Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Ensure that mailbox stores are not configured. Procedure: Exchange System Manager >>Administrative Groups >> [administrative group]>> Servers >> [server name] >> First Storage Group Individual list of user mailboxes should be an empty list. Criteria: If user mailbox list is empty, this is not a finding.
Configure non-Mailbox Server role. Procedure: Exchange System Manager >>Administrative Groups >> [administrative group]>> Servers >> [server name] >> First Storage Group Remove Mailbox store and mailboxes. Note: Additional administrative tasks to modify dependent configurations may be necessary.
Ensure that E-Mail servers require S/MIME capable clients. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> General tab The “Clients support S/MIME signatures” should be selected. Criteria: If the “Clients support S/MIME signatures” is selected, this is not a finding.
Configure requirement for S/MIME capable clients. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> General tab Select the “Clients support S/MIME signatures” checkbox.
First, make a note of the configured SMTP Virtual Server message size (example, the default is 10,240 KB). Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server name] >> Protocols >> SMTP >> [Specific SMTP Virtual Server] >> Properties >> Messages Tab >>Limit message size to: (KB) Use the SMTP Virtual Server Message Size to configure the Mail Store Quota values. Progression of configured values should be 'equal to' or 'greater than' one message size value to prevent an alert being skipped due to one message. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> Limits tab “Issue warning at (KB)” should be selected and have a value. “Prohibit send at (KB)” should be selected and have a value. "Prohibit send and receive at (KB)" should not be selected. Criteria: If “Issue warning at (KB)” and “Prohibit send at (KB)” are selected, and have assigned values, with "Prohibit send and receive at (KB)" not selected, this is not a finding.
Make a note of SMTP Virtual Server Message size limitation. Administrative Groups >> [administrative group] >> Servers >> [server name] >> Protocols >> SMTP ? [Specific SMTP Virtual Server] >> Properties >> Messages Tab >>Limit message size to: (KB) Use the message size value to configure Mail Store Quota values. Limits should be at least as big as SMTP message size. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server name] >> [storage group] >> Mailbox store [server name] >> Properties >> Limits tab Select “Issue warning at (KB)” and enter a quota value. Select “Prohibit send at (KB)" and enter a quota value at least as large as "Issue warning at (KB) plus the value of SMTP Virtual Server message size. Do not Select "Prohibit send and Receive at (KB)" Note: Progression of configured actions should be equal to or greater than one message size to prevent an alert being skipped due to one message.
If site is not using Public Folders, this is N/A. First, make a note of the Public Folder stores item size. Administrative Groups >> [administrative group] >> Servers >> [server name] >> Storage group >> Public Folder store [Server name] >> Properties >> Limits Tab >>Maximum item size: (KB) Use the Maximum item size value to configure the Public Folder Store quota values. Progression of configured values should be 'equal to' or 'greater than' one message size value to prevent an alert being skipped due to one message. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public Folder store [server name] >> properties >> Limits tab “Issue warning at (KB)” should be selected, and have a value . No other limit should be selected. Criteria: If "Issue warning at (KB)" is selected and has value that is a multiple of a message size, with no other limits selected, this is not a finding.
Make a note of the Public Folder stores item size as follows: Administrative Groups >> [administrative group] >> Servers >> [server name] >> Storage group >> Public Folder store [Server name] >> Properties >> Limits Tab >>Maximum item size: (KB) Use Maximum Item size to configure Public Folder Store quota. The value should be 'equal to' or 'greater than' one Public Folder limit on item size. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public folder store [server name] >> properties >> Limits tab Select “Issue warning at (KB)” and assign a value. Do not select “Prohibit post at (KB). Note: Configured actions should be multiples of one item size to prevent an alert being skipped due to one message.
If Public Folders are not in use at the site, this check is N/A. For each Public Folder, assess Public Folder overrides for storage limitation alerts. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Folders >> Public Folders >> [Public Folder] >> Properties >> Limits tab >> Storage limits The “Use public store defaults” checkbox should be selected. Criteria: If the “Use public store defaults” checkbox is selected, this is not a finding.
Configure the Public Folder Store Limit setting. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Folders >> Public Folders >> [Public Folder] >> Properties >> Limits tab >> Storage limits Select the “Use public store defaults” checkbox.
Ensure that Mailbox Stores Mount at Startup. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> Database tab The “Do not mount this store at startup” should be cleared. Criteria: If the “Do not mount this store at startup” checkbox is cleared, this is not a finding.
Configure Mailbox Mount at Startup. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Mailbox store [server name] >> properties >> Database tab Clear the “Do not mount this store at startup” checkbox.
If Public Folder stores are not in use at the site, this is N/A. Ensure that Public Folder Stores "Do not Mount at Startup" is disabled. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public Folder store [server name] >> properties >> Database tab The “Do not mount this store at startup” should be cleared. Criteria: If the “Do not mount this store at startup” checkbox is cleared, this is not a finding.
Enable Public Folder Stores "Mount at Startup" feature. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public Folder store [server name] >> properties >> Database tab Clear the “Do not mount this store at startup” checkbox.
If Public Folders are not in use, this is N/A. Review the 'Send on behalf of' field. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Folders >> Public Folders >> [Public Folder] >> Properties >> Exchange General tab >> Delivery Options button. The “Send on Behalf of” list should be empty. Criteria: If the “Send on Behalf” list is empty, this is not a finding.
Disable the Public Folder “send on behalf of” feature. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Folders >> Public Folders [Public Folder] >> Properties >> Exchange General Tab >> Delivery Options Button. Empty the “Send on Behalf of” list.
Procedure: Exchange System Manager >> Global Settings >> Internet Messages >>Formats >> {specific format name} >> Properties >> Advanced tab >> {item list} The "Automated Response Messages" checkbox should be cleared. Criteria: For each listed format, if the "Automated Response Messages" checkbox is cleared, this is not a finding.
Disable automated responses. Procedure: Exchange System Manager >> Global Settings >> Internet Messages >>Formats >> {specific format name} >> Properties >> Advanced tab >> {item list} For each profile in the list, clear the "Automated Response Messages" checkbox.
Interview the E-mail Administrator or the IAO. Request documentation that indicates any manually entered Global Accept and Deny list configurations are in place on an E-mail Secure Gateway at the network perimeter. Ensure that the local domain appears in the 'Deny' list for the domain to prevent spoofed SPAM. Criteria: If Perimeter Gateway configurations indicate that the local domain exists in the 'Deny' List and that no entries exist in the 'Accept' List, this is not a finding.
Procedure: Implement perimeter protection in the form of a secure E-mail filtering mechanism that performs, among other protections, manually configured 'Deny' List entries (that include the local domain, minimally) to supplement the commercial 'Block List' service. Ensure also, that no 'Accept' List entries exist in the configuration.
Interview the E-mail Administrator or the IAO. Request documentation that indicates SPAM evaluation filters are in place on an Edge Transport Server (E-mail Secure Gateway Server) role outside the network perimeter. Criteria: If the mailbox servers are protected by a perimeter-based Edge Transport Server role (E-mail Secure Gateway) which performs SPAM filtering prior to forwarding E-mail to the mailbox servers, this is not a finding.
Implement perimeter protection in the form of a secure email filtering mechanism that performs, among other protections, SPAM elimination prior to forwarding message traffic to mailbox servers.
Interview the E-mail Administrator or the IAO. Request documentation that indicates Block List Services filters are in place on an E-mail Secure Gateway outside the enclave at the perimeter. Criteria: If the Exchange 2003 mailbox servers are protected by a perimeter-based Edge Transport Server role (E-mail Secure Gateway), which performs 'Block List' filtering prior to forwarding E-mail to the mailbox servers, this is not a finding.
Subscribe to, and configure, Block List Services. Implement perimeter-based protection in the form of a secure E-mail filtering mechanism that performs, among other protections, Block List Services filtering for SPAM elimination prior to forwarding message traffic to mailbox servers.
