Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Open the Exchange Management Shell and enter the following command: Get-SenderIdConfig | Select Name, Identity, Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SenderIdConfig -Enable $true
This requirement is N/A for SIPR enclaves. This requirement is N/A if the organization subscribes to EEMSG or other similar DoD enterprise protections for email services. Open the Exchange Management Shell and enter the following command: Get-SenderFilterConfig | Select Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SenderfilterConfig -Enabled $true
Open the Exchange Management Shell and enter the following command: Get-IPAllowListConfig | fl If the value for “Enabled” is set to “True” this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-IPAllowListConfig -Enabled $true
Access the EDSP and identify the SMTP ‘allow list’ settings. Open the Exchange Management Shell and enter the following command: Get-IPAllowListEntry | fl If the result returns any values, this is a finding. If the result returns any values, but has signoff and risk acceptance in the EDSP, this is not a finding.
Open the Exchange Management Shell and noting identifiers from above, enter the following command: Remove-IPAllowListEntry -Identity <IP Allow List entry ID>
Obtain the Email Domain Security Plan (EDSP) and locate the global maximum message receive size and if signoff with risk acceptance is documented for the receive connector to have a different value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxMessageSize or Get-TransportConfig | Select Identity, MaxReceiveSize Identify Internet-facing connectors on the Edge Transport server. If 'MaxMessageSize' is set to a numeric value different from the global value, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of ‘MaxMessageSize' is not the same as the global value, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -MaxMessageSize <MaxReceiveSize> If an alternate value is desired from the global value MaxReceiveSize, obtain signoff with risk acceptance and document in the EDSP.
Obtain the Email Domain Security Plan (EDSP) and locate the 'Maximum Inbound connections' value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxInboundConnection Identify Internet-facing connectors on the Edge Transport server. If 'MaxInboundConnection' is set to a different numeric value or unlimited, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of 'MaxInboundConnection' is not set to 5000, this is a finding.
Noting the Internet-facing receive connector name, open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -MaxInboundConnection unlimited If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
Obtain the Email Domain Security Plan (EDSP) and locate the 'Connection Timeout' value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, ConnectionTimeout If the value of 'ConnectionTimeout' is set to 00:05:00, this is not a finding. If 'ConnectionTimeout' is set to other than 00:05:00, and has signoff and risk acceptance in the EDSP, this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -ConnectionTimeout 00:05:00 or other value as identified by the Email Domain Security Plan.
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, PermissionGroups If the value of 'PermissionGroups' is 'AnonymousUsers' for any non-internet connector, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -PermissionGroups and enter a valid value other than 'AnonymousUsers'.
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, AuthMechanism If the value of 'AuthMechanism' is not set to 'Tls', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -AuthMechanism 'Tls'
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, DomainSecureEnabled If the value of 'DomainSecureEnabled' is not set to 'True', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -DomainSecureEnabled 'True'
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector -Identity <'ServerUnderReview\ReceiveConnector'> | Select AuthMechanism If the value of 'AuthMechanism' is not set to 'Tls, BasicAuth, BasicAuthRequireTLS', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -AuthMechanism 'Tls, BasicAuth, BasicAuthRequireTLS'
Obtain the Email Domain Security Plan (EDSP) and locate the 'Maximum Recipients per Message' value: Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, MaxRecipientsPerMessage For each receive connector, evaluate the 'MaxRecipientsPerMessage' value. If the value of 'Maximum Recipients per Message' is set to a value other than 5000, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of 'MaxRecipientsPerMessage' is not set to 5000, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -MaxRecipientsPerMessage 5000 or other value as identified by the EDSP.
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, ChunkingEnabled If the value of 'ChunkingEnabled' is set to 'True', this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -ChunkingEnabled $true
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity Review the naming for connectors. If the connectors are not clearly named for purpose and direction, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Name <'NewName'> -Identity <'ReceiveConnector'>
Non- Enterprise Mail Check Content: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | select identity, AutoForwardEnabled If the value of 'AutoForwardEnabled' is not set to 'False', this is a finding. Enterprise Mail Check Content: If the value of 'AutoForwardEnabled' is set to 'True', this is not a finding. and In the Exchange Management Shell and enter the following command: Get-RemoteDomain If the value of 'RemoteDomain ' is not set to a ' .mil' and/or '.gov ' domain(s), this is a finding.
