Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-33641 | Exch-2-317 | SV-44061r1_rule | ECSC-1 | Medium |
Description |
---|
SPAM origination sites and other sources of suspected Email-borne malware have the ability to corrupt, compromise, or otherwise limit availability of Email servers. Limiting exposure to unfiltered inbound messages can reduce the risk of SPAM and malware impacts. The Global Deny list block messages originating from specific sources. Most Black List filtering is done using a commercial 'Block List' service, because eliminating threats from known SPAMMERS prevents the messages being evaluated inside the enclave where there is more risk they can do harm. Additional sources should also be blocked to supplement the contents of the commercial 'Block List Service'. For example, during a 0-Day threat action, entries can be added, and then removed when the threat is mitigated. An additional best practice is to enter the enterprise’s home domains in the Deny List, because inbound Email with a ‘from’ address of the home domain is very likely to be SPOOFED SPAM. |
STIG | Date |
---|---|
MS Exchange 2010 Edge Transport Server STIG | 2019-03-21 |
Check Text ( C-41751r1_chk ) |
---|
Access the EDSP for the list of accepted domains for which this server accepts inbound email. Open the Exchange Management Shell and enter the following command: Get-SenderFilterConfig If the value for 'BlockedDomains' or 'BlockedDomainsAndSubdomains' does not reflect the list of accepted domains, this is a finding. |
Fix Text (F-37534r1_fix) |
---|
Open the Exchange Management Shell and enter the following command: Set-SenderFilterConfig -BlockedDomains Or Set-SenderFilterConfig -BlockedDomainsAndSubdomains Enter the list of accepted domains for this email system. Document the configuration in the EDSP. |