UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Microsoft Exchange 2010 Edge Transport Server Role


Overview

Date Finding Count (37)
2012-05-31 CAT I (High): 0 CAT II (Med): 28 CAT III (Low): 9
STIG Description
The Microsoft Exchange Server 2010 STIGs cover four of the five roles available with Microsoft Exchange Server 2010, plus core Exchange Server 2010 global requirements. The Email Services Policy STIG must also be reviewed for each site hosting email services. The core Exchange Server guidance must be reviewed on each server role prior to the role-specific guidance. Also, for the Client Access server, the IIS guidance must be reviewed prior to the OWA checks.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
Exch-ED-217 Medium Internal Send Connectors must be encrypted.
Exch-ED-216 Medium Internal Send Connectors must use Domain Security (Mutual Authentication TLS).
Exch-ED-213 Medium Send Connector message size must be controlled.
Exch-ED-239 Medium Sender Identification process must be enabled.
Exch-ED-238 Medium Session request from unauthorized senders must be rejected.
Exch-ED-219 Medium Connectivity logging must be enabled.
Exch-ED-236 Medium SPAM evaluation filter must be enabled.
Exch-ED-234 Medium Sender reputation must be configured.
Exch-ED-233 Medium Sender reputation must be enabled.
Exch-ED-232 Medium Accepted domains must be verified.
Exch-ED-231 Medium Blank sender field action type must be set.
Exch-ED-230 Medium Messages with a blank sender field must be filtered.
Exch-ED-222 Medium External/Internet bound automated response messages must be disabled.
Exch-ED-223 Medium Auto-forwarding email must be disabled.
Exch-ED-206 Medium Internal Receive Connectors must use Domain Security (Mutual Authentication TLS).
Exch-ED-207 Medium Internet Receive Connectors must offer TLS before using basic authentication.
Exch-ED-204 Medium Receive Connector must restrict relay access.
Exch-ED-205 Medium Internal Receive Connectors must be encrypted.
Exch-ED-229 Medium Filtered messages must be archived.
Exch-ED-200 Medium SMTP automated banner response must be set.
Exch-ED-201 Medium Receive Connector message size must be controlled.
Exch-ED-224 Medium Exchange must not send auto replies to remote domains.
Exch-ED-225 Medium Attachment filtering must remove undesirable attachments by file type.
Exch-ED-227 Medium Non-existent recipients must not be blocked.
Exch-ED-220 Medium Exchange must not send delivery reports to remote domains.
Exch-ED-221 Medium Exchange must not send non-delivery reports to remote domains.
Exch-ED-237 Medium Block list service provider must be identified.
Exch-ED-228 Medium Tarpitting interval must be set.
Exch-ED-211 Low Send Connectors must be clearly named.
Exch-ED-210 Low Receive Connectors must be clearly named.
Exch-ED-212 Low Send Connectors delivery retries must be controlled.
Exch-ED-215 Low Send connections per domain must be set.
Exch-ED-214 Low Send Connector connections count must be limited.
Exch-ED-202 Low Receive Connector connections count must be controlled.
Exch-ED-208 Low Receive Connectors must control the message count per inbound session.
Exch-ED-209 Low Receive Connectors must control the number of recipients 'chunked' on a single message.
Exch-ED-203 Low Receive Connector timeout must be limited.