UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

An Exchange software baseline copy must exist.


Overview

Finding ID Version Rule ID IA Controls Severity
V-228401 EX16-MB-000580 SV-228401r508018_rule Medium
Description
Exchange software, as with other application software installed on a host system, must be included in a system baseline record and periodically reviewed; otherwise, unauthorized changes to the software may not be discovered. This effort is a vital step to securing the host and the applications, as it is the only method that may provide the ability to detect and recover from otherwise undetected changes, such as those that result from worm or bot intrusions. The Exchange software and configuration baseline is created and maintained for comparison during scanning efforts. Operational procedures must include baseline updates as part of configuration management tasks that change the software and configuration.
STIG Date
Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide 2020-10-01

Details

Check Text ( C-30634r496999_chk )
Review the Email Domain Security Plan (EDSP) or document that contains this information.

Determine the software baseline.

Review the application software baseline procedures and implementation artifacts.

Note the list of files and directories included in the baseline procedure for completeness.

If an email software copy exists to serve as a baseline and is available for comparison during scanning efforts, this is not a finding.
Fix Text (F-30619r497000_fix)
Update the EDSP to specify the software baseline, procedures, and implementation artifacts or verify that this information is documented by the organization.