UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Circular Logging must be disabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33612 Exch-1-802 SV-44032r2_rule ECSC-1 Low
Description
Logging provides a history of events performed, and can also provide evidence of tampering or attack. Failure to create and preserve logs adds to the risk that suspicious events may go unnoticed, or the raise the potential that insufficient history will be available to investigate them. This setting controls how log files are written. If circular logging is enabled, there is one log file stored with a default size of 1024 KB. Once the size limit has been reached, additional log entries overwrite the oldest log entries. If circular logging is disabled, once a log file reaches the size limit, a new log file is created. Mailbox should not use circular logging. Logs should be written to a partition separate from the operating system, with log protection and backups being incorporated into the overall System Security plan.
STIG Date
Exchange 2010 Mailbox Server STIG 2015-03-10

Details

Check Text ( C-41719r1_chk )
Open the Exchange Management Shell and enter the following command:

Get-MailboxDatabase -Server <'ServerUnderReview'>| Select Name, Identity, CircularLoggingEnabled

If the value of 'CircularLoggingEnabled' is not set to 'False', this is a finding.
Fix Text (F-37504r1_fix)
Open the Exchange Management Shell and enter the following command:

Set-MailboxDatabase -Identity <'MailboxDatabase'> -CircularLoggingEnabled $false