UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Exchange must have administrator audit logging enabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-259648 EX19-MB-000016 SV-259648r960780_rule Medium
Description
Unauthorized or malicious data changes can compromise the integrity and usefulness of the data. Automated attacks or malicious users with elevated privileges have the ability to effect change using the same mechanisms as email administrators. Auditing any changes to access mechanisms not only supports accountability and nonrepudiation for those authorized to define the environment but also enables investigation of changes made by others who may not be authorized. Note: This administrator auditing feature audits all exchange changes regardless of the user's assigned role or permissions.
STIG Date
Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-63387r942256_chk )
Open the Exchange Management Shell and enter the following command:

Get-AdminAuditLogConfig | Select-Object -Property Name, AdminAuditLogEnabled

If the value of "AdminAuditLogEnabled" is not set to "True", this is a finding.
Fix Text (F-63295r942257_fix)
Open the Exchange Management Shell and enter the following command:

Set-AdminAuditLogConfig -AdminAuditLogEnabled $true