MS Exchange 2013 Client Access Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-69781 Medium checkfix Exchange must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX13-CA-000005
- Vuln IDs
-
- V-69715
- Rule IDs
-
- SV-84337r1_rule
Checks: C-70157r2_chk
Open the Exchange Management Shell and enter the following command: Get-RpcClientAccess | Select Server, Name, EncryptionRequired If the value of EncryptionRequired is not set to True, this is a finding.
Fix: F-75919r1_fix
Open the Exchange Management Shell and enter the following command: Set-RpcClientAccess -Server <ServerName> -EncryptionRequired $true
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX13-CA-000010
- Vuln IDs
-
- V-69717
- Rule IDs
-
- SV-84339r1_rule
Checks: C-70159r1_chk
Open a Windows PowerShell and enter the following command: Import-module webadministration At the IIS: prompt, enter cd Sites At the Sites: prompt, enter cd “Default Web Site” At the “Default Web Site”: prompt, enter cd owa At the IIS:\Sites\Default Web Site\owa>: prompt, enter Get-WebConfigurationProperty -filter /system.webServer/security/access -name sslflags If the value returned is not Ssl,Ssl128, this is a finding.
Fix: F-75921r1_fix
Configure the OWA site to require SSL port 443.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- EX13-CA-000015
- Vuln IDs
-
- V-69719
- Rule IDs
-
- SV-84341r2_rule
Checks: C-70161r1_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select ServerName, Name, Identity, FormsAuthentication If the value of FormsAuthentication is not set to False, this is a finding.
Fix: F-75923r1_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity <'IdentityName'> -FormsAuthentication $false Note <IdentityName> must be in quotes. Example for the Identity Name: <ServerName>\owa (Default Web site) Restart the ISS service.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX13-CA-000020
- Vuln IDs
-
- V-69721
- Rule IDs
-
- SV-84343r1_rule
Checks: C-70163r1_chk
Open the Exchange Management Shell and enter the following command: Get-OwaVirtualDirectory | Select ServerName, Name,Identity,*Authentication If the value of WindowsAuthentication is not set to True, this is a finding.
Fix: F-75925r1_fix
Open the Exchange Management Shell and enter the following command: Set-OwaVirtualDirectory -Identity '<IdentityName>' -WindowsAuthentication $true Note: The <IdentityName> value must be in quotes. Example for the Identity Name: <ServerName>\owa (Default Web site)
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- EX13-CA-000025
- Vuln IDs
-
- V-69723
- Rule IDs
-
- SV-84345r1_rule
Checks: C-70165r1_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select Name, Identity, AdminAuditLogEnabled If the value of AdminAuditLogEnabled is not set to True, this is a finding.
Fix: F-75927r1_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogEnabled $true
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX13-CA-000030
- Vuln IDs
-
- V-69725
- Rule IDs
-
- SV-84347r1_rule
Checks: C-70167r1_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeCertificate | Select CertificateDomains, issuer If the value of CertificateDomains does not indicate it is issued by the DoD, this is a finding.
Fix: F-75929r1_fix
Remove the non-DoD certificate and import the correct DoD certificates.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX13-CA-000035
- Vuln IDs
-
- V-69727
- Rule IDs
-
- SV-84349r1_rule
Checks: C-70171r1_chk
Open the Exchange Management Shell and enter the following commands: Get-ActiveSyncVirtualDirectory | Select Name, Identity Get-ActiveSyncVirtualDirectory -Identity '<ServerName>Microsoft-Server-ActiveSync (Default Web Site)' | fl BasicAuthEnabled, WindowsAuthEnabled, ClientCertAuth, WebSiteSSLEnabled, InternalAuthenticationMethods, ExternalAuthenticationMethods Note: The <ServerName>Microsoft-Server-ActiveSync (Default Web Site) value must be in quotes. The command should return the following: BasicAuthEnabled : False WindowsAuthEnabled : False ClientCertAuth : Required WebSiteSSLEnabled : True InternalAuthenticationMethods : {Certificate} ExternalAuthenticationMethods : {Certificate} If the values above are not returned, this is a finding.
