UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Non-existent recipients must not be blocked.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33640 Exch-2-305 SV-44060r1_rule ECSC-1 Medium
Description
SPAM originators, in an effort to refine mailing lists, sometimes use a technique where they first create fictitious names, and then monitor rejected emails for non-existent recipients. Those not rejected, of course, are deemed to exist, and are therefore used in future SPAM mailings. To prevent this disclosure of existing email accounts to Spammers, this feature should not be employed. Instead, it is recommended that all messages be received, then evaluated and disposed of without enabling the sender to determine recipients that are existing vs. non-existing.
STIG Date
MS Exchange 2010 Edge Transport Server STIG 2018-09-17

Details

Check Text ( C-41750r2_chk )
Open the Exchange Management Shell and enter the following command:

Get-RecipientFilterConfig | Select RecipientValidationEnabled

If the value of 'RecipientValidationEnabled' is not set to 'False', this is a finding.
Fix Text (F-37533r1_fix)
Open the Exchange Management Shell and enter the following command:

Set-RecipientFilterConfig -RecipientValidationEnabled $False