Interview the E-mail Administrator or the IAO. Request documentation that indicates Block List Services filters are in place, with no exceptions (or exceptions documented as to reasons), on an E-mail Secure Gateway outside the enclave at the network perimeter. Criteria: If Block List Exceptions are configured and approved on an Edge Transport Server role (perimeter-based E-mail Secure Gateway), this is not a finding.
Implement perimeter-based protection in the form of a secure E-mail filtering mechanism that performs, among other protections, Block List exceptions filtering for SPAM elimination prior to forwarding message traffic to mailbox servers.
Interview the E-mail Administrator or the IAO. Request documentation that indicates sender authentication techniques are in place on a secure email gateway server outside the enclave at the perimeter. Sender authentication for anonymous connections may take the form of Sender ID Framework (SIDF) or Domain Keys Internet Mail (DKIM), both DNS-based methods of sender authentication. Note: Sender authentication is not always reliable, because not all senders of electronic mail participate in creating public DNS sender profiles for their E-mail infrastructure. Criteria: If sender authentication is configured and approved on a perimeter-based E-mail Secure Gateway, this is not a finding.
Implement perimeter-based protection in the form of an Edge Transport Server role (E-mail Secure Gateway) filtering mechanism that performs, among other protections, Sender Authentication upon receipt.
Verify that the “Set message size”, is not set to Unlimited. Procedure: Exchange System Manager >> Global Settings >> Message Delivery>> Properties >> Defaults tab The "Send Size" and "Receive Size" should have a value, and not have "unlimited" selected. Criteria: If "Send Size" and "Receive Size" have a value, and have not selected "unlimited", this is not a finding.
Set the Global Send and Receive message sizes. Procedure: Exchange System Manager >> Global Settings >> Message Delivery>> Properties >> Defaults tab Set "Send Size" and "Receive Size" to a value (do not select Unlimited). Default size limits are as follows (to be used if other sizes are not justified): Send Size =10,240 Receive Size = 10,240
Review Message Size setting for each SMTP virtual server. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages tab Note: If “administrative groups” do not display in the list, highlight the topmost “Exchange” item in the left hand list, then access the Action menu, select Properties, check the “Display Routing Groups” box, and the “display administrative groups” box. Exit Exchange Manager, then restart it, and repeat the “check” steps. The checkbox for “Limit Message size to (KB)” should be cleared. Criteria: If the “Limit Message Size to (KB)" is cleared, this is not a finding.
Set the sending and receiving message size for the SMTP virtual server to unlimited. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages tab Clear the checkbox for “Limit Message size to (KB)”
Perform for each SMTP virtual server: Note: If “administrative groups” do not display in the list, highlight the topmost “Exchange” item in the left hand list, then access the Action menu, select Properties, check the “Display Routing Groups” box, and the “display administrative groups” box. Exit Exchange Manager, then restart it, and repeat the “check” steps. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages Tab The "Limit Session Size to (KB)" field should be cleared. Criteria: If the “Limit Session Size to (KB)" is cleared, this is not a finding.
Set the SMTP Session Size Limit. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages Tab Clear the “Limit Session size to (KB)” field.
Perform for each SMTP virtual server. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages tab The “Limit number of messages per connection” should be set to 20. Criteria: If “Limit number of messages per connection” is set to 20 (or other value with justifying documentation), this is not a finding.
Configure the SMTP Session messages count limit. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages tab Set “Limit number of messages per connection” at 20 or the value determined necessary for the site.
Verify the SMTP Virtual Server Recipient Count Limit. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMPT >> [specific SMPT server] >> Properties >>Messages Tab The “Limit number of recipients per message” should be is set to a numeric value of 64000 (default) or less. Criteria: If “Limit number of recipients per message” is set to a numeric value of 64000 (default) or less, and the System Security Plan documentation has a documented reason, this is not a finding.
Set the SMTP Virtual Server Message Recipient Count limit.. Procedure: Exchange System Manager >> Administrative Groups >> [administrator group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >>Messages Tab Select “Limit number of recipients per message" to 64000.
Ensure that Global Recipient Count is not set to "Unlimited". Proceure: Exchange System Manager >> Global Settings >> Message Delivery>> Properties >> Defaults tab >> Recipient Limits The "Recipient Count" should be set to a value, not "Unlimited". Criteria: If "Recipient Count" is set to a value, not "Unlimited", this is not a finding.
Set the Recipient Count limit. Procedure: Exchange System Manager >> Global Settings >> Message Delivery>> Properties >> Defaults tab Set "Recipients" to a value (do not select Unlimited). The default value is 5000, but can be set lower if local site conditions warrant it and the reason is documented in the System Security Plan.
Interview the E-mail Administrator or the IAO. Request documentation that indicates Nonexistent Recipient filters are in place and set to allow messages, on an Edge Transport Server role (E-mail Secure Gateway)at the network perimeter. Criteria: If non-existent recipients' messages are received for evaluation, this is not a finding
Implement perimeter-based protection in the form of an Edge Transport Server role (E-mail Secure Gateway) filtering mechanism that performs, among other protections, Non-Existent Recipient filtering that does not alert senders to non-existent recipients.
Interview the E-mail Administrator or the IAO. Request documentation that indicates Filtered messages are archived on a secure email gateway server outside the enclave at the perimeter. Criteria: If inbound messages filtered by the sender filter are archived, this is not a finding.
Implement perimeter-based protection in the form of a secure email filtering mechanism that performs, among other protections, filtered messages archiving for SPAM elimination prior to forwarding message traffic to mailbox servers inside the enclave.
Interview the E-mail Administrator or the IAO. Request documentation that indicates Messages with blank senders are filtered at the perimeter by an Edge Tranport Server role (E-mail Secure Gateway). Criteria: If inbound messages with blank sender are filtered and archived, this is not a finding.
Implement perimeter-based protection in the form of an Edge Transport Role server (E-mail Secure Gateway) filtering mechanism that performs, among other protections, filtering messages with blank sender and archiving them for SPAM elimination.
Interview the E-mail Administrator or the IAO. Request documentation that indicates connections from sources matching sender filters are dropped on an Edge Transport Role (E-mail Secure Gateway) server outside the enclave at the perimeter. Criteria: If incoming connections from “sender filter” sources are dropped, this is not a finding.
Implement perimeter-based protection in the form of a Secure E-mail Gateway that performs, among other protections, dropping connections when the address matches “sender filter” sources, for SPAM elimination prior to forwarding message traffic to mailbox servers.
Verify that unneeded Front End services are disabled. Procedure: Microsoft Exchange Information Store Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\MSExchangeIS Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange MTA Stacks Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\MSExchangeMTA Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange Routing Engine Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\RESVC Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange IMAP4 Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\IMAP4SVC Key: START Value: Reg_DWORD 0x00000004. Microsoft Exchange POP3 Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\POP3SVC Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange Event Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\MSExchangeES Key: START Value: Reg_DWORD 0x00000004 Network News Transfer Protocol (NNTP) Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\NNTPSVC Key: START Value: Reg_DWORD 0x00000004 Microsoft Exchange Site Replication Service Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Registry: HKLM\CCS\Services\MSExchangeSRS Key: START Value: Reg_DWORD 0x00000004 Criteria: If unnecessary services are disabled, this is not a finding.
Disable unneeded services. Procedure: Navigate to Start >> Settings >> Administrative Tools >> Services Create correct configurations. Microsoft Exchange IMAP4 – Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange Information Store Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange POP3 Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Search Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange Event Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange Site Replication Service Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange MTA Stacks Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Microsoft Exchange Routing Engine Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable Network News Transfer Protocol (NNTP) Right Click >> Stop Service, if running. Right Click >> Properties >> Start Type change to Disable
Verify that OMA Virtual Directory is removed. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify the OMA virtual directory in the list. Criteria: If the OMA virtual directory is deleted, this is not a finding.
Delete the OMA virtual directory. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site >>OMA Delete the OMA virtual directory.
Verify that ActiveSync Virtual Directory is removed. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify the Microsoft Server-Active Sync virtual directory. Criteria: If the Active Sync virtual directory is deleted, this is not a finding.
