UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Email application must not share a partition with another application.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33625 Exch-3-807 SV-44045r1_rule ECSC-1 Medium
Description
In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subsequent exploit to one application can lead to an exploit of other applications sharing the same security context. For example, an exploit to a web server process that leads to unauthorized administrative access to the host system can most likely lead to a compromise of all applications hosted by the same system. Email services should be installed on a partition that does not host other applications. Email services should never be installed on a Domain Controller / Directory Services server.
STIG Date
Exchange 2010 Client Access Server STIG 2013-01-03

Details

Check Text ( C-41732r1_chk )
Access Windows Explorer and identify the OS partition. Navigate to configured partitions, and access the ‘Program Files’ directory.

Note the installation partition for Microsoft Exchange.

If Exchange resides on a partition other than that of the OS, and does not have other applications installed (without associated approval from the IAO), this is not a finding.
Fix Text (F-37517r1_fix)
Install Exchange on a dedicated application partition separate than that of the OS.