Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-69789 | EX13-EG-000020 | SV-84411r1_rule | Medium |
Description |
---|
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure Automatic Forwards to remote domains are disabled, except for enterprise email that must be restricted to forward-only to .mil and .gov. domains. Before enabling this setting, first configure a remote domain. |
STIG | Date |
---|---|
MS Exchange 2013 Edge Transport Server Security Technical Implementation Guide | 2017-01-04 |
Check Text ( C-70241r1_chk ) |
---|
Non-Enterprise Mail Check Content: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, DomainName, Identity, AutoForwardEnabled If the value of AutoForwardEnabled is not set to False, this is a finding. Enterprise Mail Check Content: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, DomainName, Identity, AutoForwardEnabled If the value of DomainName is not set to a .mil and/or .gov domain(s) and the value of AutoForwardEnabled is not set to True, this is a finding. |
Fix Text (F-76001r1_fix) |
---|
For Non-Enterprise Mail Fix Text: Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'IdentityName'> -AutoForwardEnabled $false Note: The For Enterprise Mail Fix Text, enter the following commands: New-RemoteDomain -Name Note: NewDomainName must be either a .mil or .gov domain. Set-RemoteDomain -Identity <'IdentityName'> -AutoForwardEnabled $true |