3
- Vuln IDs
-
- V-18696
- Rule IDs
-
- SV-20332r1_rule
Checks: C-22414r1_chk
Validate ExAdmin Virtual Directory authentication settings. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group]>>Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server>>ExAdmin>>Properties>>Access Tab>>Authentication Settings>>Authentication button "Integrated Windows Authentication" should be selected. Criteria: If "Integrated Windows Authentication" is selected, this is not a finding.
Fix: F-19342r1_fix
Configure the ExAdmin Virtual Directory Authentication. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group]>>Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server>>ExAdmin>>Properties>>Access Tab>>Authentication Settings>>Authentication button Select "Integrated Windows Authentication".
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-730 Exch2K3
- Vuln IDs
-
- V-18697
- Rule IDs
-
- SV-20334r1_rule
Checks: C-22415r1_chk
Validate connector scope configuration. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Address Space tab>>Connector Scope The “Routing Group” checkbox should be selected. Criteria: If the “Routing Group” checkbox is selected, this is not a finding.
Fix: F-19343r1_fix
Configure the SMTP connector scope. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Address Space tab>>Connector Scope Select the “Routing Group” checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-721 Exch2K3
- Vuln IDs
-
- V-18698
- Rule IDs
-
- SV-20336r1_rule
Checks: C-22416r1_chk
Review the connector configuration. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> General tab>>Radio Group “Smart-Host” should be selected, and the "Smart Host" identified be an Edge Transport Role server (E-mail Secure Gateway). Criteria: If “Smart-Host” is selected, and the "Smart Host" named is the Edge Transport Role (E-mail Secure Gateway), this is not a finding.
Fix: F-19344r1_fix
Configure the “Smart-Host” on the SMTP connector. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> General tab>>Radio Group Select “Smart-Host” and specify the name of the E-mail Edge Transport Role Server (E-mail Secure Gateway) that performs the “Smart-Host” function.
- RMF Control
- Severity
- H
- CCI
- Version
- EMG2-736 Exch2K3
- Vuln IDs
-
- V-18699
- Rule IDs
-
- SV-20338r1_rule
Checks: C-22417r1_chk
Validate SMTP Connector Relay authentication. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Address Space tab The “Allow messages to be relayed to these domains” should be unchecked. Criteria: If “Allow messages to be relayed to these domains” is unchecked, this is not a finding.
Fix: F-19345r1_fix
Prevent unauthenticated mail relaying. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Address Space tab Clear the “Allow messages to be relayed to these domains” checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-146 Exch2K3
- Vuln IDs
-
- V-18700
- Rule IDs
-
- SV-20340r1_rule
Checks: C-22418r1_chk
Access the System Security Plan. Determine whether the server being reviewed is authorized to perform as a relay. Validate relay restriction configuration. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Access Tab >> Relay restrictions >> Relay Button. For servers authorized to perform as a relay: “Allow all computers which successfully authenticate to it” should be selected. Criteria: If “Allow all computers which successfully authenticate to it” is selected, this is not a finding. For servers not authorized to perform as a Relay: “Select only the List below” with no servers listed should be selected. Criteria: If “Select only the List below” with no servers listed, this is not a finding.
Fix: F-19346r1_fix
Configure E-Mail relay exclusions. Procedure: For servers that are authorized to relay messages, configure the following: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Access Tab >> Relay restrictions >> Relay Button Select “Allow all computers which successfully authenticate to it”. For servers that are not authorized to relay messages, configure the following: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Access Tab >> Relay restrictions >> Relay Button Procedure: Select “Allow only the list below” and specify no servers in the list.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-131 Exch2K3
- Vuln IDs
-
- V-18701
- Rule IDs
-
- SV-20342r1_rule
Checks: C-22419r1_chk
Validate “Smart-Host” configuration at the Virtual Server Level. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Delivery Tab >> Advanced button>> “Smart-Host” The list of “Smart-Hosts” should be cleared. Criteria: If the list of “Smart-Hosts” is empty, this is not a finding.
Fix: F-19347r1_fix
Configure the SMTP Virtual Verver “Smart-Host” list. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Delivery Tab >> Advanced button >> “Smart-Host” Clear the list of any “Smart-Hosts”.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-148 Exch2K3
- Vuln IDs
-
- V-18702
- Rule IDs
-
- SV-20344r1_rule
Checks: C-22420r1_chk
Validate Reverse DNS lookup delivery configuration. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Delivery Tab >> Advanced button The "Perform Reverse DNS lookup on incoming messages" checkbox should be cleared. Criteria: If the "Perform Reverse DNS lookup on incoming messages" checkbox is cleared, this is not a finding.
Fix: F-19348r1_fix
Configure the anonymous delivery DNS option. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Delivery Tab >> Advanced button Clear the "Perform Reverse DNS lookup on incoming messages" checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-803 Exch2K3
- Vuln IDs
-
- V-18703
- Rule IDs
-
- SV-20346r1_rule
Checks: C-22421r1_chk
Validate the Virtual Server outbound Security. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP virtual server] >> Properties >> Delivery tab >> Outbound Security button “Anonymous” and "TLS" should be selected. Criteria: If “Anonymous” and "TLS" are selected, this is not a finding.
Fix: F-19349r1_fix
Set Virtual Server outbound security. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP virtual server] >> Properties >> Delivery tab >> Outbound Security button Select “Anonymous” and "TLS" encryption.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-143 Exch2K3
- Vuln IDs
-
- V-18704
- Rule IDs
-
- SV-20348r1_rule
Checks: C-22422r1_chk
Validate anonymous E-mail resolution configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access Control Tab >> Authentication button The “Resolve Anonymous E-mail” checkbox should be cleared. Criteria: If the “Resolve Anonymous E-mail” checkbox is cleared, this is not a finding.
Fix: F-19350r1_fix
Configure each SMTP virtual server. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access Control Tab >> Authentication button Clear the “Resolve Anonymous E-mail” checkbox.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-333 Exch2K3BE
- Vuln IDs
-
- V-18705
- Rule IDs
-
- SV-20350r1_rule
Checks: C-22423r1_chk
Validate Logging configuration. Procedure: Exchange system Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> [storage group] >> Properties >> General tab The ‘Enable circular logging’ checkbox should be cleared. Criteria: If the 'Enable circular logging’ checkbox is cleared, this is not a finding.
Fix: F-19351r1_fix
Configure E-mail servers’ circular logging to be disabled. Procedure: Exchange system Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> [storage group] >> Properties >> General tab Clear the ‘Enable circular logging’ checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-811 Exch2K3
- Vuln IDs
-
- V-18706
- Rule IDs
-
- SV-20352r1_rule
Checks: C-22424r1_chk
Review Diagnostic Logging Level Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Diagnostic Logging tab Each item in the left panel, should have a status of “none”. Criteria: If Each item in the left panel, has a status of “none”, this is not a finding.
