UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Exchange software must be installed on a separate partition from the OS.


Overview

Finding ID Version Rule ID IA Controls Severity
V-259637 EX19-ED-000230 SV-259637r942225_rule Medium
Description
In the same way that added security layers can provide a cumulative positive effect on security posture, multiple applications can provide a cumulative negative effect. A vulnerability and subsequent exploit to one application can lead to an exploit of other applications sharing the same security context. For example, an exploit to a web server process that leads to unauthorized administrative access to the host system can most likely lead to a compromise of all applications hosted by the same system. Email services should be installed on a partition that does not host other applications. Email services should never be installed on a Domain Controller/Directory Services server.
STIG Date
Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide 2024-01-10

Details

Check Text ( C-63376r942223_chk )
Review the Email Domain Security Plan (EDSP).

Determine the directory where Exchange is installed.

Open Windows Explorer.

Navigate to the location where Exchange is installed.

If Exchange resides on a directory or partition other than that of the OS and does not have other applications installed (without associated approval from the ISSO), this is not a finding.
Fix Text (F-63284r942224_fix)
Update the EDSP to reflect the directory where Exchange is installed.

Install Exchange on a dedicated application directory or partition separate than that of the OS.