STIGQter STIGQter: STIG Summary: Microsoft Exchange 2013 Mailbox Server Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

The Exchange Public Folder database must not be overwritten by a restore.

DISA Rule

SV-207292r615936_rule

Vulnerability Number

V-207292

Group Title

SRG-APP-000231

Rule Version

EX13-MB-000130

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Open the Exchange Management Shell and enter the following command:

Set-PublicFolderDatabase -Identity <'IdentityName'> -AllowFileRestore $false

Note: The <IdentityName> value must be in quotes.

Check Contents

If public folders are not used, this check is not applicable.

Open the Exchange Management Shell and enter the following command:

Get-PublicFolderDatabase| Select Name, Identity, AllowFileRestore

If the value of AllowFileRestore is not set to False, this is a finding.

Vulnerability Number

V-207292

Documentable

False

Rule Version

EX13-MB-000130

Severity Override Guidance

If public folders are not used, this check is not applicable.

Open the Exchange Management Shell and enter the following command:

Get-PublicFolderDatabase| Select Name, Identity, AllowFileRestore

If the value of AllowFileRestore is not set to False, this is a finding.

Check Content Reference

M

Target Key

2923

Comments