Exchange software must be monitored for unauthorized changes.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-228402EX16-MB-000590SV-228402r928977_ruleCCI-001814medium
Description
Monitoring software files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system.
STIGDate
Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide2023-12-18

Details

Check Text (C-228402r928977_chk)

Review the Email Domain Security Plan (EDSP). Determine whether the site monitors system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on servers for unauthorized changes against a baseline on a weekly basis. If software files are not monitored for unauthorized changes, this is a finding.

Fix Text (F-30620r497003_fix)

Update the EDSP to specify that the organization monitors system files on servers for unauthorized changes against a baseline on a weekly basis or verify that this information is documented by the organization. Monitor the software files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on Exchange servers for unauthorized changes against a baseline on a weekly basis. Note: This can be done with the use of various monitoring tools.