Fix: F-75933r1_fix
Open the Exchange Management Shell and enter the following command: Set-ActiveSyncVirtualDirectory -Identity ‘<ServerName>\Microsoft-Server-ActiveSync (Default Web Site)’ -BasicAuthEnabled $False -WindowsAuthEnabled $False -ClientCertAuth ‘Required’ -WebSites-InternalAuthenticationMethods ‘Certificate’ -ExternalAuthenticationMethods ‘Certificate’ Note: The <ServerName>Microsoft-Server-ActiveSync (Default Web Site) value must be in quotes.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- EX13-CA-000040
- Vuln IDs
-
- V-69729
- Rule IDs
-
- SV-84351r1_rule
Checks: C-70173r2_chk
Open a command window and enter the following commands: cd c:\Windows\SysWOW64\inetsrv Appcmd.exe list config "Default Web Site/Microsoft-Server-ActiveSync" -section:clientCertificateMappingAuthentication If clientCertificateMappingAuthentication Enabled is not set to True, this is a finding.
Fix: F-75935r1_fix
Open a command window and enter the following commands: cd C:\Windows\SysWOW64\InetSrv appcmd unlock config /section:clientCertificateMappingAuthentication appcmd set config "Default Web Site/Microsoft-Server-ActiveSync" -section:clientCertificateMappingAuthentication /enabled:true
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- EX13-CA-000045
- Vuln IDs
-
- V-69731
- Rule IDs
-
- SV-84353r1_rule
Checks: C-70175r1_chk
Open the Exchange Management Shell and enter the following command: Get-EventLogLevel If any Diagnostic EventLogLevel is not set to Lowest, this is a finding.
Fix: F-75937r1_fix
Open the Exchange Management Shell and enter the following command: Set-EventLogLevel -Identity <'IdentityName\EventlogName'> -Level Lowest Note: The <IdentityName\EventlogName> value must be in quotes.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- EX13-CA-000050
- Vuln IDs
-
- V-69733
- Rule IDs
-
- SV-84355r1_rule
Checks: C-70177r1_chk
Open the Exchange Management Shell and enter the following command: Get-AdminAuditLogConfig | Select Name, Identity, AdminAuditLogParameters If the value of AdminAuditLogParameters is not set to {*}, this is a finding. Note: The value of {*} indicates all parameters are being audited.
Fix: F-75939r1_fix
Open the Exchange Management Shell and enter the following command: Set-AdminAuditLogConfig -AdminAuditLogParameters *
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- EX13-CA-000055
- Vuln IDs
-
- V-69735
- Rule IDs
-
- SV-84357r1_rule
Checks: C-70179r1_chk
Note: If a third-party application is performing monitoring functions, the reviewer should verify the application is monitoring correctly and mark the vulnerability not applicable. Open the Exchange Management Shell and enter the following command: perfmon In the left pane, expand and navigate Performance >> Data Collector Sets >> User Defined. If no sets are defined or queues are not being monitored, this is a finding.
Fix: F-75941r1_fix
Open the Exchange Management Shell and enter the following command: perfmon In the left pane, navigate to and select Performance >> Data Collector Sets >> User Defined. Right-click, navigate to, and configure User Defined >> New >> Data Collector Set to use user-defined data collection for monitoring the queues.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX13-CA-000060
- Vuln IDs
-
- V-69737
- Rule IDs
-
- SV-84359r1_rule
Checks: C-70181r1_chk
Open the Exchange Management Shell and enter the following command: Get-ExchangeServer –status | Select Name, Identity, ErrorReportingEnabled For each Identity, if the value of ErrorReportingEnabled is not set to False, this is a finding.
Fix: F-75943r1_fix
Open the Exchange Management Shell and enter the following command: Set-ExchangeServer -Identity <IdentityName> -ErrorReportingEnabled $false Note: The <IdentityName> value must be in quotes. Repeat the procedure for each Identity.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- EX13-CA-000065
- Vuln IDs
-
- V-69739
- Rule IDs
-
- SV-84361r1_rule
Checks: C-70183r1_chk
Review the Email Domain Security Plan (EDSP). Determine the authorized groups or users that should have read access to the audit data. If any group or user has read access to the audit data that is not documented in the EDSP, this is a finding.
