EX16-ED-000580 - The Exchange application directory must be protected from unauthorized access.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Default product installations may provide more generous access permissions than are necessary to run the application. By examining and tailoring access permissions to more closely provide the least amount of privilege possible, attack vectors that align with user permissions are less likely to access more highly secured areas.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Update the EDSP to reflect the authorized groups and users that have access to the Exchange application directories.

Navigate to the Exchange application directory and remove or modify the group or user access permissions.

Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Exchange_2016_Y21M12_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001812, Rule-ID|SV-221254r612603_rule, STIG-ID|EX16-ED-000580, STIG-Legacy|SV-95299, STIG-Legacy|V-80589, Vuln-ID|V-221254

Plugin: Windows

Control ID: 8eddcd4ba5334b0167ce563487b282f56f100dd1689b91f9d178fb6696fb246a