UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

An IIS Server configured to be a SMTP relay must require authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-102893 IISW-SV-000161 SV-111855r1_rule Medium
Description
Anonymous SMTP relays are strictly prohibited. An anonymous SMTP relay can be a vector for many types of malicious activity not limited to server exploitation for the sending of SPAM mail, access to emails, phishing, DoS attacks, etc. Enabling TLS, authentication, and strictly assigning IP addresses that can communicate with the relay greatly reduce the risk of the implementation.
STIG Date
IIS 8.5 Server Security Technical Implementation Guide 2020-06-05

Details

Check Text ( C-101639r2_chk )
Interview the System Administrator about the role of the IIS 8.5 web server.

If the IIS 8.5 web server is running SMTP relay services, have the SA provide supporting documentation on how the server is hardened. A DoD-issued certificate, and specific allowed IP address should be configured.

If the IIS 8.5 web server is not running SMTP relay services, this is Not Applicable.

If the IIS web server running SMTP relay services without TLS enabled, this is a finding.

If the IIS web server running SMTP relay services is not configured to only allow a specific IP address, from the same network as the relay, this is a finding.
Fix Text (F-108433r2_fix)
Configure the relay server with a specific allowed IP address, from the same network as the relay, and implement TLS.