Fix: F-19352r1_fix
Configure diagnostic logging. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Diagnostic Logging For each item, select logging level “none”.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-810 Exch2K3
- Vuln IDs
-
- V-18707
- Rule IDs
-
- SV-20354r1_rule
Checks: C-22425r1_chk
Verify that e-mail subject line logging is disabled. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> General tab The “Enable Subject logging and display” checkbox should be cleared. Criteria: If “Enable Subject logging and display” checkbox is cleared, this is not a finding.
Fix: F-19353r1_fix
Configure E-Mail subject line logging. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> General Tab Clear the “Enable Subject logging and display” checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-825 Exch2K3
- Vuln IDs
-
- V-18710
- Rule IDs
-
- SV-20360r1_rule
Checks: C-22428r1_chk
Interview the E-mail Administrator (EMA) or the System Administrator. Ascertain the partition identifier for the operating system and the Mailbox data partitions. Review the log file configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group}>> Servers >> [server] >> SMTP >> [specific SMTP server] >> Properties >> General tab >> Properties button The “Enable Logging” checkbox in the log file directory box should be selected. The log file path should NOT be the default path (\WINNT\SYSTEM32\LOGFILES\SMPTSVCx (where x is a number used to distinguish between virtual servers in this organization) or on the Mailbox Data partition. Criteria: If SMTP Virtual Servers log is written to a partition that is NOT \WINNT\SYSTEM32\LOGFILES\SMPTSVCx, and also NOT the Mailbox Data partition, this is not a finding.
Fix: F-19356r1_fix
Configure SMTP Virtual Server log location. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group}>> Servers >> [server] >> SMTP >> [specific SMTP server] >> Properties >> General tab >> Properties button Select the “Enable Logging” checkbox. Enter the log file location. Ensure that the log file path is other than the operating system partition, and other than the Exchange 2003 Mailbox data partition.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-831 Exch2K3
- Vuln IDs
-
- V-18711
- Rule IDs
-
- SV-20611r1_rule
Checks: C-22624r1_chk
Access the “send error message to Microsoft” configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> General tab The “Automatically send fatal service error to Microsoft” checkbox should be clear. Criteria: If “Automatically send fatal service error to Microsoft” checkbox is clear, this is not a finding.
Fix: F-19537r1_fix
Configure the "send error message to Microsoft" option. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> General tab Clear the “Automatically send fatal service error to Microsoft” checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-835 Exch2K3
- Vuln IDs
-
- V-18712
- Rule IDs
-
- SV-20612r1_rule
Checks: C-22626r1_chk
If disk monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then using Exchange monitoring for disk space usage is an acceptable solution, and this check is N/A. Review disk space monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> Disk Space Threshold >> Details button For each disk, "Warning" should be 15% or more of available Disk Space, and "Critical" should be 5% or more of available Disk Space (not to exceed the "Critical" figure). At minimum, actions should include sending an E-mail alert an on-call Exchange Administrator or to an Incident Response Administrator. Criteria: If "Warning" is set to 15% or more of available disk space, and "Critical" is set to 5% or more of available disk space (not to exceed the "Critical" figure), and minimum, actions include sending an E-mail to an on-call Exchange Administrator or to an Incident Response Administrator, this is not a finding.
Fix: F-19538r1_fix
Configure disk space monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab 1) Add the monitor, if needed: Click ADD, select Free Disk Space. Add one monitor for each disk. 2) Set the warning and critical thresholds Set the warning value not less than 15% of available disk and critical value not less than 5% of available disk. 3) Create the notifications: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications Specify E-mail to the E-mail Administrator or Incident Response Team account at minimum. Optionally, a script can be invoked to create a log message.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-807 Exch2K3
- Vuln IDs
-
- V-18713
- Rule IDs
-
- SV-20367r1_rule
Checks: C-22431r1_chk
If CPU monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this check is N/A. Review CPU utilization monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> CPU Utilization Threshold >> Details button "Warning" should be set (for a sustained duration of 10 minutes) at a value not greater than 80%. "Critical" should be set for a value of value not greater than 90%. At minimum, actions should E-mail an on-call Exchange administrator or Incident Response administrator. Criteria: If CPU utilization monitoring "Warning" is set to (for a sustained duration of 10 minutes) 80% or less and "Critical" is set to 90% or less, with alert E-mail sent to an administrator, this is not a finding.
Fix: F-19359r1_fix
Ensure that CPU utilization monitoring and notification is enabled. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring Tab >> CPU Utilization Threshold >> Details button 1) Add the monitor, if needed: Click ADD, select CPU Utilization Threshold. 2) Set the duration, warning and critical thresholds Set (for a sustained duration of 10 minutes) Warning value not greater than 80% and Critical value not greater than 90%. 3) Create the notifications: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications: Declare notifications and communication methods as required by local organization policy. At minimum, alert an on-call Exchange Administrator or Incident Response Administrator.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-813 Exch2K3
- Vuln IDs
-
- V-18714
- Rule IDs
-
- SV-20369r1_rule
Checks: C-22432r1_chk
If Virtual Memory Utilization monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this check is N/A. Review virtual memory utilization monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> Virtual Memory Threshold >> Details button "Warning" should be set (for a sustained duration of 3 minutes) to a value not less than 25%. "Critical" should be a value not less than 10%. Minimum Action should be E-mail to an on-call Exchange Administrator or to an Incident Response administrator. Criteria: If "Warning" is set (for a sustained duration of 3 minutes) to a value 25% or higher, and "Critical" is 10% or higher,and Action is an E-mail to an on-call Exchange Administrator, this is not a finding.
Fix: F-19360r1_fix
Configure Virtual Memory utilization monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> Virtual Memory Threshold >> Details button 1) Add the monitor, if needed: Click ADD, select Virtual Memory Threshold. 2) Set the duration, warning and critical thresholds Set (for a sustained duration of 3 minutes) Warning value not less than 25% and Critical value not less than 10%. 3) Create the notifications: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications: Declare notifications and communication methods as required by local organization policy. At minimum, E-mail an on-call Exchange administrator or an Incident Response administrator.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-806 Exch2K3
- Vuln IDs
-
- V-18715
- Rule IDs
-
- SV-20371r1_rule
Checks: C-22433r1_chk
If SMTP queue monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this check is N/A. Review SMTP queue monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> SMTP Queue Threshold >> Details button 'Warning" should be 10 or more minutes, and "Critical" should be 20 or more minutes. Minumim notification should be an E-mail alert to an administrator account. Criteria: If 'Warning" is 10 or more minutes, and "Critical" is 20 or more minutes with minumim notification indicating an E-mail to an Administrator or Incident Response team account, this is not a finding.