Delete the Active Sync virtual directory. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify and delete the Microsoft Server-Active Sync virtual directory.
If Public Folders are in use at the site, this check is N/A. Verify that "Public" Virtual Directory is removed. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site The "Public" virtual directory should be missing from the list. Criteria: If the "Public" virtual directory is missing from the list, this is not a finding.
Delete the Public Folder virtual directory. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify and delete the "Public" Virtual Directory.
Review connectors created for the site. Procedure: Exchange System Manager >> Administrative Groups >> [administrative groups] >> Routing Groups >> Connectors List of connectors should be clearly named as to purpose and direction. Criteria: If connectors are clearly named as to purpose and direction, this is not a finding.
Revise connectors to ensure they are named clearly as to purpose and direction. Procedure: Exchange System Manager >> Administrative Groups >> [administrative groups] >> Routing Groups >> Connectors Revise names to clearly show purpose and direction.
Validate Simple Mail Transfer Protocol (SMTP) connector configurations. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Routing Groups >> [routing group] >> Connectors>> [Routing Group connector] >> Properties >> Content Restriction tab >> Allowed Sizes The “Only messages less than (KB)” checkbox should be cleared. Criteria: If “Only messages less than (KB)” checkbox is cleared, this is not a finding.
Configure Simple Mail Tranfer Protocol (SMTP) Connectors. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Routing Groups >> [routing group] >> Connectors>> [Routing Group connector] >> Properties >> Content Restriction tab >> Allowed Sizes Clear the “Only messages less than (KB)” checkbox.
Access the Simple Mail Transfer Protocol (SMTP) Connection Retry configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> Outbound The default values should be in use, or alternate values may be in use, but they should also be documented in the System Security Plan. - the “First retry interval” (10 min) - the “Second retry interval” (15 min) - the “Third retry interval” (15 min) - the “Subsequent retry interval” (15 min). - the “delay notification” (12 hrs) - the “expiration timeout” (2 days) Criteria: If the message delivery retry settings are as shown above, or have alternate values justified in the System Security Plan, this is not a finding.
Set Outbound Delivery Retry values. If alternate values are desired, they must also be documented in the System Security Plan. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> outbound Enter values as shown: - the “First retry interval” (10 min) - the “Second retry interval” (15 min) - the “Third retry interval” (15 min) - the “Subsequent retry interval” (15 min). - the “delay notification” (12 hrs) - the “expiration timeout” (2 days)
Access the SMTP Maximum Hop Count configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> Advanced button The “Enter maximum hop count” value should be 30. Criteria: If the “Enter maximum hop count” value is 30, this is not a finding.
Set the maximum hop count value. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> advanced button. For "Enter maximum hop count", enter 30.
Access the mail server outbound connection configuration. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> Outbound Connections button The “Maximum Outbound Connections” should be set to 1000, or an alternate value that is documented in the System Security Plan. Criteria: If the "Maximum Outbound Connections" is at 1000, or set to an alternate value that is explained in the System Securtiy Plan, this is not a finding.
Set the maximum outbound connection count. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> Outbound Connections button Enter 1000 for "Maximum Outbound Connections", or enter an alternate value if local site conditions warrant it, and document it in the System Security Plan.
Access the mail server outbound connection timeout configuration. Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> outbound connections button. Ensure that the “Outbound Connections Timeout” value is = 10 or less. Criteria: If outbound connections timeout limit is at 10 or less, this is not a finding.
Procedure: Set the outbound connection timeout limit. Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Delivery tab >> Outbound Connections button. Enter Outbound Connections Timeout value = 10 or less.
Access the mail server Outbound Connection configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> Outbound Connections button. The “Outbound Connections per Domain Count” should be = 100 or less. Criteria: If "Outbound connections per domain count" is 100 or less, this is not a finding.
Set the Outbound Connections per Domain Count. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery tab >> Outbound Connections button. Enter Outbound Connections per Domain Count = 100 or less.
Access the SMTP Inbound Connections configuration. Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab The “Limit number of connections to” checkbox should be cleared. Criteria: If the "Limit Number of Connections to" is cleared, this is not a finding.
Set the Limit Inbound Connections limit. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab Clear the “Limit number of connections to” checkbox.
Access the mail server connection timeout configuration. Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab Ensure the “Connection Timeout” value is = 10 or less. Criteria: If the ‘Inbound Connections Timeout Limit’ value is at 10 or less, this is not a finding.
Set the Inbound Connection Timeout limit. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab Enter "Connection timeout" value = 10. If a value less than 10 is desired for the site, and is documented in the System Security Plan, then enter a value less than 10.
Access the mail server inbound connections configuration. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access tab >> Connection control >> Connection button "Only the list below” should be selected, with a list of addresses or subnets authorized to connect to this server. Criteria: If "Only the list below” is selected, with a list of addresses or subnets authorized to connect to this server, this is not a finding.
Set the Inbound Connections configuration. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access tab >> Connection control >> Connection button Select “Only the list below” and list addresses or subnets authorized to connect to this server.
Verify that Exchange Filters are enabled. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab >> Advanced >> Edit The “Apply Sender Filter” “Apply Recipient Filter” and “Apply Connection Filter” checkbox should be selected. Criteria: If “Apply Sender Filter” “Apply Recipient Filter” and “Apply Connection Filter” checkboxes are selected, this is not a finding.
Enable the Sender, Recipient, and Connection Filters. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab >> Advanced >> Edit Select checkboxes for “Apply Sender Filter” “Apply Recipient Filter” and “Apply Connection Filter”.
Validate ExAdmin Virtual Directory authentication settings. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group]>>Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server>>ExAdmin>>Properties>>Access Tab>>Authentication Settings>>Authentication button "Integrated Windows Authentication" should be selected. Criteria: If "Integrated Windows Authentication" is selected, this is not a finding.
Configure the ExAdmin Virtual Directory Authentication. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group]>>Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server>>ExAdmin>>Properties>>Access Tab>>Authentication Settings>>Authentication button Select "Integrated Windows Authentication".
Validate connector scope configuration. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Address Space tab>>Connector Scope The “Routing Group” checkbox should be selected. Criteria: If the “Routing Group” checkbox is selected, this is not a finding.
Configure the SMTP connector scope. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Address Space tab>>Connector Scope Select the “Routing Group” checkbox.
Review the connector configuration. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> General tab>>Radio Group “Smart-Host” should be selected, and the "Smart Host" identified be an Edge Transport Role server (E-mail Secure Gateway). Criteria: If “Smart-Host” is selected, and the "Smart Host" named is the Edge Transport Role (E-mail Secure Gateway), this is not a finding.
Configure the “Smart-Host” on the SMTP connector. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> General tab>>Radio Group Select “Smart-Host” and specify the name of the E-mail Edge Transport Role Server (E-mail Secure Gateway) that performs the “Smart-Host” function.
Validate SMTP Connector Relay authentication. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Address Space tab The “Allow messages to be relayed to these domains” should be unchecked. Criteria: If “Allow messages to be relayed to these domains” is unchecked, this is not a finding.
Prevent unauthenticated mail relaying. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Address Space tab Clear the “Allow messages to be relayed to these domains” checkbox.
Access the System Security Plan. Determine whether the server being reviewed is authorized to perform as a relay. Validate relay restriction configuration. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Access Tab >> Relay restrictions >> Relay Button. For servers authorized to perform as a relay: “Allow all computers which successfully authenticate to it” should be selected. Criteria: If “Allow all computers which successfully authenticate to it” is selected, this is not a finding. For servers not authorized to perform as a Relay: “Select only the List below” with no servers listed should be selected. Criteria: If “Select only the List below” with no servers listed, this is not a finding.
Configure E-Mail relay exclusions. Procedure: For servers that are authorized to relay messages, configure the following: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Access Tab >> Relay restrictions >> Relay Button Select “Allow all computers which successfully authenticate to it”. For servers that are not authorized to relay messages, configure the following: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Access Tab >> Relay restrictions >> Relay Button Procedure: Select “Allow only the list below” and specify no servers in the list.
