UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Exchange must strip hyperlink email sources from non-.mil domains.


Overview

Finding ID Version Rule ID IA Controls Severity
V-80587 EX16-ED-000570 SV-95297r2_rule High
Description
Active hyperlinks within an email are susceptible to attacks of malicious software or malware. The hyperlink could lead to a malware infection or redirect the website to another fraudulent website without the user's consent or knowledge. Exchange does not have a built-in message filtering capability. DoD Enterprise Email (DEE) has created a custom resolution to filter messages from non-.mil users that have hyperlinks in the message body. The hyperlink within the messages will be modified, preventing end users from automatically clicking links.
STIG Date
Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide 2019-03-12

Details

Check Text ( C-80319r2_chk )
Note: If using another DoD-approved antispam product for email or a DoD-approved Email Gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable.

Review the Email Domain Security Plan (EDSP).

Determine the name of the Transport Agent.

Open the Windows PowerShell console and enter the following command:

Get-TransportAgent -Name 'customAgent' | FL

If the value does not return "customAgent", this is a finding.

Note: "customAgent" is the name of the custom agent developed to strip hyperlink email sources from non .mil domains and must be in single quot
Fix Text (F-87439r1_fix)
Update the EDSP to reflect the name of the Transport Agent.

Contact the DISA Enterprise Email Service Desk at disa.tinker.eis.mbx.dod-enterprise-services-service-desk@mail.mil and request the Agent and installation procedures.

or

Contact DEE Engineering PMO and request the Agent and installation procedures.