UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Email forwarding must be restricted.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33605 Exch-1-321 SV-44025r1_rule ECSC-1 Medium
Description
Auto-forwarded email accounts do not meet the requirement for digital signature and encryption of CUI and PII IAW DoDI 8520.2 (reference ee) and DoD Director for Administration and Management memorandum, 'Safeguarding Against and Responding to the Breach of Personally Identifiable Information. Use of forwarding set by an administrator interferes with non-repudiation requirements that each end user be responsible for creation and destination of email data.
STIG Date
Exchange 2010 Mailbox Server STIG 2013-01-03

Details

Check Text ( C-41712r1_chk )
Access Active Directory for email enabled user accounts. Identify the 'Forward To' property.

Obtain the Email Domain Security Plan (EDSP) and locate any accounts that have been authorized to have email auto-forwarded.

Open the Exchange Management Shell and enter the following command:

Get-Mailbox -Filter {ForwardingSMTPAddress -ne $null}

If any user has a forwarding SMTP address and is not documented in the EDSP, this is a finding.
Fix Text (F-37497r1_fix)
Open the Exchange Management Shell and enter the following command:

Set-Mailbox -Identity <'UserWithForwardedAddress'> -ForwardingSMTPAdddress $null