Validate “Smart-Host” configuration at the Virtual Server Level. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Delivery Tab >> Advanced button>> “Smart-Host” The list of “Smart-Hosts” should be cleared. Criteria: If the list of “Smart-Hosts” is empty, this is not a finding.
Configure the SMTP Virtual Verver “Smart-Host” list. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Delivery Tab >> Advanced button >> “Smart-Host” Clear the list of any “Smart-Hosts”.
Validate Reverse DNS lookup delivery configuration. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Delivery Tab >> Advanced button The "Perform Reverse DNS lookup on incoming messages" checkbox should be cleared. Criteria: If the "Perform Reverse DNS lookup on incoming messages" checkbox is cleared, this is not a finding.
Configure the anonymous delivery DNS option. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Servers>> [server]>>Protocols>> SMTP >> [specific SMTP virtual server]>> >>Properties >> Delivery Tab >> Advanced button Clear the "Perform Reverse DNS lookup on incoming messages" checkbox.
Validate the Virtual Server outbound Security. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP virtual server] >> Properties >> Delivery tab >> Outbound Security button “Anonymous” and "TLS" should be selected. Criteria: If “Anonymous” and "TLS" are selected, this is not a finding.
Set Virtual Server outbound security. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP virtual server] >> Properties >> Delivery tab >> Outbound Security button Select “Anonymous” and "TLS" encryption.
Validate anonymous E-mail resolution configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access Control Tab >> Authentication button The “Resolve Anonymous E-mail” checkbox should be cleared. Criteria: If the “Resolve Anonymous E-mail” checkbox is cleared, this is not a finding.
Configure each SMTP virtual server. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access Control Tab >> Authentication button Clear the “Resolve Anonymous E-mail” checkbox.
Validate Logging configuration. Procedure: Exchange system Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> [storage group] >> Properties >> General tab The ‘Enable circular logging’ checkbox should be cleared. Criteria: If the 'Enable circular logging’ checkbox is cleared, this is not a finding.
Configure E-mail servers’ circular logging to be disabled. Procedure: Exchange system Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> [storage group] >> Properties >> General tab Clear the ‘Enable circular logging’ checkbox.
Review Diagnostic Logging Level Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Diagnostic Logging tab Each item in the left panel, should have a status of “none”. Criteria: If Each item in the left panel, has a status of “none”, this is not a finding.
Configure diagnostic logging. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Diagnostic Logging For each item, select logging level “none”.
Verify that e-mail subject line logging is disabled. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> General tab The “Enable Subject logging and display” checkbox should be cleared. Criteria: If “Enable Subject logging and display” checkbox is cleared, this is not a finding.
Configure E-Mail subject line logging. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> General Tab Clear the “Enable Subject logging and display” checkbox.
Interview the E-mail Administrator (EMA) or the System Administrator. Ascertain the partition identifier for the operating system and the Mailbox data partitions. Review the log file configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group}>> Servers >> [server] >> SMTP >> [specific SMTP server] >> Properties >> General tab >> Properties button The “Enable Logging” checkbox in the log file directory box should be selected. The log file path should NOT be the default path (\WINNT\SYSTEM32\LOGFILES\SMPTSVCx (where x is a number used to distinguish between virtual servers in this organization) or on the Mailbox Data partition. Criteria: If SMTP Virtual Servers log is written to a partition that is NOT \WINNT\SYSTEM32\LOGFILES\SMPTSVCx, and also NOT the Mailbox Data partition, this is not a finding.
Configure SMTP Virtual Server log location. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group}>> Servers >> [server] >> SMTP >> [specific SMTP server] >> Properties >> General tab >> Properties button Select the “Enable Logging” checkbox. Enter the log file location. Ensure that the log file path is other than the operating system partition, and other than the Exchange 2003 Mailbox data partition.
Access the “send error message to Microsoft” configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> General tab The “Automatically send fatal service error to Microsoft” checkbox should be clear. Criteria: If “Automatically send fatal service error to Microsoft” checkbox is clear, this is not a finding.
Configure the "send error message to Microsoft" option. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> General tab Clear the “Automatically send fatal service error to Microsoft” checkbox.
If disk monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then using Exchange monitoring for disk space usage is an acceptable solution, and this check is N/A. Review disk space monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> Disk Space Threshold >> Details button For each disk, "Warning" should be 15% or more of available Disk Space, and "Critical" should be 5% or more of available Disk Space (not to exceed the "Critical" figure). At minimum, actions should include sending an E-mail alert an on-call Exchange Administrator or to an Incident Response Administrator. Criteria: If "Warning" is set to 15% or more of available disk space, and "Critical" is set to 5% or more of available disk space (not to exceed the "Critical" figure), and minimum, actions include sending an E-mail to an on-call Exchange Administrator or to an Incident Response Administrator, this is not a finding.
Configure disk space monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab 1) Add the monitor, if needed: Click ADD, select Free Disk Space. Add one monitor for each disk. 2) Set the warning and critical thresholds Set the warning value not less than 15% of available disk and critical value not less than 5% of available disk. 3) Create the notifications: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications Specify E-mail to the E-mail Administrator or Incident Response Team account at minimum. Optionally, a script can be invoked to create a log message.
If CPU monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this check is N/A. Review CPU utilization monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> CPU Utilization Threshold >> Details button "Warning" should be set (for a sustained duration of 10 minutes) at a value not greater than 80%. "Critical" should be set for a value of value not greater than 90%. At minimum, actions should E-mail an on-call Exchange administrator or Incident Response administrator. Criteria: If CPU utilization monitoring "Warning" is set to (for a sustained duration of 10 minutes) 80% or less and "Critical" is set to 90% or less, with alert E-mail sent to an administrator, this is not a finding.
Ensure that CPU utilization monitoring and notification is enabled. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring Tab >> CPU Utilization Threshold >> Details button 1) Add the monitor, if needed: Click ADD, select CPU Utilization Threshold. 2) Set the duration, warning and critical thresholds Set (for a sustained duration of 10 minutes) Warning value not greater than 80% and Critical value not greater than 90%. 3) Create the notifications: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications: Declare notifications and communication methods as required by local organization policy. At minimum, alert an on-call Exchange Administrator or Incident Response Administrator.
If Virtual Memory Utilization monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this check is N/A. Review virtual memory utilization monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> Virtual Memory Threshold >> Details button "Warning" should be set (for a sustained duration of 3 minutes) to a value not less than 25%. "Critical" should be a value not less than 10%. Minimum Action should be E-mail to an on-call Exchange Administrator or to an Incident Response administrator. Criteria: If "Warning" is set (for a sustained duration of 3 minutes) to a value 25% or higher, and "Critical" is 10% or higher,and Action is an E-mail to an on-call Exchange Administrator, this is not a finding.
Configure Virtual Memory utilization monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> Virtual Memory Threshold >> Details button 1) Add the monitor, if needed: Click ADD, select Virtual Memory Threshold. 2) Set the duration, warning and critical thresholds Set (for a sustained duration of 3 minutes) Warning value not less than 25% and Critical value not less than 10%. 3) Create the notifications: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications: Declare notifications and communication methods as required by local organization policy. At minimum, E-mail an on-call Exchange administrator or an Incident Response administrator.
If SMTP queue monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this check is N/A. Review SMTP queue monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> SMTP Queue Threshold >> Details button 'Warning" should be 10 or more minutes, and "Critical" should be 20 or more minutes. Minumim notification should be an E-mail alert to an administrator account. Criteria: If 'Warning" is 10 or more minutes, and "Critical" is 20 or more minutes with minumim notification indicating an E-mail to an Administrator or Incident Response team account, this is not a finding.
Configure SMTP queue monitoring and notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> SMTP Queue Threshold >> Details button 1) Add the monitor, if needed: Click ADD, select SMTP queue Threshold. Add one monitor for each SMTP queue. 2) Set the warning and critical thresholds. Set Warning value not less than 10 minutes and Critical value not less than 20 Minutes. Values should be realistic for the queue and site operational requirements. 3) Create the notifications: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications: Declare notifications and communication methods as required by the local organization policy. At minimum, E-mail an on-call Exchange administrator account or an Incident Response administrator. A script may be invoked to perform other actions.