Fix: F-19361r1_fix
Configure SMTP queue monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> SMTP Queue Threshold >> Details button 1) Add the monitor, if needed: Click ADD, select SMTP queue Threshold. Add one monitor for each SMTP queue. 2) Set the warning and critical thresholds. Set Warning value not less than 10 minutes and Critical value not less than 20 Minutes. Values should be realistic for the queue and site operational requirements. 3) Create the notifications: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications: Declare notifications and communication methods as required by the local organization policy. At minimum, E-mail an on-call Exchange administrator account or an Incident Response administrator. A script may be invoked to perform other actions.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-815 Exch2K3FE
- Vuln IDs
-
- V-18716
- Rule IDs
-
- SV-20373r1_rule
Checks: C-22434r1_chk
If Windows Services Monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this is N/A. Review Windows Services Monitoring and Notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> [Windows 2003 Service] >> Details button The following Services should be monitored: Event Log NTLM Security Support Provider Remote Procedure Call Server Workstation IIS Admin Service HTTP SSL For each item, the "When Service is not Running, Change State to" should be "Critical" Minimum action should be an E-mail sent to an E-mail Administrator or to an Incident Response team account. Criteria: If, for each service the "When Service is not Running, Change State to" is"Critical", and the minimum action is to send an E-Mail to an Administrator or to an Incident Response Team account, this is not a finding.
Fix: F-19362r1_fix
Configure Windows Services Monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> [Windows 2003 Service] >> Details button 1) Add the monitor, if needed: Click ADD, select desired Windows 2003 Service. Add each service listed. Event Log NTLM Security Support Provider Remote Procedure Call Server Workstation IIS Admin Service HTTP SSL 2) Set the warning and critical thresholds for each service Set “When service is not running change state to” Critical. 3) Create the notifications for each service: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications: Declare notifications and communication methods as required by the local organization policy. At minimum, send an E-mail to an on-call Exchange Administrator or Incident Response administrator.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-817 Exch2K3
- Vuln IDs
-
- V-18717
- Rule IDs
-
- SV-20377r1_rule
Checks: C-22437r1_chk
If Exchange Core Services monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this is N/A. Review Exchange Core Services monitoring and notification. Note: List content may differ depending on specific Exchange components implemented. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring Tab >> [Default Microsoft Exchange Services] >> Details Button For each item listed, the "When Service is not Running, Change State to" should be "Critical" and the minimum action should be an E-mail to an E-mail Administrator or to an Incident Response team account. Criteria: If, for each service the "When Service is not Running, Change State to" is"Critical", and the minimum action is an E-mail to an Administrator or to an Incident Response Team account, this is not a finding.
Fix: F-19365r1_fix
Configure Exchange Core Services monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> [Windows 2003 Service] >> Details button 1) Add the monitor, if needed: Click ADD, select desired Exchange core Service. 2) Set the warning and critical thresholds for each service Set “When service is not running change state to” Critical. 3) Create the notifications for each service: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications Declare notifications and communication methods as required by the local organization policy. At minimum, E-mail an on-call Exchange Administrator or an Incident Response administrator.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-266 Exch2K3
- Vuln IDs
-
- V-18719
- Rule IDs
-
- SV-20381r1_rule
Checks: C-22439r1_chk
Validate that Public Virtual Server has correct user permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Public >> Properties >> Access tab For Access Control, ‘Read, write, Script source access, Directory browsing’ should be selected. Criteria: If Access Control has ‘Read, write, Script source access, Directory browsing’ selected, this is not a finding.
Fix: F-19367r1_fix
Configure Public Virtual Server user permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Public >> Properties >> Access tab For Access Control, select ‘read, write, script source access, directory browsing’.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-030 Exch2K3BE
- Vuln IDs
-
- V-18721
- Rule IDs
-
- SV-20385r1_rule
Checks: C-22441r1_chk
Interview the E-mail Administrator or the IAO. Review documentation that describes attachment filtering at the perimeter, as performed by the Edge Transport Server (E-mail Secure Gateway). Criteria: If E-mail attachments are filtered by an Edge Transport Server (E-mail Secure Gateway) at the perimeter, this is not a finding.
Fix: F-19369r1_fix
Procedure: Deploy attachment filtering at the perimeter on an Edge Transport Server (E-mail Secure Gateway) that supports attachment filtering. The following list suggests the minimum attachments that should be disallowed. Exceptions should be documented in the System Security Plan explaining the reason for addition or removal. As well, attachment filtering lists should align with client application direction such as Microsoft Outlook and Microsoft Outlook Web Access (OWA) or other platforms that perform attachment filtering. For Level1FileTypes: Value Data: ade, adp, app, asx, bas, bat, chm, cmd, com, cpl, crt, csh, exe, fxp, hlp, hta, inf, ins, isp, js, jse, ksh, lnk, mda, mdb, mde, mdt, mdw, mdz, msc, msi, msp, mst, ops, pcd, pif, prf, prg, reg, scf, scr, sct, shb, shs, url, vb, vbe, vbs, wsc, wsf, wsh For Level2FileTypes: Value Data: ade, adp, asx, bas, bat, chm, cmd, com, cpl, crt, exe, hlp, hta, htm, html, htc, inf, ins, isp, js, jse, lnk, mda, mdb, mde, mdz, mht, mhtml, msc, msi, msp, mst, pcd, pif, prf, reg, scf, scr, sct, shb, shs, shtm, shtml, stm, url, vb, vbe, vbs, wsc, wsf, wsh, xml, dir, dcr, plg, spl, swf
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-340 Exch2K3
- Vuln IDs
-
- V-18723
- Rule IDs
-
- SV-20389r1_rule
Checks: C-22444r1_chk
Ensure that mailbox retention for backups are complete. Procedure: Exchange System Manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> [storage group] >> Mailbox store [server name] >> Properties >> Limits tab >> Deletion settings The “Do not permanently delete mailboxes and items until the store has been backed up” should be selected. Criteria: If “Do not permanently delete mailboxes and items until the store has been backed up” is selected, this is not a finding.
Fix: F-19372r1_fix
Configure messages and mailboxes for backups. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> [storage group] >> Mailbox store [server name] >> Properties >> Limits tab >> Deletion settings Select “Do not permanently delete mailboxes and items until the store has been backed up”.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-344 Exch2K3
- Vuln IDs
-
- V-18724
- Rule IDs
-
- SV-20391r1_rule
Checks: C-22445r1_chk
Valiate that Public Folders are retained until Backups are run. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> [storage group] >> Public Folder store [server name] >> Properties >> Limits tab >> Deletion settings The “Do not permanently delete Public Folders until the store has been backed up” should be selected. Criteria: If “Do not permanently delete Public Folders until the store has been backed up” is selected, this is not a finding.
