UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Exchange antimalware agent must be enabled and configured.


Overview

Finding ID Version Rule ID IA Controls Severity
V-259694 EX19-MB-000146 SV-259694r986143_rule Medium
Description
Microsoft Exchange 2019 offers built-in antimalware protection for messages going through the transport pipeline. When enabled, the default settings are configured to automatically update.
STIG Date
Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-63433r942394_chk )
Open the Exchange Management Shell and run the following cmdlets:

Get-TransportAgent "Malware Agent"

If the identity "Malware Agent" is not set to "Enabled", this is a finding.
Fix Text (F-63341r942395_fix)
Open the Exchange Management Shell and run the following command:

& $env:ExchangeInstallPath\Scripts\Enable-AntimalwareScanning.ps1

This will automatically enable the anti-malware agent. After the script completes, run the following cmdlet to complete the process:

Restart-Service MSExchangeTransport

This may take up to 10 minutes to take effect.