Non- Enterprise Mail Fix Text: Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'RemoteDomainName'> -AutoForwardEnabled $false Enterprise Mail Fix Text: New-RemoteDomain -Name <Descriptive Name> -DomainName <SMTP address space> Set-RemoteDomain -Identity <'RemoteDomainName'> -AutoForwardEnabled $true
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, TarpitInterval If the value of 'TarpitInterval' is not set to 00:00:05 or greater, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -TarpitInterval 00:00:05
Obtain the Email Domain Security Plan (EDSP) and locate the value for 'Receive Connectors”. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select name, MaxHopCount If the value of 'MaxHopCount' is set to 60 this is not a finding. If the value of 'MaxHopCount' is set to a value other than 60 and has signoff and risk acceptance in the EDSP, this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -MaxHopCount 60 If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
Open the Exchange Management Shell and enter the following command: Get-RecipientFilterConfig | Select Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-RecipientFilterConfig -Enabled $true
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity Review the naming for connectors. If the connectors are not clearly named for purpose and direction, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Name <'NewName'> -Identity <'SendConnector'>
Obtain the Email Domain Security Plan (EDSP) and locate the value for 'Transient Failure Retry Count'. Open the Exchange Management Shell and enter the following command: Get-TransportServer -Identity <'ServerUnderReview'> | Select Name, Identity, TransientFailureRetryCount If the value of 'TransientFailureRetryCount' is set to 10 or less, this is not a finding. If the value of 'TransientFailureRetryCount' is set to more than 10, and has signoff and risk acceptance in the EDSP, this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'ServerUnderReview'> -TransientFailureRetryCount 10 or other value as identified by the EDSP.
Obtain the Email Domain Security Plan (EDSP) and locate the global maximum message send size and if signoff with risk acceptance is documented for the receive connector to have a different value. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Identity, MaxMessageSize or Get-TransportConfig | Select Identity, MaxSendSize If 'MaxMessageSize' is set to a numeric value different from the global value, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of ‘MaxMessageSize' is not the same as the global value, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'SendConnector'> -MaxMessageSize <MaxSendSize> If an alternate value is desired from the global value MaxSendSize, obtain signoff with risk acceptance and document in the EDSP.
Obtain the Email Domain Security Plan (EDSP) and locate the value for 'SMTP Server Maximum Outbound Connections'. Open the Exchange Management Shell and enter the following command: Get-TransportServer -Identity <'ServerUnderReview'> | Select Name, Identity, MaxOutboundConnections If the value of 'MaxOutboundConnections' is set to 1000 this is not a finding. If the value of 'MaxOutboundConnections' is set to a value other than 1000 and has signoff and risk acceptance in the EDSP, this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'ServerUnderReview'> -MaxOutboundConnections 1000. If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, DomainSecureEnabled If the value of 'DomainSecureEnabled' is not set to 'True', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SendConnector <'InternalSendConnector'> -DomainSecureEnabled $true
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, TlsDomain If the value of 'TlsDomain' is not set to the value of the internal <'SMTP Domain'>, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'SendConnector'> -TlsDomain <'SMTP Domain'> <'SMTP Domain'> Note: 'SMTP Domain' is the internal SMTP domain within the organization.
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, SmartHosts Identify the Internet facing connectors. If the value of 'SmartHosts' does not return the Smart Host IP Address, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SendConnector <'SendConnector'> -SmartHosts <'IP Address of Smart Host'> -DNSRoutingEnabled $false
Open the Exchange Management Shell and enter the following command: Get-TransportServer -Identity <'ServerUnderReview'> | Select Name, Identity, ConnectivityLogEnabled If the value of 'ConnectivityLogEnabled' is not set to 'True', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'ServerUnderReview'> -ConnectivityLogEnabled $true
Open the Exchange Management Shell and enter the following command: Get-EventLogLevel If any Diagnostic “EventLevel” is not set to “Low” or “Lowest”, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-EventLogLevel -Identity <ServiceName\Name> -Level Lowest or Set-EventLogLevel -Identity <ServiceName\Name> -Level Low
Open the Exchange Management Shell and enter the following command: Get-ExchangeServer –status | Select Name, Identity, ErrorReportingEnabled If the value of 'ErrorReportingEnabled' is not set to 'False', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ExchangeServer -Identity <'ServerName'> -ErrorReportingEnabled $false
Obtain the Email Domain Security Plan (EDSP) and locate the authorized groups or users that should have access to the audit data. If any group or user has access to the audit data that is not documented in the EDSP, this is a finding.
Restrict any unauthorized groups or users from accessing the audit logs.
Obtain the Email Domain Security Plan (EDSP) and locate the authorized groups and users that have access to the Exchange application directories. Verify the access permissions on the directory match the access permissions listed in the EDSP. If any group or user has different access permissions, this is a finding. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V14.
Locate the Exchange application directory and Remove or modify the group or user access permissions. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V14.
