UCF STIG Viewer Logo

Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide


Overview

Date Finding Count (68)
2024-01-10 CAT I (High): 3 CAT II (Med): 65 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-259642 High Exchange internal Send connectors must require encryption.
V-259640 High Exchange must provide redundancy.
V-259641 High Exchange internal Receive connectors must require encryption.
V-259599 Medium Exchange receive connector maximum hop count must be 60.
V-259598 Medium Exchange Outbound Connection limit per Domain Count must be controlled.
V-259622 Medium Exchange internal Receive connectors must not allow anonymous connections.
V-259629 Medium Exchange Sender Identification Framework must be enabled.
V-259591 Medium Exchange Send Fatal Errors to Microsoft must be disabled.
V-259590 Medium Exchange must not send customer experience reports to Microsoft.
V-259593 Medium Exchange internet-facing send connectors must specify a Smart Host.
V-259592 Medium Exchange queue database must reside on a dedicated partition.
V-259595 Medium Exchange internet-facing receive connectors must offer Transport Layer Security (TLS) before using basic authentication.
V-259594 Medium Exchange internal send connectors must use domain security (mutual authentication Transport Layer Security).
V-259597 Medium Exchange Outbound Connection Timeout must be 10 minutes or less.
V-259596 Medium More than one Edge server must be deployed.
V-259605 Medium Exchange receive connectors must control the number of recipients chunked on a single message.
V-259604 Medium Exchange receive connectors must be clearly named.
V-259607 Medium Exchange Message size restrictions must be controlled on receive connectors.
V-259606 Medium The Exchange internet receive connector connections count must be set to default.
V-259601 Medium Exchange send connector connections count must be limited.
V-259600 Medium Exchange receive connectors must control the number of recipients per message.
V-259603 Medium Exchange send connectors delivery retries must be controlled.
V-259602 Medium Exchange message size restrictions must be controlled on Send connectors.
V-259627 Medium Exchange must have anti-spam filtering enabled.
V-259626 Medium Exchange must have anti-spam filtering installed.
V-259625 Medium The Exchange Simple Mail Transfer Protocol (SMTP) Sender filter must be enabled.
V-259624 Medium The Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List Connection filter must be enabled.
V-259609 Medium Exchange messages with a blank sender field must be rejected.
V-259608 Medium Active hyperlinks in messages from non .mil domains must be rendered unclickable.
V-259621 Medium The Exchange tarpitting interval must be set.
V-259620 Medium The Exchange Recipient filter must be enabled.
V-259577 Medium SchUseStrongCrypto must be enabled.
V-259623 Medium Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List entries must be empty.
V-259618 Medium The Exchange Block List service provider must be identified.
V-259579 Medium Exchange must have accepted domains configured.
V-259578 Medium Exchange servers must use approved DOD certificates.
V-259580 Medium Exchange external Receive connectors must be domain secure-enabled.
V-259588 Medium Exchange audit data must be on separate partitions.
V-259589 Medium Exchange local machine policy must require signed scripts.
V-259617 Medium The Exchange Spam Evaluation filter must be enabled.
V-259586 Medium Exchange audit data must be protected against unauthorized access for modification.
V-259587 Medium Exchange audit data must be protected against unauthorized access for deletion.
V-259643 Medium Exchange must render hyperlinks from email sources from non-.mil domains as unclickable.
V-259585 Medium Exchange audit data must be protected against unauthorized access (read access).
V-259582 Medium Exchange connectivity logging must be enabled.
V-259639 Medium Exchange internal Send connectors must use an authentication level.
V-259614 Medium The Exchange Sender Reputation filter must be enabled.
V-259581 Medium The Exchange email diagnostic log level must be set to the lowest level.
V-259634 Medium The Exchange local machine policy must require signed scripts.
V-259635 Medium Exchange services must be documented, and unnecessary services must be removed or disabled.
V-259636 Medium The Exchange Edge server must point to a trusted list of DNS servers for external and internal resolution.
V-259637 Medium Exchange software must be installed on a separate partition from the OS.
V-259630 Medium Exchange must limit the Receive connector timeout.
V-259631 Medium Role-Based Access Control must be defined for privileged and nonprivileged users.
V-259632 Medium The Exchange application directory must be protected from unauthorized access.
V-259633 Medium The Exchange software baseline copy must exist.
V-259612 Medium The Exchange sender filter must block unaccepted domains.
V-259610 Medium Exchange messages with a blank sender field must be filtered.
V-259613 Medium Exchange nonexistent recipients must not be blocked.
V-259628 Medium Exchange must have anti-spam filtering configured.
V-259584 Medium Exchange queue monitoring must be configured with threshold and action.
V-259619 Medium Exchange messages with a malformed From address must be rejected.
V-259611 Medium Exchange filtered messages must be archived.
V-259644 Medium Exchange must have the most current, approved Cumulative Update (CU) installed.
V-259616 Medium Exchange Attachment filtering must remove undesirable attachments by file type.
V-259615 Medium The Exchange Sender Reputation filter must identify the spam block level.
V-259638 Medium The Exchange SMTP automated banner response must not reveal server details.
V-259583 Medium Exchange message tracking logging must be enabled.