If Windows Services Monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this is N/A. Review Windows Services Monitoring and Notification. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> [Windows 2003 Service] >> Details button The following Services should be monitored: Event Log NTLM Security Support Provider Remote Procedure Call Server Workstation IIS Admin Service HTTP SSL For each item, the "When Service is not Running, Change State to" should be "Critical" Minimum action should be an E-mail sent to an E-mail Administrator or to an Incident Response team account. Criteria: If, for each service the "When Service is not Running, Change State to" is"Critical", and the minimum action is to send an E-Mail to an Administrator or to an Incident Response Team account, this is not a finding.
Configure Windows Services Monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> [Windows 2003 Service] >> Details button 1) Add the monitor, if needed: Click ADD, select desired Windows 2003 Service. Add each service listed. Event Log NTLM Security Support Provider Remote Procedure Call Server Workstation IIS Admin Service HTTP SSL 2) Set the warning and critical thresholds for each service Set “When service is not running change state to” Critical. 3) Create the notifications for each service: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications: Declare notifications and communication methods as required by the local organization policy. At minimum, send an E-mail to an on-call Exchange Administrator or Incident Response administrator.
If Exchange Core Services monitoring is performed via a third party tool as part of an overall data center monitoring strategy, then this is N/A. Review Exchange Core Services monitoring and notification. Note: List content may differ depending on specific Exchange components implemented. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring Tab >> [Default Microsoft Exchange Services] >> Details Button For each item listed, the "When Service is not Running, Change State to" should be "Critical" and the minimum action should be an E-mail to an E-mail Administrator or to an Incident Response team account. Criteria: If, for each service the "When Service is not Running, Change State to" is"Critical", and the minimum action is an E-mail to an Administrator or to an Incident Response Team account, this is not a finding.
Configure Exchange Core Services monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab >> [Windows 2003 Service] >> Details button 1) Add the monitor, if needed: Click ADD, select desired Exchange core Service. 2) Set the warning and critical thresholds for each service Set “When service is not running change state to” Critical. 3) Create the notifications for each service: Exchange System Manager >> Tools >> Monitoring and Status >> Notifications Declare notifications and communication methods as required by the local organization policy. At minimum, E-mail an on-call Exchange Administrator or an Incident Response administrator.
Validate that Public Virtual Server has correct user permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Public >> Properties >> Access tab For Access Control, ‘Read, write, Script source access, Directory browsing’ should be selected. Criteria: If Access Control has ‘Read, write, Script source access, Directory browsing’ selected, this is not a finding.
Configure Public Virtual Server user permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Public >> Properties >> Access tab For Access Control, select ‘read, write, script source access, directory browsing’.
Interview the E-mail Administrator or the IAO. Review documentation that describes attachment filtering at the perimeter, as performed by the Edge Transport Server (E-mail Secure Gateway). Criteria: If E-mail attachments are filtered by an Edge Transport Server (E-mail Secure Gateway) at the perimeter, this is not a finding.
Procedure: Deploy attachment filtering at the perimeter on an Edge Transport Server (E-mail Secure Gateway) that supports attachment filtering. The following list suggests the minimum attachments that should be disallowed. Exceptions should be documented in the System Security Plan explaining the reason for addition or removal. As well, attachment filtering lists should align with client application direction such as Microsoft Outlook and Microsoft Outlook Web Access (OWA) or other platforms that perform attachment filtering. For Level1FileTypes: Value Data: ade, adp, app, asx, bas, bat, chm, cmd, com, cpl, crt, csh, exe, fxp, hlp, hta, inf, ins, isp, js, jse, ksh, lnk, mda, mdb, mde, mdt, mdw, mdz, msc, msi, msp, mst, ops, pcd, pif, prf, prg, reg, scf, scr, sct, shb, shs, url, vb, vbe, vbs, wsc, wsf, wsh For Level2FileTypes: Value Data: ade, adp, asx, bas, bat, chm, cmd, com, cpl, crt, exe, hlp, hta, htm, html, htc, inf, ins, isp, js, jse, lnk, mda, mdb, mde, mdz, mht, mhtml, msc, msi, msp, mst, pcd, pif, prf, reg, scf, scr, sct, shb, shs, shtm, shtml, stm, url, vb, vbe, vbs, wsc, wsf, wsh, xml, dir, dcr, plg, spl, swf
Ensure that mailbox retention for backups are complete. Procedure: Exchange System Manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> [storage group] >> Mailbox store [server name] >> Properties >> Limits tab >> Deletion settings The “Do not permanently delete mailboxes and items until the store has been backed up” should be selected. Criteria: If “Do not permanently delete mailboxes and items until the store has been backed up” is selected, this is not a finding.
Configure messages and mailboxes for backups. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> [storage group] >> Mailbox store [server name] >> Properties >> Limits tab >> Deletion settings Select “Do not permanently delete mailboxes and items until the store has been backed up”.
Valiate that Public Folders are retained until Backups are run. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> [storage group] >> Public Folder store [server name] >> Properties >> Limits tab >> Deletion settings The “Do not permanently delete Public Folders until the store has been backed up” should be selected. Criteria: If “Do not permanently delete Public Folders until the store has been backed up” is selected, this is not a finding.
Configure Public Folders for Backups. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> [storage group] >> Public Folder store [server name] >> Properties >> Limits tab >> Deletion settings Select “Do not permanently delete mailboxes and items until the store has been backed up”.
Ensure that Mail Stores Restore Overwrite is enabled. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Mailbox store [server name] >> properties >> database tab The “This database can be overwritten by a restore” checkbox should be cleared. Criteria: If “This database can be overwritten by a restore” checkbox is cleared, this is not a finding.
Ensure that Mail Store Restore Overwrite Protection is enabled. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Mailbox store [server name] >> properties >> database tab Clear the “This database can be overwritten by a restore” checkbox.
Ensure that Public Folder Restore Overwrite Protection is enabled. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Public Folder store [server name] >> properties >> database tab The “This database can be overwritten by a restore” checkbox should be cleared. Criteria: If “This database can be overwritten by a restore” checkbox is cleared, this is not a finding.
Ensure that Public Folders Restore Overwrite Protection is enabled. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Public Folder store [server name] >> properties >> database tab Clear the “This database can be overwritten by a restore” checkbox.
For sites that do not require full E-Mail Message Archiving, this check is N/A. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Mailbox store [server name] >> properties >> General tab The “Archive all message sent or received by mailboxes on this store” should be checked. Criteria: If “Archive all message sent or received by mailboxes on this store” is checked, this is not a finding.
Configure Message Archiving. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> [storage group] >> Mailbox store [server name] >> properties >> General tab Select the “Archive all message sent or received by mailboxes on this store” check box.
Interview the E-mail Administrator. Procedure: Start >> Programs >> All Programs. Review all the programs listed to ensure that no E-mail servers, office programs, database programs, etc., are installed. If they are, ask the E-mail Administrator about their function and purpose. Criteria: If E-mail services reside on dedicated directories or partitions and do not co-host other applications (without associated approval from the IAO), this is not a finding.
Procedure: Install E-mail services on dedicated partitions. E-mail services software must not share a directory or partition with other software or the host operating system.
Verify that audit file location is in a different directory than the default, or on a different partition than the default. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> servers >> [server name]>> Properties >> general tab The location should not be the default of %systemroot%\program files\exchangesvr\servername.log. (where servername is the actual name of the server being reviewed. Criteria: If E-mail logs or audit data are configured to a location other than the default of %systemroot%\program files\exchangesvr\servername.log this is not a finding.
Specify different host system disk partitions or directories for Exchange log files. Procedure: Exchange System manager >>Administrative Groups >> [administrative group] >> Servers >> [server name]>> Properties >> General tab Choose a location other than the default of "%systemroot%\program files\exchangesvr\servername.log" for the log file location.