Open the Exchange Management Shell and enter the following command: Get-OrganizationConfig If the value for CustomerFeedbackEnabled is not set to 'False', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-OrganizationConfig -CustomerFeedbackEnabled $false
Obtain the Email Domain Security Plan (EDSP) and locate the audit logs assigned partition. By default the logs are located on the application partition in '\Program Files\Microsoft\Exchange Server\V14\Logging\'. If the log files are not on a separate partition from the application, this is a finding.
Configure the audit log location to be on a partition drive separate from the application. Document the location in the EDSP.
Note: If a third-party application is performing monitoring functions, the reviewer should verify the application is monitoring correctly and mark the vulnerability NA. Open the Exchange Management Shell and enter the following command: perfmon In the left pane, expand and navigate Data Collector Sets >> User Defined. If no sets are defined or queues are not being monitored, this is a finding.
Open the Exchange Management Console In the left pane, navigate to and select Microsoft Exchange On-Premises <server.domain> --> Toolbox In the Right pane double click on Performance Monitor In the left pane, navigate to and select Performance Logs and Alerts --> Data Collector Sets --> User Defined Right click on User Defined and configure the system to use User Defined data collection for monitoring the queues.
Access the EDSP baseline section and determine the process and frequency for identifying software changes (*.exe, *.bat, *.com, *.cmd, and *.dll) on servers against a baseline. Examine artifacts identified as outputs of this process. If baseline comparisons are not done on the INFOCON-required schedule, this is a finding.
Implement a process to compare software against a baseline (*.exe, *.bat, *.com, *.cmd, and *.dll) on a frequency required by the prevailing INFOCON level. Document the process and output artifacts in the EDSP.
Access the EDSP and locate the baseline documentation. Review the application software baseline procedures and implementation artifacts. Note the list of files and directories included in the baseline procedure for completeness. If an email software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Implement email software baseline process. Document the details in the EDSP.
Obtain the Email Domain Security Plan (EDSP) and locate the 'Accepted Domain' values. Open the Exchange Management Shell and enter the following command: Get-AcceptedDomain If the value for 'AcceptedDomains' is not set to the value in the EDSP, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-AcceptedDomain -Identity <'ValueInEDSP'> -MakeDefault $true
To view system services open a windows power shell and enter the following command: Get-Service | Where-Object {$_.status -eq 'running'} The command returns a list of installed services and the status of that service. Required services will vary between organizations, and will vary depending on the role of the individual system. Organizations will develop their own list of services which will be documented and justified with the ISSO. The Site’s list will be provided for any security review. Services that are common to multiple systems can be addressed in one document. Exceptions for individual systems should be identified separately by system. If the site has not documented the services required for their system(s), this is a finding. If any undocumented or unnecessary services are running, then this is a finding.
Document the services required for the system to operate. Remove or disable any services that are not required.
Access Windows Explorer and identify the OS partition. Navigate to configured partitions, and access the ‘Program Files’ directory. Make note of the installation partition for Microsoft Exchange. If Microsoft Exchange resides on a partition other than that of the OS, and does not have other applications installed, this is not a finding. Note: In the case where additional applications are installed on the same partition as Microsoft Exchange, and each of those additional applications have been documented and had a risk assessment completed by the ISSO/ISSM, this is not a finding.
Install Exchange on a dedicated application partition separate than that of the OS.
Open the Exchange Management Shell and enter the following command: Get-ExchangeCertificate | Select CertificateDomains, issuer If the value of 'CertificateDomains' does not indicate it is issued by the DoD, this is a finding.
Remove the non-DoD certificate and import the correct DoD certificates.
Obtain the Email Domain Security Plan (EDSP) and locate the global maximum message send size. Open the Exchange Management Shell and enter the following command: Get-TransportConfig | Select Identity, MaxSendSize If the value of 'MaxSendSize' is set to 10MB, this is not a finding. If the value of 'MaxSendSize' is set to an alternate value, and has signoff and risk acceptance in the EDSP, this is not a finding. If the value of 'MaxSendSize' is set to “Unlimited”, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-TransportConfig -MaxSendSize 10MB If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
Open the Exchange Management Shell and enter the following command: Get-ExchangeServer | fl name, AdminDisplayVersion If the value of 'AdminDisplayVersion' does not return Version 14.2 (Build 247.5) or greater, this is a finding.
Update the system with the latest approved service pack or a supported release.
Open the Exchange Management Shell and enter the following command: Get-SenderIdConfig | Select Name, Identity, SpoofedDomainAction If the value of 'SpoofedDomainAction' is not set to 'Reject', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SenderIdConfig -SpoofedDomainAction Reject
Open the Exchange Management Shell and enter the following command: Get-ExecutionPolicy If the value of 'LocalMachine' does not return a value of 'RemoteSigned', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ExecutionPolicy RemoteSigned
Access the EDSP for the name and information for the Block List provider. Open the Exchange Management Shell and enter the following command: Get-IPBlockListProvider | Select Name Identity LookupDomain If the values for Name, GUID and LookupDomain are configured, this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-IPBlockListProvider -Name <Provider Name> [Additional optional parameters as required by the service provider] Document the configuration in the EDSP.