Fix: F-75945r1_fix
Update the EDSP. Navigate to the location of the audit data. Restrict any unauthorized groups' or users' read access to the audit logs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX13-CA-000070
- Vuln IDs
-
- V-69741
- Rule IDs
-
- SV-84363r1_rule
Checks: C-70185r1_chk
Open the Exchange Management Shell and enter the following command: Get-OrganizationConfig | Select Name, Identity, CustomerFeedbackEnabled If the value for CustomerFeedbackEnabled is not set to False, this is a finding.
Fix: F-75947r1_fix
Open the Exchange Management Shell and enter the following command: Set-OrganizationConfig -CustomerFeedbackEnabled $false
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- EX13-CA-000075
- Vuln IDs
-
- V-69743
- Rule IDs
-
- SV-84365r1_rule
Checks: C-70187r1_chk
Review the Email Domain Security Plan (EDSP). Determine the authorized groups or users that should have access to the audit data. If any group or user has modify privileges for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-75949r1_fix
Update the EDSP. Navigate to the location of the audit data. Restrict any unauthorized groups' or users' modify permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- EX13-CA-000080
- Vuln IDs
-
- V-69745
- Rule IDs
-
- SV-84367r1_rule
Checks: C-70189r1_chk
Review the Email Domain Security Plan (EDSP). Determine the authorized groups or users that should have delete permissions for the audit data. If any group or user has delete permissions for the audit data that is not documented in the EDSP, this is a finding.
Fix: F-75951r1_fix
Update the EDSP. Navigate to the location of the audit data. Restrict any unauthorized groups' or users' delete permissions for the audit logs.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- EX13-CA-000085
- Vuln IDs
-
- V-69747
- Rule IDs
-
- SV-84369r1_rule
Checks: C-70191r1_chk
Review the Email Domain Security Plan (EDSP). Determine the audit logs' assigned partition. Note: By default, the logs are located on the application partition in \Program Files\Microsoft\Exchange Server\V15\Logging. If the log files are not on a separate partition from the application, this is a finding.
Fix: F-75953r1_fix
Update the EDSP. Configure the audit log location to be on a partition drive separate from the application.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- EX13-CA-000090
- Vuln IDs
-
- V-69751
- Rule IDs
-
- SV-84373r1_rule
Checks: C-70195r1_chk
Open the Exchange Management Shell and enter the following command: Get-ExecutionPolicy If the value returned is not RemoteSigned, this is a finding.
Fix: F-75957r1_fix
Open the Exchange Management Shell and enter the following command: Set-ExecutionPolicy RemoteSigned
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX13-CA-000095
- Vuln IDs
-
- V-69753
- Rule IDs
-
- SV-84375r1_rule
Checks: C-70197r1_chk
Open the Windows PowerShell and enter the following command: Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangeIMAP4' | Select Start Note: The hklm:\system\currentcontrolset\services\MSExchangeIMAP4 value must be in quotes. If the value of Start is not set to 4, this is a finding.
Fix: F-75959r1_fix
Open the Windows PowerShell and enter the following command: services.msc Navigate to and double-click on Microsoft Exchange IMAP4 Backend. Click on the General tab. In the Startup Type: dropdown, select Disabled. Click the OK button.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EX13-CA-000100
- Vuln IDs
-
- V-69755
- Rule IDs
-
- SV-84377r1_rule
Checks: C-70199r1_chk
Open the Windows PowerShell and enter the following command: Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangePOP3' | Select Start Note: The hklm:\system\currentcontrolset\services\MSExchangePOP3 value must be in quotes. If the value of Start is not set to 4, this is a finding.