Fix: F-19373r1_fix
Configure Public Folders for Backups. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> [storage group] >> Public Folder store [server name] >> Properties >> Limits tab >> Deletion settings Select “Do not permanently delete mailboxes and items until the store has been backed up”.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-307 Exch2K3
- Vuln IDs
-
- V-18725
- Rule IDs
-
- SV-20393r1_rule
Checks: C-22446r1_chk
Ensure that Mail Stores Restore Overwrite is enabled. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Mailbox store [server name] >> properties >> database tab The “This database can be overwritten by a restore” checkbox should be cleared. Criteria: If “This database can be overwritten by a restore” checkbox is cleared, this is not a finding.
Fix: F-19374r1_fix
Ensure that Mail Store Restore Overwrite Protection is enabled. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Mailbox store [server name] >> properties >> database tab Clear the “This database can be overwritten by a restore” checkbox.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-311 Exch2K3
- Vuln IDs
-
- V-18726
- Rule IDs
-
- SV-20395r1_rule
Checks: C-22447r1_chk
Ensure that Public Folder Restore Overwrite Protection is enabled. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Public Folder store [server name] >> properties >> database tab The “This database can be overwritten by a restore” checkbox should be cleared. Criteria: If “This database can be overwritten by a restore” checkbox is cleared, this is not a finding.
Fix: F-19375r1_fix
Ensure that Public Folders Restore Overwrite Protection is enabled. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Public Folder store [server name] >> properties >> database tab Clear the “This database can be overwritten by a restore” checkbox.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-317 Exch2K3
- Vuln IDs
-
- V-18727
- Rule IDs
-
- SV-20397r1_rule
Checks: C-22448r1_chk
For sites that do not require full E-Mail Message Archiving, this check is N/A. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Mailbox store [server name] >> properties >> General tab The “Archive all message sent or received by mailboxes on this store” should be checked. Criteria: If “Archive all message sent or received by mailboxes on this store” is checked, this is not a finding.
Fix: F-19376r1_fix
Configure Message Archiving. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Mailbox store [server name] >> properties >> General tab Select the “Archive all message sent or received by mailboxes on this store” check box.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-115 Exch2K3
- Vuln IDs
-
- V-18731
- Rule IDs
-
- SV-20405r1_rule
Checks: C-22452r1_chk
Interview the E-mail Administrator. Procedure: Start >> Programs >> All Programs. Review all the programs listed to ensure that no E-mail servers, office programs, database programs, etc., are installed. If they are, ask the E-mail Administrator about their function and purpose. Criteria: If E-mail services reside on dedicated directories or partitions and do not co-host other applications (without associated approval from the IAO), this is not a finding.
Fix: F-19380r1_fix
Procedure: Install E-mail services on dedicated partitions. E-mail services software must not share a directory or partition with other software or the host operating system.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-823 Exch2K3
- Vuln IDs
-
- V-18732
- Rule IDs
-
- SV-20407r1_rule
Checks: C-22453r1_chk
Verify that audit file location is in a different directory than the default, or on a different partition than the default. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> Properties >> general tab The location should not be the default of %systemroot%\program files\exchangesvr\servername.log. (where servername is the actual name of the server being reviewed. Criteria: If E-mail logs or audit data are configured to a location other than the default of %systemroot%\program files\exchangesvr\servername.log this is not a finding.
Fix: F-19381r1_fix
Specify different host system disk partitions or directories for Exchange log files. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> Properties >> General tab Choose a location other than the default of "%systemroot%\program files\exchangesvr\servername.log" for the log file location.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG1-110 Exch2K3
- Vuln IDs
-
- V-18733
- Rule IDs
-
- SV-20409r1_rule
Checks: C-22454r1_chk
Verify that E-mail services are deployed on compliant ports and protocols Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site >>Properties >> Web Site tab >> Web site identification >> TCP port and SSL port Port 80 for TCP and port 443 for SSL should be entered. Criteria: If Port 80 for TCP and port 443 for SSL is entered, this is not a finding.
Fix: F-19382r1_fix
Procedure: Enter Web compliant ports and protocols. IIS Manager >> [server name]>>Web Sites >> Default Web Site >>Properties >> Web Site Tab >> Web site identification >> TCP port and SSL port Enter 80 for TCP port and 443 for SSL port.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-105 Exch2K3
- Vuln IDs
-
- V-18734
- Rule IDs
-
- SV-20411r1_rule
Checks: C-22455r1_chk
Verify that SMTP services are deployed on compliant ports and protocols. Procedure: Exchange system manager >> administrative groups >> [administrative groups]>>Servers >> [server]>>Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery Tab >> Outbound connections button >> TCP Port For SMTP, port 25 should be entered. Criteria: If 25 is entered for the SMTP port, this is not a finding.
Fix: F-19383r1_fix
Enter the SMTP compliant ports. Procedure: Exchange system manager >> administrative groups >> [administrative groups]>>Servers >> [server]>>Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery Tab >> Outbound Connections button >> TCP Port For SMTP, enter 25.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-109 Exch2K3
- Vuln IDs
-
- V-18735
- Rule IDs
-
- SV-20413r1_rule
Checks: C-22456r1_chk
Verify that E-mail Virtual server is bound on SMTP port 25. Procedure: Exchange system manager >> administrative groups >> [administrative groups]>>Servers >> [server]>>Protocols >> SMTP >> [specific SMTP server] >> properties >> General Tab >> Advanced >>Edit>> TCP Port Port 25 for SMTP should be entered. Criteria: If 25 is entered for SMTP, this is not a finding.
Fix: F-19384r1_fix
Enter 25 for SMTP on each SMTP Virtual Server Procedure: Exchange system manager >> administrative groups >> [administrative groups]>>Servers >> [server]>>Protocols >> SMTP >> [specific SMTP server] >> properties >> General Tab >> Advanced >>Edit>> TCP Port Enter 25 for SMTP.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-058 Exch2K3
- Vuln IDs
-
- V-18741
- Rule IDs
-
- SV-20425r1_rule
Checks: C-22463r1_chk
Verify the software change monitoring schedule. Procedure: Interview the E-Mail Administrator or IAO to ascertain current INFOCON level history, and ask for software modification detection procedures in place. Review reports for inclusion of the Exchange 2003 executable and configuration files. Criteria: If E-mail software is monitored for changes as required by the INFOCON levels, this is not a finding.
Fix: F-19391r1_fix
Procedure: Establish procedures to monitor any changes made to E-mail Services software. Identify files and directories to be included in the host system and provide these to the person responsible for backups. Verify that E-mail software libraries are monitored for change according to SD527-1 INFOCON levels.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-802 Exch2K3
- Vuln IDs
-
- V-18742
- Rule IDs
-
- SV-20427r1_rule
Checks: C-22464r1_chk
Review documentation and the E-mail host servers. Procedure: Interview the E-mail Administrator or the IAO. Access System Security Plan documenation and the server being reviewed. Verify that Exchange 2003 is not installed on a Domain Controller or other Directory Services server. Criteria: If Exchange E-mail application is installed on a server that separate from domain security services, this is not a finding.
