Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-80749 | EX16-MB-000650 | SV-95459r1_rule | Medium |
Description |
---|
Automated connection responses occur as a result of FTP or Telnet connections when connecting to those services. They report a successful connection by greeting the connecting client and stating the name, release level, and (often) additional information regarding the responding product. While useful to the connecting client, connection responses can also be used by a third party to determine operating system or product release levels on the target server. The result can include disclosure of configuration information to third parties, paving the way for possible future attacks. For example, when querying the SMTP service on port 25, the default response looks similar to this one: 220 exchange.mydomain.org Microsoft ESMTP MAIL Service, Version: 6.0.3790.211 ready at Wed, 2 Feb 2005 23:40:00 -0500 Changing the response to hide local configuration details reduces the attack profile of the target. |
STIG | Date |
---|---|
Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide | 2018-08-28 |
Check Text ( C-80483r1_chk ) |
---|
Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, Banner For each Receive connector, if the value of "Banner" is not set to "220 SMTP Server Ready", this is a finding. |
Fix Text (F-87603r1_fix) |
---|
Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -Banner '220 SMTP Server Ready' Note: The Repeat the procedures for each Receive connector. |