Verify that E-mail services are deployed on compliant ports and protocols Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site >>Properties >> Web Site tab >> Web site identification >> TCP port and SSL port Port 80 for TCP and port 443 for SSL should be entered. Criteria: If Port 80 for TCP and port 443 for SSL is entered, this is not a finding.
Procedure: Enter Web compliant ports and protocols. IIS Manager >> [server name]>>Web Sites >> Default Web Site >>Properties >> Web Site Tab >> Web site identification >> TCP port and SSL port Enter 80 for TCP port and 443 for SSL port.
Verify that SMTP services are deployed on compliant ports and protocols. Procedure: Exchange system manager >> administrative groups >> [administrative groups]>>Servers >> [server]>>Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery Tab >> Outbound connections button >> TCP Port For SMTP, port 25 should be entered. Criteria: If 25 is entered for the SMTP port, this is not a finding.
Enter the SMTP compliant ports. Procedure: Exchange system manager >> administrative groups >> [administrative groups]>>Servers >> [server]>>Protocols >> SMTP >> [specific SMTP server] >> Properties >> Delivery Tab >> Outbound Connections button >> TCP Port For SMTP, enter 25.
Verify that E-mail Virtual server is bound on SMTP port 25. Procedure: Exchange system manager >> administrative groups >> [administrative groups]>>Servers >> [server]>>Protocols >> SMTP >> [specific SMTP server] >> properties >> General Tab >> Advanced >>Edit>> TCP Port Port 25 for SMTP should be entered. Criteria: If 25 is entered for SMTP, this is not a finding.
Enter 25 for SMTP on each SMTP Virtual Server Procedure: Exchange system manager >> administrative groups >> [administrative groups]>>Servers >> [server]>>Protocols >> SMTP >> [specific SMTP server] >> properties >> General Tab >> Advanced >>Edit>> TCP Port Enter 25 for SMTP.
Verify the software change monitoring schedule. Procedure: Interview the E-Mail Administrator or IAO to ascertain current INFOCON level history, and ask for software modification detection procedures in place. Review reports for inclusion of the Exchange 2003 executable and configuration files. Criteria: If E-mail software is monitored for changes as required by the INFOCON levels, this is not a finding.
Procedure: Establish procedures to monitor any changes made to E-mail Services software. Identify files and directories to be included in the host system and provide these to the person responsible for backups. Verify that E-mail software libraries are monitored for change according to SD527-1 INFOCON levels.
Review documentation and the E-mail host servers. Procedure: Interview the E-mail Administrator or the IAO. Access System Security Plan documenation and the server being reviewed. Verify that Exchange 2003 is not installed on a Domain Controller or other Directory Services server. Criteria: If Exchange E-mail application is installed on a server that separate from domain security services, this is not a finding.
Procedure: Install Exchange 2003 application to a dedicated host system.
Interview the E-Mail Administrator or the IAO. Reference a copy of the System Security Plan. Procedure: Review the application software baseline procedures and implementation evidence. Review the list of files and directories included in the baseline procedure for completeness. Criteria: If E-mail software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Procedure: Implement E-mail software baseline process. Ensure that a plan exists for periodic comparison and is incorporated into the configuration management procedures.
If Public Folders are not in use at the site, this is N/A. Ensure that Public Folders require S/MIME capable clients. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server name] >> [storage group] >> Public Folder store [server name] >> Properties >> General tab The “clients support S/MIME signatures” should be selected. Criteria: If “clients support S/MIME signatures” is selected, this is not a finding.
Require S/MIME capable clients. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> servers >> [server name] >> [storage group] >> Public Folder store [server name] >> properties >> General tab Select the “clients support S/MIME signatures” checkbox.
Ensure that 'Forms-based' authentication is not active. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group]>>Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server >> Properties >> Settings tab The “Enable Forms-based Authentication” checkbox should be cleared. Criteria: If the “Enable Forms-based Authentication” checkbox is cleared, this is not a finding.
Configure Forms-based Authentication. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group]>>Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server >> Properties >> Settings tab Clear the “Enable Forms-based Authentication” checkbox. Note: This configuration presumes that an application proxy server such as Internet Security and Acceleration (ISA) 2006 is installed between the Internet and the Client Access Server to host the authentication form.
Verify the default web site authentication type for Exchange access. Procedure: IIS Manager >> [SERVER NAME] >> Websites>>Default Web Site>> Properties >> Directory Security tab>>Authentication and Access Control>>Edit button Ensure that "Integrated Windows Authentication" is selected. Criteria: If "Integrated Windows Authentication" is selected, this is not a finding.
Ensure that default authentication is set appropriately. Procedure: IIS Manager >> [server name] >> Websites>>Default Web Site>> Properties >> Directory Security tab>>Authentication and Access Control>>Edit button Select the "Integrated Windows Authentication" checkbox.
Validate OWA Authentication Setting: Procedure: Exchange system Manager >> Administrator Groups>> [administrator group] Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server>>Exchange>>Properties>>Access Tab>>Authentication Settings>>Authentication Button "Integrated Windows Authentication" should be selected. Criteria: If "Integrated Windows Authentication" is selected, this is not a finding.
Configure OWA Virtual Server Authentication. Procedure: Exchange system Manager >> Administrator Groups>> [administrator group] Servers>> [server name]>>Protocols>>HTTP>Exchange Virtual Server>>Exchange>>Properties>>Access Tab>>Authentication Settings>>Authentication Button Select "Integrated Windows Authentication".
Validate that Virtual Server certificates are installed for each SMTP Virtual Server. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Access tab >> Secure Communication tab Select the “Wizard” button to create and install a certificate. View the certificate details. Criteria: If the SMTP virtual servers have a valid DoD-Issued certificate, this is not a finding.
Obtain vaid DoD server certificates for SMTP services. For each SMTP virtual server, install a certificate. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> Properties >> Access Tab >> Secure Communication Tab Select the “Wizard” button to install the certificate.
Interview the e-mail administrator or IAO. Access the Exchange 2003 Server log files. Review log file examples. Criteria: If E-mail audit records contain required events: • Account • Event Code and Type • Success or Failure Indication • Time/date • Interface Internet Protocol (IP) address • Manufacturer-specific event name • Source and destination IP addresses • Source and destination port numbers • Network Protocol This is not a finding.
Ensure that E-mail audit records contain required fields, to the degree that Exchange 2003 is able to provide them. Procedure: If logging levels are available that increase reported information, they should be used.
Review Exchange Monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab The “Disable monitoring of this server” checkbox should be clear. Criteria: If the “Disable monitoring of this server” checkbox is cleared, this is not a finding.
Configure monitoring. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> Properties >> Monitoring tab Clear the “Disable Monitoring of this server” checkbox.
Ensure that SMTP Virtual Server Auditing is active. Procedure: Exchange System Manger >> Administrative Groups >> [administrative group}>> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab The “Enable Logging” checkbox should be checked. Criteria: If the “Enable Logging” checkbox is checked, this is not a finding.
Configure SMTP Virtual Server auditing. Procedure: Exchange System Manger >> Administrative Groups >> [administrative group}>> Servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> General tab Select the “Enable Logging” checkbox.
Interview the IAO or E-mail Administrator. Access documentation that describes placement of an E-mail Secure Gateway that receives inbound messages from Internet-based remote domains. Verify the Exchange 2003 connector authentication configuration. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access tab >> Access Control >> Authentication button “Basic authentication” with "TLS" should be selected.
Deploy an Edge Transport Server (E-mail Secure Gateway) role at the perimeter. Then, for each Exchange 2003 SMTP virtual server (now internal to the enclave), set authentication. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP server] >> properties >> Access tab >>Access Control >> Authentication button Select “Basic authentication” and "TLS encryption".
Verify the SMTP virtual server connection security. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP virtual server] >> properties >> Access Tab >> Communication button “Require secure channel” and “Require 128 bit encryption” checkboxes should be checked. Criteria: If “Require secure channel” and “Require 128 bit encryption” are checked, this is not a finding.