Fix: F-19392r1_fix
Procedure: Install Exchange 2003 application to a dedicated host system.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-805 Exch2K3
- Vuln IDs
-
- V-18743
- Rule IDs
-
- SV-20429r1_rule
Checks: C-22465r1_chk
Interview the E-Mail Administrator or the IAO. Reference a copy of the System Security Plan. Procedure: Review the application software baseline procedures and implementation evidence. Review the list of files and directories included in the baseline procedure for completeness. Criteria: If E-mail software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Fix: F-19393r1_fix
Procedure: Implement E-mail software baseline process. Ensure that a plan exists for periodic comparison and is incorporated into the configuration management procedures.
- RMF Control
- Severity
- H
- CCI
- Version
- EMG2-327 Exch2K3
- Vuln IDs
-
- V-18744
- Rule IDs
-
- SV-20431r1_rule
Checks: C-22466r1_chk
If Public Folders are not in use at the site, this is N/A. Ensure that Public Folders require S/MIME capable clients. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server name] >> [storage group] >> Public Folder store [server name] >> Properties >> General tab The “clients support S/MIME signatures” should be selected. Criteria: If “clients support S/MIME signatures” is selected, this is not a finding.
Fix: F-19394r1_fix
Require S/MIME capable clients. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public Folder store [server name] >> properties >> General tab Select the “clients support S/MIME signatures” checkbox.
- RMF Control
- Severity
- H
- CCI
- Version
- EMG2-271 Exch2K3
- Vuln IDs
-
- V-18745
- Rule IDs
-
- SV-20433r1_rule
Checks: C-22467r1_chk
Ensure that 'Forms-based' authentication is not active. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group]>>Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server >> Properties >> Settings tab The “Enable Forms-based Authentication” checkbox should be cleared. Criteria: If the “Enable Forms-based Authentication” checkbox is cleared, this is not a finding.
Fix: F-19395r1_fix
Configure Forms-based Authentication. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group]>>Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server >> Properties >> Settings tab Clear the “Enable Forms-based Authentication” checkbox. Note: This configuration presumes that an application proxy server such as Internet Security and Acceleration (ISA) 2006 is installed between the Internet and the Client Access Server to host the authentication form.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG1-007 Exch2K3
- Vuln IDs
-
- V-18759
- Rule IDs
-
- SV-20449r1_rule
Checks: C-22474r1_chk
Verify the default web site authentication type for Exchange access. Procedure: IIS Manager >> [SERVER NAME] >> Websites>>Default Web Site>> Properties >> Directory Security tab>>Authentication and Access Control>>Edit button Ensure that "Integrated Windows Authentication" is selected. Criteria: If "Integrated Windows Authentication" is selected, this is not a finding.
Fix: F-19412r1_fix
Ensure that default authentication is set appropriately. Procedure: IIS Manager >> [server name] >> Websites>>Default Web Site>> Properties >> Directory Security tab>>Authentication and Access Control>>Edit button Select the "Integrated Windows Authentication" checkbox.
- RMF Control
- Severity
- H
- CCI
- Version
- EMG2-256 Exch2K3
- Vuln IDs
-
- V-18760
- Rule IDs
-
- SV-20451r1_rule
Checks: C-22475r1_chk
Validate OWA Authentication Setting: Procedure: Exchange system Manager >> Administrator Groups>> [administrator group] Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server>>Exchange>>Properties>>Access Tab>>Authentication Settings>>Authentication Button "Integrated Windows Authentication" should be selected. Criteria: If "Integrated Windows Authentication" is selected, this is not a finding.
Fix: F-19413r1_fix
Configure OWA Virtual Server Authentication. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group] Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server>>Exchange>>Properties>>Access Tab>>Authentication Settings>>Authentication Button Select "Integrated Windows Authentication".
- RMF Control
- Severity
- H
- CCI
- Version
- EMG2-133 Exch2K3
- Vuln IDs
-
- V-18762
- Rule IDs
-
- SV-20455r1_rule
Checks: C-22477r1_chk
Validate that Virtual Server certificates are installed for each SMTP Virtual Server. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Access tab >> Secure Communication tab Select the “Wizard” button to create and install a certificate. View the certificate details. Criteria: If the SMTP virtual servers have a valid DoD-Issued certificate, this is not a finding.
Fix: F-19415r1_fix
Obtain vaid DoD server certificates for SMTP services. For each SMTP virtual server, install a certificate. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Access Tab >> Secure Communication Tab Select the “Wizard” button to install the certificate.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-840 Exch2K3
- Vuln IDs
-
- V-18763
- Rule IDs
-
- SV-20457r1_rule
Checks: C-22478r1_chk
Interview the e-mail administrator or IAO. Access the Exchange 2003 Server log files. Review log file examples. Criteria: If E-mail audit records contain required events: • Account • Event Code and Type • Success or Failure Indication • Time/date • Interface Internet Protocol (IP) address • Manufacturer-specific event name • Source and destination IP addresses • Source and destination port numbers • Network Protocol This is not a finding.
Fix: F-19416r1_fix
Ensure that E-mail audit records contain required fields, to the degree that Exchange 2003 is able to provide them. Procedure: If logging levels are available that increase reported information, they should be used.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-833 Exch2K3
- Vuln IDs
-
- V-18767
- Rule IDs
-
- SV-20464r1_rule
Checks: C-22481r1_chk
Review Exchange Monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab The “Disable monitoring of this server” checkbox should be clear. Criteria: If the “Disable monitoring of this server” checkbox is cleared, this is not a finding.
Fix: F-19419r1_fix
Configure monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab Clear the “Disable Monitoring of this server” checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-124 Exch2K3
- Vuln IDs
-
- V-18770
- Rule IDs
-
- SV-20470r1_rule
Checks: C-22484r1_chk
Ensure that SMTP Virtual Server Auditing is active. Procedure: Exchange System Manger >> Administrative Groups >> [administrative group}>> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab The “Enable Logging” checkbox should be checked. Criteria: If the “Enable Logging” checkbox is checked, this is not a finding.
Fix: F-19423r1_fix
Configure SMTP Virtual Server auditing. Procedure: Exchange System Manger >> Administrative Groups >> [administrative group}>> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab Select the “Enable Logging” checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-111 Exch2K3
- Vuln IDs
-
- V-18780
- Rule IDs
-
- SV-22062r1_rule
Checks: C-25489r1_chk
Interview the IAO or E-mail Administrator. Access documentation that describes placement of an E-mail Secure Gateway that receives inbound messages from Internet-based remote domains. Verify the Exchange 2003 connector authentication configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access tab >> Access Control >> Authentication button “Basic authentication” with "TLS" should be selected.
Fix: F-20614r1_fix
Deploy an Edge Transport Server (E-mail Secure Gateway) role at the perimeter. Then, for each Exchange 2003 SMTP virtual server (now internal to the enclave), set authentication. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access tab >>Access Control >> Authentication button Select “Basic authentication” and "TLS encryption".
