UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide


Overview

Date Finding Count (68)
2024-06-10 CAT I (High): 3 CAT II (Med): 65 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-259642 High Exchange internal Send connectors must require encryption.
V-259640 High Exchange must provide redundancy.
V-259641 High Exchange internal Receive connectors must require encryption.
V-259599 Medium Exchange receive connector maximum hop count must be 60.
V-259598 Medium Exchange Outbound Connection limit per Domain Count must be controlled.
V-259622 Medium Exchange internal Receive connectors must not allow anonymous connections.
V-259629 Medium Exchange Sender Identification Framework must be enabled.
V-259591 Medium Exchange Send Fatal Errors to Microsoft must be disabled.
V-259590 Medium Exchange must not send customer experience reports to Microsoft.
V-259593 Medium Exchange internet-facing send connectors must specify a Smart Host.
V-259592 Medium Exchange queue database must reside on a dedicated partition.
V-259595 Medium Exchange internet-facing receive connectors must offer Transport Layer Security (TLS) before using basic authentication.
V-259594 Medium Exchange internal send connectors must use domain security (mutual authentication Transport Layer Security).
V-259597 Medium Exchange Outbound Connection Timeout must be 10 minutes or less.
V-259596 Medium More than one Edge server must be deployed.
V-259605 Medium Exchange receive connectors must control the number of recipients chunked on a single message.
V-259604 Medium Exchange receive connectors must be clearly named.
V-259607 Medium Exchange Message size restrictions must be controlled on receive connectors.
V-259606 Medium The Exchange internet receive connector connections count must be set to default.
V-259601 Medium Exchange send connector connections count must be limited.
V-259600 Medium Exchange receive connectors must control the number of recipients per message.
V-259603 Medium Exchange send connectors delivery retries must be controlled.
V-259602 Medium Exchange message size restrictions must be controlled on Send connectors.
V-259627 Medium Exchange must have anti-spam filtering enabled.
V-259626 Medium Exchange must have anti-spam filtering installed.
V-259625 Medium The Exchange Simple Mail Transfer Protocol (SMTP) Sender filter must be enabled.
V-259624 Medium The Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List Connection filter must be enabled.
V-259609 Medium Exchange messages with a blank sender field must be rejected.
V-259608 Medium Active hyperlinks in messages from non .mil domains must be rendered unclickable.
V-259621 Medium The Exchange tarpitting interval must be set.
V-259620 Medium The Exchange Recipient filter must be enabled.
V-259577 Medium SchUseStrongCrypto must be enabled.
V-259623 Medium Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List entries must be empty.
V-259618 Medium The Exchange Block List service provider must be identified.
V-259579 Medium Exchange must have accepted domains configured.
V-259578 Medium Exchange servers must use approved DOD certificates.
V-259580 Medium Exchange external Receive connectors must be domain secure-enabled.
V-259588 Medium Exchange audit data must be on separate partitions.
V-259589 Medium Exchange local machine policy must require signed scripts.
V-259617 Medium The Exchange Spam Evaluation filter must be enabled.
V-259586 Medium Exchange audit data must be protected against unauthorized access for modification.
V-259587 Medium Exchange audit data must be protected against unauthorized access for deletion.
V-259643 Medium Exchange must render hyperlinks from email sources from non-.mil domains as unclickable.
V-259585 Medium Exchange audit data must be protected against unauthorized access (read access).
V-259582 Medium Exchange connectivity logging must be enabled.
V-259639 Medium Exchange internal Send connectors must use an authentication level.
V-259614 Medium The Exchange Sender Reputation filter must be enabled.
V-259581 Medium The Exchange email diagnostic log level must be set to the lowest level.
V-259634 Medium The Exchange local machine policy must require signed scripts.
V-259635 Medium Exchange services must be documented, and unnecessary services must be removed or disabled.
V-259636 Medium The Exchange Edge server must point to a trusted list of DNS servers for external and internal resolution.
V-259637 Medium Exchange software must be installed on a separate partition from the OS.
V-259630 Medium Exchange must limit the Receive connector timeout.
V-259631 Medium Role-Based Access Control must be defined for privileged and nonprivileged users.
V-259632 Medium The Exchange application directory must be protected from unauthorized access.
V-259633 Medium The Exchange software baseline copy must exist.
V-259612 Medium The Exchange sender filter must block unaccepted domains.
V-259610 Medium Exchange messages with a blank sender field must be filtered.
V-259613 Medium Exchange nonexistent recipients must not be blocked.
V-259628 Medium Exchange must have anti-spam filtering configured.
V-259584 Medium Exchange queue monitoring must be configured with threshold and action.
V-259619 Medium Exchange messages with a malformed From address must be rejected.
V-259611 Medium Exchange filtered messages must be archived.
V-259644 Medium Exchange must have the most current, approved Cumulative Update (CU) installed.
V-259616 Medium Exchange Attachment filtering must remove undesirable attachments by file type.
V-259615 Medium The Exchange Sender Reputation filter must identify the spam block level.
V-259638 Medium The Exchange SMTP automated banner response must not reveal server details.
V-259583 Medium Exchange message tracking logging must be enabled.