DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r3

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r3

Updated: 4/12/2023

Authority: Operating Systems and Applications

Plugin: Windows

Revision: 1.3

Estimated Item Count: 80

Audit Items

DescriptionCategories
Authentication Failure

ACCESS CONTROL

DISA_STIG_Microsoft_Exchange_2016_Edge_Transport_Server_v2r3.audit from DISA Microsoft Exchange 2016 Edge Transport Server v2r3 STIG

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000010 - Exchange must limit the Receive connector timeout.
EX16-ED-000020 - Exchange servers must use approved DoD certificates.
EX16-ED-000030 - Exchange must have accepted domains configured.
EX16-ED-000040 - Exchange must have auto-forwarding of email to remote domains disabled or restricted.
EX16-ED-000050 - Exchange external Receive connectors must be domain secure-enabled.
EX16-ED-000060 - The Exchange email Diagnostic log level must be set to the lowest level.
EX16-ED-000070 - Exchange Connectivity logging must be enabled.
EX16-ED-000080 - Exchange Queue monitoring must be configured with threshold and action.
EX16-ED-000090 - Exchange must not send Customer Experience reports to Microsoft.
EX16-ED-000100 - Exchange Audit data must be protected against unauthorized access (read access).
EX16-ED-000110 - Exchange Send Fatal Errors to Microsoft must be disabled.
EX16-ED-000120 - Exchange audit data must be protected against unauthorized access for modification.
EX16-ED-000130 - Exchange audit data must be protected against unauthorized access for deletion.
EX16-ED-000140 - Exchange audit data must be on separate partitions.
EX16-ED-000150 - The Exchange local machine policy must require signed scripts.
EX16-ED-000160 - Exchange Internet-facing Send connectors must specify a Smart Host.
EX16-ED-000170 - Exchange internal Send connectors must use domain security (mutual authentication Transport Layer Security). - DNSRoutingEnabled
EX16-ED-000170 - Exchange internal Send connectors must use domain security (mutual authentication Transport Layer Security). - DomainSecureEnabled
EX16-ED-000170 - Exchange internal Send connectors must use domain security (mutual authentication Transport Layer Security). - RequireTLS
EX16-ED-000170 - Exchange internal Send connectors must use domain security (mutual authentication Transport Layer Security). - TlsAuthLevel
EX16-ED-000180 - Exchange Internet-facing Receive connectors must offer Transport Layer Security (TLS) before using basic authentication.
EX16-ED-000190 - Exchange Outbound Connection Timeout must be 10 minutes or less.
EX16-ED-000200 - Exchange Outbound Connection Limit per Domain Count must be controlled.
EX16-ED-000230 - Exchange Send connector connections count must be limited.
EX16-ED-000240 - Exchange message size restrictions must be controlled on Send connectors.
EX16-ED-000250 - Exchange Send connectors delivery retries must be controlled.
EX16-ED-000260 - Exchange Send connectors must be clearly named.
EX16-ED-000270 - Exchange Receive connector Maximum Hop Count must be 60.
EX16-ED-000280 - Exchange Receive connectors must be clearly named.
EX16-ED-000290 - Exchange Receive connectors must control the number of recipients chunked on a single message.
EX16-ED-000300 - Exchange Receive connectors must control the number of recipients per message.
EX16-ED-000310 - The Exchange Internet Receive connector connections count must be set to default.
EX16-ED-000320 - Exchange Message size restrictions must be controlled on Receive connectors.
EX16-ED-000330 - Exchange messages with a blank sender field must be rejected.
EX16-ED-000340 - Exchange messages with a blank sender field must be filtered.
EX16-ED-000350 - Exchange filtered messages must be archived.
EX16-ED-000360 - The Exchange Sender filter must block unaccepted domains.
EX16-ED-000370 - Exchange nonexistent recipients must not be blocked.
EX16-ED-000380 - The Exchange Sender Reputation filter must be enabled.
EX16-ED-000390 - The Exchange Sender Reputation filter must identify the spam block level.
EX16-ED-000400 - Exchange Attachment filtering must remove undesirable attachments by file type.
EX16-ED-000410 - The Exchange Spam Evaluation filter must be enabled.
EX16-ED-000420 - The Exchange Block List service provider must be identified.
EX16-ED-000430 - Exchange messages with a malformed From address must be rejected.
EX16-ED-000470 - The Exchange Recipient filter must be enabled.
EX16-ED-000480 - The Exchange tarpitting interval must be set.
EX16-ED-000490 - Exchange internal Receive connectors must not allow anonymous connections.
EX16-ED-000500 - Exchange Simple Mail Transfer Protocol (SMTP) IP Allow List entries must be empty.