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-144 Exch2K3
- Vuln IDs
-
- V-18782
- Rule IDs
-
- SV-20491r1_rule
Checks: C-22493r1_chk
Verify the SMTP virtual server connection security. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP virtual server] >> properties >> Access Tab >> Communication button “Require secure channel” and “Require 128 bit encryption” checkboxes should be checked. Criteria: If “Require secure channel” and “Require 128 bit encryption” are checked, this is not a finding.
Fix: F-19436r1_fix
For each SMTP virtual server, set secure connection as follows: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP virtual server] >> properties >> Access Tab >> Communication button Select “Require secure channel” and “require 128 bit encryption” checkboxes.
- RMF Control
- Severity
- H
- CCI
- Version
- EMG2-743 Exch2K3
- Vuln IDs
-
- V-18784
- Rule IDs
-
- SV-20495r1_rule
Checks: C-22495r1_chk
Validate outbound connector security on Exchange servers. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Advanced tab >> Outbound Security button The “Basic Authentication” and “TLS” choices should be selected. Criteria: If “Basic Authentication” and “TLS” are selected, this is not a finding.
Fix: F-19439r1_fix
Implement perimeter protection in the form of an Edge Transport Role Server (E-mail Secure Gateway) that performs, among other protections, the ability to perform Anonymous connections to remote E-mail domains. Configure outbound SMTP connectors. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Advanced tab>>Outbound Security button For each connector, select “Basic Authentication” and “TLS”
- RMF Control
- Severity
- H
- CCI
- Version
- EMG1-103 Exch2K3
- Vuln IDs
-
- V-18786
- Rule IDs
-
- SV-20498r1_rule
Checks: C-22496r1_chk
If Public Folders are not in use at the site, the web directory should be deleted, and this check becomes N/A. Validate Public Folder Web Security. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> PUBLIC >>Properties >> Directory Security tab >> Secure Communications >> Edit button Secure Channel and 128 bit Encryption should be selected. Under "Client Certificates", the "ignore client certificates" option should be selected. All other checkboxes should be cleared. Criteria: If "Secure Channel" and "128 bit Encryption" are selected, with "ignore client certificates", this is not a finding.
Fix: F-19440r1_fix
Set Public Folders Web Security. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> PUBLIC >>Properties >> Directory Security tab >> Secure Communications >> Edit button Select "Secure Channel" and "128 bit encryption". Under Client Certificates, select the “ignore client certificates” option. All other check boxes should be cleared.
- RMF Control
- Severity
- H
- CCI
- Version
- EMG1-105 Exch2K3
- Vuln IDs
-
- V-18787
- Rule IDs
-
- SV-20500r1_rule
Checks: C-22497r1_chk
If Outlook Web Access (OWA) is not approved for use at this site, this check is N/A. Verify Exchange directory (OWA) security settings. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> Exchange >>Properties >> Directory Security tab >> Secure Communications >> Edit button. "Secure Channel" and "128 bit encryption" should be selected. Under Client Certificates, the “ignore client certificates” option should be selected. All other settings should be cleared. Criteria: If "Secure Channel" and "128 bit encryption" are selected, with the “ignore client certificates” option, this is not a finding.
Fix: F-19441r1_fix
Set Outlook Web Access security. Proedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> Exchange >>Properties >> Directory Security tab >> Secure Communications >> Edit button Select "Secure Channel" and "128 bit encryption". Under Client Certificates, select the “ignore client certificates” option. All other settings should be cleared.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-305 Exch2K3
- Vuln IDs
-
- V-18788
- Rule IDs
-
- SV-20502r1_rule
Checks: C-22498r1_chk
Ensure that ExAdmin Virtual Directory is using correct security. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> ExAdmin >>Properties >> Directory Security Tab >> Secure Communications >> Edit Button All checkboxes should be cleared. Criteria: If all security checkboxes are cleared, this is not a finding.
Fix: F-19443r1_fix
Configure ExAdmin Security. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> ExAdmin >>Properties >> Directory Security Tab >> Secure Communications >> Edit Button Clear all checkboxes.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-116 Exch2K3
- Vuln IDs
-
- V-18792
- Rule IDs
-
- SV-21318r1_rule
Checks: C-23395r1_chk
For each SMTP server (1 thru x) issue the following command: CSCRIPT ADSUTIL.VBS get smtpsvc/x/connectresponse (Where x is the relative number of SMTP virtual server identified on the machine). Criteria: If a modified response is returned, for example: ESMTP …. (Time and date) message is returned, this is not a finding.
Fix: F-19973r1_fix
Change the banner response text as follows: CSCRIPT ADSUTIL.VBS get esmtpsvc/x/connectresponse "ESMTP" Then, recycle the SMTP service by issuing the commands: NET STOP SMTPSVC, followed by NET START SMTPSVC. Alternately, the value can be changed by accessing the Exchange user interface as follows: Exchange System Manager >> Default SMTP Virtual Server >> Delivery >> Properties >>Advanced Change the value to “ESMTP”. Recycle the SMTP service: NET STOP SMTPSVC, followed by NET START SMTPSVC.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-119 Exch2K3
- Vuln IDs
-
- V-18795
- Rule IDs
-
- SV-20514r1_rule
Checks: C-22504r1_chk
Interview the E-mail Administrator or the IAO. Access the System Security Plan and verify the Exchange Services names active for the site. View Exchange Services to verify service account scope. Procedure: Start >> settings >> Control Panel >> Administrative tools >> Services For each service beginning "MS Exchange…. "service, look for Active Services in the list: Right Click >> Properties >> LogOn tab >> “Log on As” field. Criteria: If E-mail service accounts are operating as SYSTEM, this is not a finding.
Fix: F-19450r1_fix
Ensure that E-mail services use only the SYSTEM account. Procedure: Start >> Settings >> Control Panel >> Administrative Tools >> Services For each "MS Exchange ..." service, look for Active Services in the list, Right Click >> Propterties >> LogOn tab In the "Log On As" field, select "Local SYSTEM account". Ensure the changes are reflected in the DIACAP Scorecard.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-145 Exch2K3
- Vuln IDs
-
- V-18796
- Rule IDs
-
- SV-20516r1_rule
Checks: C-22505r1_chk
View Exchange service permissions to verify service account privilege level. Procedure: Start >> Settings >> Control Panel >> Administrative tools >> Services For each "MSExch…." Active service in the list: Right Click >> Properties >> LogOn >> Log On As field. Criteria: If E-mail service accounts are operating with the SYSTEM account, this is not a finding.
Fix: F-19451r1_fix
Ensure that E-mail service accounts are operating with the SYSTEM account privilege. Procedure: Start >> settings >> control panel >> administrative tools >> services For each "MSExch…." Active service in the list: Right Click >> Properties >> LogOn >> Log On As field. Select "Local SYSTEM account".
