Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-33616 | Exch-2-831 | SV-44036r1_rule | ECSC-1 | Medium |
Description |
---|
Log files help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adjustments to improve availability. This setting enables an automated entry to be sent to Microsoft giving general details about how the product is used. Microsoft, in turn, uses this information to improve the robustness of their product. While this type of information does not ordinarily contain sensitive information, it may alert eavesdroppers to the existence of the environment and its configurations. It could alert them to (possibly) advantageous timing or weaknesses toward which to mount an attack. |
STIG | Date |
---|---|
Exchange 2010 Client Access Server STIG | 2015-12-02 |
Check Text ( C-41723r2_chk ) |
---|
Open the Exchange Management Shell and enter the following command: Get-OrganizationConfig If the value for CustomerFeedbackEnabled is not set to 'False', this is a finding. |
Fix Text (F-37508r1_fix) |
---|
Open the Exchange Management Shell and enter the following command: Set-OrganizationConfig -CustomerFeedbackEnabled $false |