For each SMTP virtual server, set secure connection as follows: Exchange System Manager >> Administrative Groups >> [administrative group] >> servers >> [server] >> Protocols >> SMTP >> [specific SMTP virtual server] >> properties >> Access Tab >> Communication button Select “Require secure channel” and “require 128 bit encryption” checkboxes.
Validate outbound connector security on Exchange servers. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Advanced tab >> Outbound Security button The “Basic Authentication” and “TLS” choices should be selected. Criteria: If “Basic Authentication” and “TLS” are selected, this is not a finding.
Implement perimeter protection in the form of an Edge Transport Role Server (E-mail Secure Gateway) that performs, among other protections, the ability to perform Anonymous connections to remote E-mail domains. Configure outbound SMTP connectors. Procedure: Exchange System Manager>>Administrative Groups>> [Administrative Group]>>Routing Groups>> [routing group]>>Connectors>> [SMTP connector]>> >>Properties >> Advanced tab>>Outbound Security button For each connector, select “Basic Authentication” and “TLS”
If Public Folders are not in use at the site, the web directory should be deleted, and this check becomes N/A. Validate Public Folder Web Security. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> PUBLIC >>Properties >> Directory Security tab >> Secure Communications >> Edit button Secure Channel and 128 bit Encryption should be selected. Under "Client Certificates", the "ignore client certificates" option should be selected. All other checkboxes should be cleared. Criteria: If "Secure Channel" and "128 bit Encryption" are selected, with "ignore client certificates", this is not a finding.
Set Public Folders Web Security. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> PUBLIC >>Properties >> Directory Security tab >> Secure Communications >> Edit button Select "Secure Channel" and "128 bit encryption". Under Client Certificates, select the “ignore client certificates” option. All other check boxes should be cleared.
If Outlook Web Access (OWA) is not approved for use at this site, this check is N/A. Verify Exchange directory (OWA) security settings. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> Exchange >>Properties >> Directory Security tab >> Secure Communications >> Edit button. "Secure Channel" and "128 bit encryption" should be selected. Under Client Certificates, the “ignore client certificates” option should be selected. All other settings should be cleared. Criteria: If "Secure Channel" and "128 bit encryption" are selected, with the “ignore client certificates” option, this is not a finding.
Set Outlook Web Access security. Proedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> Exchange >>Properties >> Directory Security tab >> Secure Communications >> Edit button Select "Secure Channel" and "128 bit encryption". Under Client Certificates, select the “ignore client certificates” option. All other settings should be cleared.
Ensure that ExAdmin Virtual Directory is using correct security. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> ExAdmin >>Properties >> Directory Security Tab >> Secure Communications >> Edit Button All checkboxes should be cleared. Criteria: If all security checkboxes are cleared, this is not a finding.
Configure ExAdmin Security. Procedure: IIS Manager>> [Server name]>>Web Sites>>Default Web Site >> ExAdmin >>Properties >> Directory Security Tab >> Secure Communications >> Edit Button Clear all checkboxes.
For each SMTP server (1 thru x) issue the following command: CSCRIPT ADSUTIL.VBS get smtpsvc/x/connectresponse (Where x is the relative number of SMTP virtual server identified on the machine). Criteria: If a modified response is returned, for example: ESMTP …. (Time and date) message is returned, this is not a finding.
Change the banner response text as follows: CSCRIPT ADSUTIL.VBS get esmtpsvc/x/connectresponse "ESMTP" Then, recycle the SMTP service by issuing the commands: NET STOP SMTPSVC, followed by NET START SMTPSVC. Alternately, the value can be changed by accessing the Exchange user interface as follows: Exchange System Manager >> Default SMTP Virtual Server >> Delivery >> Properties >>Advanced Change the value to “ESMTP”. Recycle the SMTP service: NET STOP SMTPSVC, followed by NET START SMTPSVC.
Interview the E-mail Administrator or the IAO. Access the System Security Plan and verify the Exchange Services names active for the site. View Exchange Services to verify service account scope. Procedure: Start >> settings >> Control Panel >> Administrative tools >> Services For each service beginning "MS Exchange…. "service, look for Active Services in the list: Right Click >> Properties >> LogOn tab >> “Log on As” field. Criteria: If E-mail service accounts are operating as SYSTEM, this is not a finding.
Ensure that E-mail services use only the SYSTEM account. Procedure: Start >> Settings >> Control Panel >> Administrative Tools >> Services For each "MS Exchange ..." service, look for Active Services in the list, Right Click >> Propterties >> LogOn tab In the "Log On As" field, select "Local SYSTEM account". Ensure the changes are reflected in the DIACAP Scorecard.
View Exchange service permissions to verify service account privilege level. Procedure: Start >> Settings >> Control Panel >> Administrative tools >> Services For each "MSExch…." Active service in the list: Right Click >> Properties >> LogOn >> Log On As field. Criteria: If E-mail service accounts are operating with the SYSTEM account, this is not a finding.
Ensure that E-mail service accounts are operating with the SYSTEM account privilege. Procedure: Start >> settings >> control panel >> administrative tools >> services For each "MSExch…." Active service in the list: Right Click >> Properties >> LogOn >> Log On As field. Select "Local SYSTEM account".
Verify that restore privilege is restricted to only E-mail Administrators and Installers. Procedure: Exchange System Manager >> Administrative Group >> [administrative group] >> Servers >> [server name] >> [recovery storage group] >> Mailbox store >> Properties >> Security tab >> Advanced button Exchange Administrators and Installers should have full control. No other group should have ‘write’ permissions. Criteria: If Exchange Administrators and Installers have full control and No other group has ‘write’ permissions, this is not a finding.
Ensure that E-mail Restore Permissions are restricted to E-mail Administrators and Installers. Procedure: Exchange System Manager >> Administrative Group >> [administrative group] >> servers >> [server name] >> [recovery storage group] >> Mailbox store >> properties >> security tab >> advanced tab Select “Allow Exchange application administrator full control”. Nobody else should have ‘write’ permissions.
Review Permission Settings for Exchange 2003 Services. Procedure: The following permissions should be set: • Authenticated Users – Read • System – Full Control • Builtin Administrators – Full Control • Auditing for failures against the Everyone security principal For these listed services: • MSExchangeMGMT - %systemroot%\program files\exchsvr\bin\exchmgmt.exe • MSExchangeMTA - %systemroot%\system32\inetwrv\emsmta.exe • MSExchangeSA - %systemroot%\program files\exchsvr\bin\mad.exe • W3Svc - %systemroot%\system32\svchost.exe (IISSVCS) • ISSAdmin - %systemroot%\system32\inetwrv\inetinfo.exe Criteria: If services have vendor recommended permissions, this is not a finding.
Correct the E-Mail Services permissions. Procedure: The following table lists the recommended baseline settings you should start with when hardening the services for an Exchange back-end server (the Exchange_2003-Backend_V1_1.inf file configures these settings automatically). The SDDL sets the following: • Authenticated Users – Read • System – Full Control • Builtin Administrators – Full Control • Auditing for failures against the Everyone security principal For these listed services: • MSExchangeMGMT - %systemroot%\program files\exchsvr\bin\exchmgmt.exe • MSExchangeMTA - %systemroot%\system32\inetwrv\emsmta.exe • MSExchangeSA - %systemroot%\program files\exchsvr\bin\mad.exe • W3Svc - %systemroot%\system32\svchost.exe (IISSVCS) • ISSAdmin - %systemroot%\system32\inetwrv\inetinfo.exe
The following table lists the recommended baseline settings you should start with when hardening the services for an Exchange back-end server (the Exchange_2003-Backend_V1_1.inf file and the Exchange_2003-Frontend_V1_1.inf file configure these settings automatically). File ACL settings configured by Exchange_2003-Backend_V1_1.inf The following permissions: • System – Full Control • Builtin Administrators – Full Control Apply to these directories: %systemdrive%\Inetpub\mailroot\ %systemdrive%\Inetpub\NNTPfile\ The following permissions: • Everyone – Full Control Applies to this directory: %systemdrive%\Inetpub\NNTPfile\root The following permissions: • System – Full Control • Builtin Administrators – Full Control • Server Operators – Modify, Read/Execute, List, Read, Write • Creator Owner – Full Control (subdirectories only) Apply to these directories: %systemdrive%\program files\exchsrvr and subs, but not ADDRESS, OMA, BIN, EXCHWEB, and RES subdirectories. The following permissions: • System – Full Control • Builtin Administrators – Full Control • Server Operators – Modify, Read/Execute, List, Read, Write • Users – Read/Execute, List, Read • Creator Owner – Full Control (subdirectories only) Apply to these directories: %systemdrive%\program files\exchsrvr (subs) >> ADDRESS, OMA, BIN, EXCHWEB, and RES subdirectories Criteria: If files have vendor recommended permissions, this is not a finding.
