UCF STIG Viewer Logo

Mailbox databases must reside on a dedicated partition.


Overview

Finding ID Version Rule ID IA Controls Severity
EXCH-MB-414 EXCH-MB-414 EXCH-MB-414_rule Medium
Description
In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subsequent exploit to one application can lead to an exploit of other applications sharing the same security context. For example, an exploit to a web server process that leads to unauthorized administrative access to the host system can most likely lead to a compromise of all applications hosted by the same system. Email services should be installed to a discrete set of directories, on a partition that does not host other applications. Email services should never be installed on a Domain Controller / Directory Services server.
STIG Date
Microsoft Exchange 2010 Mailbox Server Role 2012-05-31

Details

Check Text ( C-_chk )
Obtain the Email Domain Security Plan (EDSP) and locate the assigned directory for the mailbox server under review.

Open the Exchange Management Shell and enter the following command to determine the drives the mailbox databases are located.

Get-MailboxDatabase | Select <'ServerUnderReview'>, Name, Identity, Path

Open Windows Explorer and use the file and folder properties function to verify the mailbox databases are on a dedicated partition. If not, this is a finding.
Fix Text (F-_fix)
Configure the system to meet the separate partition requirement.