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, Banner If the value of 'Banner' is not set to '220 SMTP Server Ready', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -Banner '220 SMTP Server Ready'
Obtain the Email Domain Security Plan (EDSP) and locate the value for 'Maximum Domain Connections' and the server under review. Open the Exchange Management Shell and enter the following command: Get-TransportServer -Identity <'ServerUnderReview'> | Select Name, Identity, MaxPerDomainOutboundConnections If the value of 'MaxPerDomainOutboundConnections' is set to 20 this is not a finding. If the value of 'MaxPerDomainOutboundConnections' is set to a value other than 20 and has signoff and risk acceptance in the EDSP, this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-TransportServer -Identity <'ServerUnderReview'> -MaxPerDomainOutboundConnections 20 If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig | Select Name, Identity, Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ContentFilterConfig -Enabled $true
Obtain the Email Domain Security Plan (EDSP) and locate the list of undesirable attachment types that should be stripped. Open the Exchange Management Shell and enter the following command: Get-AttachmentFilterEntry If the values returned are different from the EDSP documented attachment types, this is a finding.
Open the Exchange Management Shell and enter the following command: Add-AttachmentFilterEntry -Name <'*.FileExtension'> -Type FileName
Open the Exchange Management Shell and enter the following command: Get-SenderReputationConfig | Select SrlBlockThreshold If the value of 'SrlBlockThreshold' is not set to '6', this is a finding. If the value of 'SrlBlockThreshold' is set to a value other than 6 and has signoff and risk acceptance in the EDSP, this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-SenderReputationConfig -SrlBlockThreshold 6. If an alternate value is desired, obtain signoff with risk acceptance and document in the EDSP.
Open the Exchange Management Shell and enter the following command: Get-SenderReputationConfig | Select Enabled If the value of 'Enabled' is not set to 'True', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SenderReputationConfig -Enabled $true
Open the Exchange Management Shell and enter the following command: Get-RecipientFilterConfig | Select RecipientValidationEnabled If the value of 'RecipientValidationEnabled' is not set to 'False', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-RecipientFilterConfig -RecipientValidationEnabled $False
Access the EDSP for the list of accepted domains for which this server accepts inbound email. Open the Exchange Management Shell and enter the following command: Get-SenderFilterConfig If the value for 'BlockedDomains' or 'BlockedDomainsAndSubdomains' does not reflect the list of accepted domains, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SenderFilterConfig -BlockedDomains <domain list> Or Set-SenderFilterConfig -BlockedDomainsAndSubdomains <domain list> Enter the list of accepted domains for this email system. Document the configuration in the EDSP.
Open the Exchange Management Shell and enter the following command: Get-ContentFilterConfig | Select QuarantineMailbox If no SMTP address is assigned to 'QuarantineMailbox', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-ContentFilterConfig -QuarantineMailbox <'SmtpAddressOfMailbox'>
This requirement is N/A for SIPR enclaves. This requirement is N/A if the organization subscribes to EEMSG or other similar DoD enterprise protections for email services. Open the Exchange Management Shell and enter the following command: Get-SenderFilterConfig | Select BlankSenderBlockingEnabled If the value of 'BlankSenderBlockingEnabled' is not set to 'True', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SenderFilterConfig -BlankSenderBlockingEnabled $true
This requirement is N/A for SIPR enclaves. This requirement is N/A if the organization subscribes to EEMSG or other similar DoD enterprise protections for email services. Open the Exchange Management Shell and enter the following command: Get-SenderFilterConfig | Select Action If the value of 'Action ' is not set to 'Reject', this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SenderFilterConfig -Action Reject
Obtain the Email Domain Security Plan (EDSP) and locate the 'Connection Timeout' value. Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, ConnectionInactivityTimeOut If the value of 'ConnectionInactivityTimeOut' is set to 00:10:00, this is not a finding. If 'ConnectionInactivityTimeOut' is set to other than 00:10:00, and has signoff and risk acceptance in the EDSP, this is not a finding.
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'ReceiveConnector'> -ConnectionInactivityTimeOut 00:10:00 or other value as identified by the EDSP.
Open the Exchange Management Shell and enter the following command: Get-SendConnector | Select Name, Identity, TlsAuthLevel If the value of 'TlsAuthLevel' is not set to 'DomainValidation, this is a finding.
Open the Exchange Management Shell and enter the following command: Set-SendConnector -Identity <'SendConnector'> -TlsAuthLevel DomainValidation