Fix: F-75961r1_fix
Open the Windows PowerShell and enter the following command: services.msc Navigate to and double-click on Microsoft Exchange POP3 Backend. Click on the General tab. In the Startup Type: dropdown, select Disabled. Click the OK button.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EX13-CA-000105
- Vuln IDs
-
- V-69757
- Rule IDs
-
- SV-84379r1_rule
Checks: C-70201r1_chk
Review the Email Domain Security Plan (EDSP). Determine if public folders are being used. Open the Exchange Management Shell and enter the following command: Get-PublicFolder | Select Name, Identity Note: The value returns a root directory and subdirectories. If public folders are not in use and directories exist or are being used and are not documented in the EDSP, this is a finding.
Fix: F-75963r1_fix
Open the Exchange Management Shell and enter the following command: Remove-PublicFolder -Identity 'IdentityName' -Recurse:$True Note: This command deletes the public folder Directory Folder and all its child public folders.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EX13-CA-000110
- Vuln IDs
-
- V-69759
- Rule IDs
-
- SV-84381r1_rule
Checks: C-70205r1_chk
Open the Exchange Management Shell and enter the following command: Get-ActiveSyncVirtualDirectory | Select Server, Name, Identity, Path If the value of Path (the actual directory path) exists, this is a finding.
Fix: F-75967r1_fix
Open an Exchange Command Shell and enter the following command: Remove-ActiveSyncVirtualDirectory <ServerName>\Microsoft-Server-ActiveSync -Confirm $true Note: The physical directory must also be deleted.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- EX13-CA-000115
- Vuln IDs
-
- V-69761
- Rule IDs
-
- SV-84383r1_rule
Checks: C-70209r1_chk
Review the Email Domain Security Plan (EDSP). Determine the authorized groups and users that have access to the Exchange application directories. Verify the access permissions on the directory match the access permissions listed in the EDSP. If any group or user has different access permissions than those listed in the EDSP, this is a finding. Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.
Fix: F-75971r1_fix
Update the EDSP. Remove or modify the group or user access permissions.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- EX13-CA-000120
- Vuln IDs
-
- V-69763
- Rule IDs
-
- SV-84385r1_rule
Checks: C-70213r1_chk
Review the Email Domain Security Plan (EDSP). Review the application software baseline procedures and implementation artifacts. Note the list of files and directories included in the baseline procedure for completeness. If an email software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Fix: F-75975r1_fix
Update the EDSP. Implement the email software baseline process.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- EX13-CA-000125
- Vuln IDs
-
- V-69765
- Rule IDs
-
- SV-84387r1_rule
Checks: C-70215r1_chk
Review the Email Domain Security Plan (EDSP). Determine whether the site monitors system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on servers for unauthorized changes against a baseline on a weekly basis. If software files are not monitored for unauthorized changes on a weekly basis, this is a finding. Note: A properly configured HBSS Policy Auditor File Integrity Monitor (FIM) module will meet the requirement for file integrity checking. The Asset module within HBSS does not meet this requirement.
Fix: F-75977r1_fix
Update the EDSP. Monitor the software files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on Exchange servers for unauthorized changes against a baseline on a weekly basis. Use an approved DoD monitoring tool.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- EX13-CA-000130
- Vuln IDs
-
- V-69767
- Rule IDs
-
- SV-84389r1_rule
Checks: C-70217r1_chk
Review the Email Domain Security Plan (EDSP). Note: Required services will vary between organizations and will vary depending on the role of the individual system. Organizations will develop their own list of services, which will be documented and justified with the ISSO. The site’s list will be provided for any security review. Services that are common to multiple systems can be addressed in one document. Exceptions for individual systems should be identified separately by system. Open a Windows PowerShell and enter the following command: Get-Service | Where-Object {$_.status -eq 'running'} The command returns a list of installed services and the status of that service. If the site has not documented the services required for its system(s), this is a finding. If any undocumented or unnecessary services are running, this is a finding.