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-828 Exch2K3
- Vuln IDs
-
- V-18799
- Rule IDs
-
- SV-20520r1_rule
Checks: C-22508r1_chk
Verify that restore privilege is restricted to only E-mail Administrators and Installers. Procedure: Exchange System Manager >> Administrative Group >> [administrative group] >> Servers >> [server name] >> [recovery storage group] >> Mailbox store >> Properties >> Security tab >> Advanced button Exchange Administrators and Installers should have full control. No other group should have ‘write’ permissions. Criteria: If Exchange Administrators and Installers have full control and No other group has ‘write’ permissions, this is not a finding.
Fix: F-19457r1_fix
Ensure that E-mail Restore Permissions are restricted to E-mail Administrators and Installers. Procedure: Exchange System Manager >> Administrative Group >> [administrative group] >> servers >> [server name] >> [recovery storage group] >> Mailbox store >> properties >> security tab >> advanced tab Select “Allow Exchange application administrator full control”. Nobody else should have ‘write’ permissions.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-121 Exch2K3
- Vuln IDs
-
- V-18801
- Rule IDs
-
- SV-20524r1_rule
Checks: C-22510r1_chk
Review Permission Settings for Exchange 2003 Services. Procedure: The following permissions should be set: • Authenticated Users – Read • System – Full Control • Builtin Administrators – Full Control • Auditing for failures against the Everyone security principal For these listed services: • MSExchangeMGMT - %systemroot%\program files\exchsvr\bin\exchmgmt.exe • MSExchangeMTA - %systemroot%\system32\inetwrv\emsmta.exe • MSExchangeSA - %systemroot%\program files\exchsvr\bin\mad.exe • W3Svc - %systemroot%\system32\svchost.exe (IISSVCS) • ISSAdmin - %systemroot%\system32\inetwrv\inetinfo.exe Criteria: If services have vendor recommended permissions, this is not a finding.
Fix: F-19459r1_fix
Correct the E-Mail Services permissions. Procedure: The following table lists the recommended baseline settings you should start with when hardening the services for an Exchange back-end server (the Exchange_2003-Backend_V1_1.inf file configures these settings automatically). The SDDL sets the following: • Authenticated Users – Read • System – Full Control • Builtin Administrators – Full Control • Auditing for failures against the Everyone security principal For these listed services: • MSExchangeMGMT - %systemroot%\program files\exchsvr\bin\exchmgmt.exe • MSExchangeMTA - %systemroot%\system32\inetwrv\emsmta.exe • MSExchangeSA - %systemroot%\program files\exchsvr\bin\mad.exe • W3Svc - %systemroot%\system32\svchost.exe (IISSVCS) • ISSAdmin - %systemroot%\system32\inetwrv\inetinfo.exe
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-824 Exch2K3
- Vuln IDs
-
- V-18802
- Rule IDs
-
- SV-20526r1_rule
Checks: C-22512r1_chk
The following table lists the recommended baseline settings you should start with when hardening the services for an Exchange back-end server (the Exchange_2003-Backend_V1_1.inf file and the Exchange_2003-Frontend_V1_1.inf file configure these settings automatically). File ACL settings configured by Exchange_2003-Backend_V1_1.inf The following permissions: • System – Full Control • Builtin Administrators – Full Control Apply to these directories: %systemdrive%\Inetpub\mailroot\ %systemdrive%\Inetpub\NNTPfile\ The following permissions: • Everyone – Full Control Applies to this directory: %systemdrive%\Inetpub\NNTPfile\root The following permissions: • System – Full Control • Builtin Administrators – Full Control • Server Operators – Modify, Read/Execute, List, Read, Write • Creator Owner – Full Control (subdirectories only) Apply to these directories: %systemdrive%\program files\exchsrvr and subs, but not ADDRESS, OMA, BIN, EXCHWEB, and RES subdirectories. The following permissions: • System – Full Control • Builtin Administrators – Full Control • Server Operators – Modify, Read/Execute, List, Read, Write • Users – Read/Execute, List, Read • Creator Owner – Full Control (subdirectories only) Apply to these directories: %systemdrive%\program files\exchsrvr (subs) >> ADDRESS, OMA, BIN, EXCHWEB, and RES subdirectories Criteria: If files have vendor recommended permissions, this is not a finding.
Fix: F-19462r1_fix
Procedure: The following table lists the recommended baseline settings you should start with when hardening the services for an Exchange Back-end server (the Exchange_2003-Backend_V1_1.inf file and the Exchange_2003-Frontend_V1_1.inf file configure these settings automatically). File ACL settings configured by Exchange_2003-Backend_V1_1.inf The following permissions: • System – Full Control • Builtin Administrators – Full Control Apply to these directories: %systemdrive%\Inetpub\mailroot\ %systemdrive%\Inetpub\NNTPfile\ The following permissions: • Everyone – Full Control Applies to this directory: %systemdrive%\Inetpub\NNTPfile\root The following permissions: • System – Full Control • Builtin Administrators – Full Control • Server Operators – Modify, Read/Execute, List, Read, Write • Creator Owner – Full Control (subdirectories only) Apply to these directories: %systemdrive%\program files\exchsrvr and subs, but not ADDRESS, OMA, BIN, EXCHWEB, and RES subdirectories. The following permissions: • System – Full Control • Builtin Administrators – Full Control • Server Operators – Modify, Read/Execute, List, Read, Write • Users – Read/Execute, List, Read • Creator Owner – Full Control (subdirectories only) Apply to these directories: %systemdrive%\program files\exchsrvr (subs) >> ADDRESS, OMA, BIN, EXCHWEB, and RES subdirectories
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-259 Exch2K3
- Vuln IDs
-
- V-18803
- Rule IDs
-
- SV-20528r1_rule
Checks: C-22513r1_chk
Verify that OWA Virtual Server does not permit script execution. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Exchange >> Properties >> Access tab For Execute Permissions, ‘None’ should be selected. Criteria: If "None" is selected for Execute Permissions, this is not a finding.
Fix: F-19463r1_fix
Ensure that OWA Virtual Server does not permit scripts to execute. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Exchange >> Properties >> Access tab For Execute Permissions, select ‘None’.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-275 Exch2K3
- Vuln IDs
-
- V-18804
- Rule IDs
-
- SV-20530r1_rule
Checks: C-22514r1_chk
Validate that scripts are not permitted to execute in the Public Virtual Server. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Public >> Properties >> Access tab For Execute Permissions, ‘None’ should be selected. Criteria: If Execute Permissions have ‘None’ selected, this is not a finding.