Procedure: The following table lists the recommended baseline settings you should start with when hardening the services for an Exchange Back-end server (the Exchange_2003-Backend_V1_1.inf file and the Exchange_2003-Frontend_V1_1.inf file configure these settings automatically). File ACL settings configured by Exchange_2003-Backend_V1_1.inf The following permissions: • System – Full Control • Builtin Administrators – Full Control Apply to these directories: %systemdrive%\Inetpub\mailroot\ %systemdrive%\Inetpub\NNTPfile\ The following permissions: • Everyone – Full Control Applies to this directory: %systemdrive%\Inetpub\NNTPfile\root The following permissions: • System – Full Control • Builtin Administrators – Full Control • Server Operators – Modify, Read/Execute, List, Read, Write • Creator Owner – Full Control (subdirectories only) Apply to these directories: %systemdrive%\program files\exchsrvr and subs, but not ADDRESS, OMA, BIN, EXCHWEB, and RES subdirectories. The following permissions: • System – Full Control • Builtin Administrators – Full Control • Server Operators – Modify, Read/Execute, List, Read, Write • Users – Read/Execute, List, Read • Creator Owner – Full Control (subdirectories only) Apply to these directories: %systemdrive%\program files\exchsrvr (subs) >> ADDRESS, OMA, BIN, EXCHWEB, and RES subdirectories
Verify that OWA Virtual Server does not permit script execution. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Exchange >> Properties >> Access tab For Execute Permissions, ‘None’ should be selected. Criteria: If "None" is selected for Execute Permissions, this is not a finding.
Ensure that OWA Virtual Server does not permit scripts to execute. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Exchange >> Properties >> Access tab For Execute Permissions, select ‘None’.
Validate that scripts are not permitted to execute in the Public Virtual Server. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Public >> Properties >> Access tab For Execute Permissions, ‘None’ should be selected. Criteria: If Execute Permissions have ‘None’ selected, this is not a finding.
Configure the Public Virtual Server. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Public >> Properties >> Access tab For Execute Permissions, select ‘None’.
Validate the ExAdmin script permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> ExAdmin >> Properties >> Access tab For Execute Permissions, ‘None’ should be selected. Criteria: If ‘None’ is selected for Execute Permissions, this is not a finding.
Configure the ExAdmin Script Permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> ExAdmin >> Properties >> Access tab Select ‘None’ on Execute Permissions.
Validate that users have correct OWA Virtual Server permissions. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Exchange >> Properties >> Access tab For Access Control, ‘read, write, script source access, directory browsing’ should be selected. Criteria: If Access Control has ‘read, write, script source access, directory browsing’ selected, this is not a finding.
Set user permissions for the OWA virtual server. Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> Exchange >> Properties >> Access tab For Access Control, select ‘read, write, script source access, directory browsing’.
Validate that user permissions to ExAdmin are set correctly. Procedure: Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> ExAdmin >> Properties >> Access tab For Access Control, ‘Read, write, script source access, directory browsing’ should be selected. Criteria: If Access control is configured for ‘Read, write, script source access, directory browsing’ this is not a finding.
Configure permissions in the ExAdmin virtual server. Exchange system Manager >>Administrative Groups>> [administrative group]>> Servers >> [server name] >> protocols >> HTTP >> Exchange Virtual Server >> ExAdmin >> Properties >> Access tab >> Access control Select ‘Read, write, script source access, directory browsing’.
Verify memory zero overwrite configuration. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> [storage group] >> properties >> General tab The “Zero out deleted database pages” checkbox should be checked. Criteria: If “Zero out deleted database pages” checkbox is checked, this is not a finding.
Enable 'Memory Zero Overwrite' after deletion. Procedure: Exchange System Manager >> administrative groups >> [administrative group] >> Servers >> [Server] >> [storage group] >> properties >> General tab Select the “Zero out deleted database pages” checkbox.
Interview the E-mail Administrator or the IAO. Access the System Security documentation that identifies perimeter protection in the form of an Edge Transport Server role ( E-mail Secure Gateway) offering outbound signed message transmissions. Criteria: If an Edge Transport Server (E-mail Secure Gateway) role exists and performs outbound E-mail message signing at the perimeter, this is not a finding.
Implement an Edge Transport Server (E-mail Secure Gateway) that includes DKIM functionality. Ensure that each domain creates mail server certificates and signs outbound messages at the perimeter. NOTE: Each domain must also populate the Public DNS with the appropriate public keys to enable receiver validation.
Verify that audit logs are protected from unauthorized access or modification. Interview the E-mail Administrator or IAO. Procedure: Access the System Security Plan documents that describe audit data location and protection measures. Included should be server locations and directory security that limits access to appropriate and authorized individuals or processes. Only E-mail administrators and System Administrators should have both "read" and "write" ability. E-mail users should be restricted to "write" only. Criteria: If E-mail users are authorized to "write", and only E-mail and System administrators may "read" and "write" to audit trails, this is not a finding.
Configure E-mail audit trail protection against unauthorized access. Procedure: Access the E-mail Services log files. Ensure that only E-mail Administators and System Administrators have "Read" and "Write" permissions, and that everyone else has only "Write". Enumerate the access criteria into the System Security Plan.
Interview the E-mail administrator or the IAO. Procedure: Access the System Security Plan documentation that identifies the E-Mail Anti-Virus product resident on Exchange servers. Validate that the identified is one that offers AVAPI 2.5 or higher for safe scanning without risk of mail data corruption. Criteria: If E-mail servers are using E-Mail aware AV product with AVAPI version 2.5 or higher, this is not a finding.
Install E-mail aware virus protection on mailbox servers. Ensure that mail stores are being scanned with products possessing AVAPI version 2.5 or higher.
Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> [storage group] >> Mailbox Store >> Properties >> Security tab >> Advanced button >> Audit tab All listed items must be selected for “change permissions”, “take ownership”, “add/remove self”, and “write properties”. Criteria: If all items are selected for “change permissions”, “take ownership”, “add/remove self”, and “write properties”, this is not a finding.
Ensure that access control mechanisms are audited. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Servers >> [server] >> [storage group] >> Mailbox Store >> Properties >> Security tab >> Advanced button >> Audit tab Select “change permissions”, “take ownership”, “add/remove self”, and “write properties”.
Review SMTP connectors. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Routing Groups >> [routing group] >> Connectors >> [SMTP Connectors] >> Properties >> Content Restriction tab >> Allowed Sizes The 'Only messages less than (KB)' checkbox should be cleared. Criteria: If the 'Only messages less than (KB)' checkbox is cleared, this is not a finding.
Configure the SMTP connectors. Procedure: Exchange System Manager >> Administrative Groups >> [administrative group] >> Routing Groups >> [routing group] >> Connectors >> [SMTP Connectors] >> Properties >> Content Restriction Tab >> Allowed Sizes Clear the 'Only messages less than (KB)' checkbox.
Microsoft Exchange Server 2003 mainstream support ended 14 April 2009, and extended support ended 8 April 2014. If Microsoft Exchange Server 2003 is installed on a system, this is a finding.
Upgrade Microsoft Exchange Server to a supported version.