Fix: F-75979r1_fix
Update the EDSP with the services required for the system to function. Remove or disable any services that are not required.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- EX13-CA-000135
- Vuln IDs
-
- V-69769
- Rule IDs
-
- SV-84391r1_rule
Checks: C-70219r1_chk
Open the Exchange Management Shell and enter the following command: Get-OutlookAnywhere | Select Name, Identity, InternalClientAuthenticationMethod, ExternalClientAuthenticationMethod If the value of InternalClientAuthenticationMethod and the value of ExternalClientAuthenticationMethod is not set to NTLM, this is a finding.
Fix: F-75981r1_fix
Open the Exchange Management Shell and enter the following commands: For InternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -InternalClientAuthenticationMethod NTLM For ExternalClientAuthenticationMethod: Set-OutlookAnywhere -Identity '<IdentityName'> -ExternalClientAuthenticationMethod NTLM
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- EX13-CA-000140
- Vuln IDs
-
- V-69771
- Rule IDs
-
- SV-84393r1_rule
Checks: C-70221r1_chk
Review the Email Domain Security Plan (EDSP). Determine where the directory Exchange is installed. Open Windows Explorer. Navigate to the directory or partition where Exchange is installed. If Exchange resides on a directory or partition other than that of the OS and does not have other applications installed (unless approved by the ISSO), this is not a finding.
Fix: F-75983r1_fix
Update the EDSP. Install Exchange on a dedicated application directory or partition separate than that of the OS.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- EX13-CA-000145
- Vuln IDs
-
- V-69773
- Rule IDs
-
- SV-84395r1_rule
Checks: C-70223r1_chk
Review the Email Domain Security Plan (EDSP). Determine if the Exchange Servers are using redundancy. Get-ClientAccessServer | Select Name, Site If the value returned is not at least two CAS servers, this is a finding.
Fix: F-75985r1_fix
Update the EDSP. Configure two or more CAS servers for load balancing.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- EX13-CA-000150
- Vuln IDs
-
- V-69775
- Rule IDs
-
- SV-84397r1_rule
Checks: C-70225r1_chk
Open the Exchange Management Shell and enter the following command: Get-OWAVirtualDirectory | Select Name, Identity, ExternalUrl, InternalUrl If the value returned is not both ExternalUrl and InternalUrl and these are not set to https://, this is a finding.
Fix: F-75987r1_fix
Open the Exchange Management Shell and enter the following command: Set-OWAVirtualDirectory -Identity '<IdentityName>\owa (Default Web Site)' -ExternalUrl 'https://URL' -InternalUrl 'https://URL' Note: The <IdentityName>\owa (default web site) value must be in quotes.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- EX13-CA-000155
- Vuln IDs
-
- V-69777
- Rule IDs
-
- SV-84399r1_rule
Checks: C-70227r1_chk
Open the Exchange Management Shell and enter the following command: Get-OWAVirtualDirectory | Select Name, Identity, SmimeEnabled If the value returned is not set to True, this is a finding.
Fix: F-75989r1_fix
Open the Exchange Management Shell and enter the following command: Set-OWAVirtualDirectory -Identity '<IdentityName>\owa (Default Web Site)' -SmimeEnabled $true Note: The <ServerName>\owa (Default Web Site) value must be in quotes.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- EX13-CA-000160
- Vuln IDs
-
- V-69779
- Rule IDs
-
- SV-84401r1_rule
Checks: C-70229r1_chk
Determine the most current, approved service pack. Open the Exchange Management Shell and enter the following command: Get-ExchangeServer | fl Name, AdminDisplayVersion If the value of AdminDisplayVersion does not return the most current, approved service pack, this is a finding.
Fix: F-75991r1_fix
Install the most current, approved service pack.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- EX13-CA-000165
- Vuln IDs
-
- V-69781
- Rule IDs
-
- SV-84403r2_rule
Checks: C-70233r2_chk
Open a Windows PowerShell Module and enter the following commands: Get-Website | Select Name Get-WebBinding -Name <'WebSiteName'> | Format-List If the Web binding values returned are not on standard port 80 and 81 for HTTP connections or port 443 and 444 for HTTPS connections, this is a finding. Repeat the process for each website.
Fix: F-75993r2_fix
Configure web ports to be 80, 81 and 443, 444, as specified by PPSM standards.