Fix: F-19464r1_fix
Configure the Public Virtual Server. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Public >> Properties >> Access tab For Execute Permissions, select ‘None’.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-255 Exch2K3
- Vuln IDs
-
- V-18805
- Rule IDs
-
- SV-20532r1_rule
Checks: C-22515r1_chk
Validate the ExAdmin script permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> ExAdmin >> Properties >> Access tab For Execute Permissions, ‘None’ should be selected. Criteria: If ‘None’ is selected for Execute Permissions, this is not a finding.
Fix: F-19465r1_fix
Configure the ExAdmin Script Permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> ExAdmin >> Properties >> Access tab Select ‘None’ on Execute Permissions.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-263 Exch2K3
- Vuln IDs
-
- V-18806
- Rule IDs
-
- SV-20534r1_rule
Checks: C-22516r1_chk
Validate that users have correct OWA Virtual Server permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Exchange >> Properties >> Access tab For Access Control, ‘read, write, script source access, directory browsing’ should be selected. Criteria: If Access Control has ‘read, write, script source access, directory browsing’ selected, this is not a finding.
Fix: F-19466r1_fix
Set user permissions for the OWA virtual server. Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Exchange >> Properties >> Access tab For Access Control, select ‘read, write, script source access, directory browsing’.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-269 Exch2K3
- Vuln IDs
-
- V-18807
- Rule IDs
-
- SV-20536r1_rule
Checks: C-22517r1_chk
Validate that user permissions to ExAdmin are set correctly. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> ExAdmin >> Properties >> Access tab For Access Control, ‘Read, write, script source access, directory browsing’ should be selected. Criteria: If Access control is configured for ‘Read, write, script source access, directory browsing’ this is not a finding.
Fix: F-19467r1_fix
Configure permissions in the ExAdmin virtual server. Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> ExAdmin >> Properties >> Access tab >> Access control Select ‘Read, write, script source access, directory browsing’.
- RMF Control
- Severity
- L
- CCI
- Version
- EMG2-303 Exch2K3
- Vuln IDs
-
- V-18812
- Rule IDs
-
- SV-20546r1_rule
Checks: C-22522r1_chk
Verify memory zero overwrite configuration. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> [storage group] >> properties >> General tab The “Zero out deleted database pages” checkbox should be checked. Criteria: If “Zero out deleted database pages” checkbox is checked, this is not a finding.
Fix: F-19472r1_fix
Enable 'Memory Zero Overwrite' after deletion. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> [storage group] >> properties >> General tab Select the “Zero out deleted database pages” checkbox.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-038 Exch2K3
- Vuln IDs
-
- V-18818
- Rule IDs
-
- SV-20557r1_rule
Checks: C-22528r1_chk
Interview the E-mail Administrator or the IAO. Access the System Security documentation that identifies perimeter protection in the form of an Edge Transport Server role ( E-mail Secure Gateway) offering outbound signed message transmissions. Criteria: If an Edge Transport Server (E-mail Secure Gateway) role exists and performs outbound E-mail message signing at the perimeter, this is not a finding.
Fix: F-19488r1_fix
Implement an Edge Transport Server (E-mail Secure Gateway) that includes DKIM functionality. Ensure that each domain creates mail server certificates and signs outbound messages at the perimeter. NOTE: Each domain must also populate the Public DNS with the appropriate public keys to enable receiver validation.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG3-150 Exch2K3
- Vuln IDs
-
- V-18819
- Rule IDs
-
- SV-20559r1_rule
Checks: C-22529r1_chk
Verify that audit logs are protected from unauthorized access or modification. Interview the E-mail Administrator or IAO. Procedure: Access the System Security Plan documents that describe audit data location and protection measures. Included should be server locations and directory security that limits access to appropriate and authorized individuals or processes. Only E-mail administrators and System Administrators should have both "read" and "write" ability. E-mail users should be restricted to "write" only. Criteria: If E-mail users are authorized to "write", and only E-mail and System administrators may "read" and "write" to audit trails, this is not a finding.
Fix: F-19489r1_fix
Configure E-mail audit trail protection against unauthorized access. Procedure: Access the E-mail Services log files. Ensure that only E-mail Administators and System Administrators have "Read" and "Write" permissions, and that everyone else has only "Write". Enumerate the access criteria into the System Security Plan.
- RMF Control
- Severity
- H
- CCI
- Version
- EMG3-829 Exch2K3
- Vuln IDs
-
- V-18820
- Rule IDs
-
- SV-20561r1_rule
Checks: C-22530r1_chk
Interview the E-mail administrator or the IAO. Procedure: Access the System Security Plan documentation that identifies the E-Mail Anti-Virus product resident on Exchange servers. Validate that the identified is one that offers AVAPI 2.5 or higher for safe scanning without risk of mail data corruption. Criteria: If E-mail servers are using E-Mail aware AV product with AVAPI version 2.5 or higher, this is not a finding.
Fix: F-19490r1_fix
Install E-mail aware virus protection on mailbox servers. Ensure that mail stores are being scanned with products possessing AVAPI version 2.5 or higher.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-863 Exch2K3
- Vuln IDs
-
- V-19186
- Rule IDs
-
- SV-21025r1_rule
Checks: C-23052r1_chk
Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> [storage group] >> Mailbox Store >> Properties >> Security tab >> Advanced button >> Audit tab All listed items must be selected for “change permissions”, “take ownership”, “add/remove self”, and “write properties”. Criteria: If all items are selected for “change permissions”, “take ownership”, “add/remove self”, and “write properties”, this is not a finding.
Fix: F-19803r1_fix
Ensure that access control mechanisms are audited. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> [storage group] >> Mailbox Store >> Properties >> Security tab >> Advanced button >> Audit tab Select “change permissions”, “take ownership”, “add/remove self”, and “write properties”.
- RMF Control
- Severity
- M
- CCI
- Version
- EMG2-718 Exch2K3
- Vuln IDs
-
- V-19198
- Rule IDs
-
- SV-21038r1_rule
Checks: C-23128r1_chk
Review SMTP connectors. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Routing Groups >> [routing group] >> Connectors >> [SMTP Connectors] >> Properties >> Content Restriction tab >> Allowed Sizes The 'Only messages less than (KB)' checkbox should be cleared. Criteria: If the 'Only messages less than (KB)' checkbox is cleared, this is not a finding.
Fix: F-19815r1_fix
Configure the SMTP connectors. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Routing Groups >> [routing group] >> Connectors >> [SMTP Connectors] >> Properties >> Content Restriction Tab >> Allowed Sizes Clear the 'Only messages less than (KB)' checkbox.
- RMF Control
- Severity
- H
- CCI
- Version
- EMG1-009 Exch2K3
- Vuln IDs
-
- V-53399
- Rule IDs
-
- SV-67615r1_rule
Checks: C-54667r2_chk
Microsoft Exchange Server 2003 mainstream support ended 14 April 2009, and extended support ended 8 April 2014. If Microsoft Exchange Server 2003 is installed on a system, this is a finding.
Fix: F-58211r1_fix
Upgrade Microsoft Exchange Server to a supported version.