STIGQter STIGQter: STIG Summary: Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

Exchange internal Send connectors must use domain security (mutual authentication Transport Layer Security).

DISA Rule

SV-221218r612603_rule

Vulnerability Number

V-221218

Group Title

SRG-APP-000219

Rule Version

EX16-ED-000170

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open the Exchange Management Shell and enter the following command:

Set-SendConnector <'IdentityName'> -DomainSecureEnabled $true

Note: The <IdentityName> value must be in single quotes.

Repeat the procedures for each send connector.

Check Contents

Open the Exchange Management Shell and enter the following command:

Get-SendConnector | Select Name, Identity, DomainSecureEnabled

For each send connector, if the value of "DomainSecureEnabled" is not set to "True", this is a finding.

If the "TlsAuthLevel" parameter is set to "DomainValidation" then the "TlsDomain" parameter is required if "DNSRoutingEnabled" parameter is set to "$false".

The "DNSRoutingEnabled" parameter must be "$true" If the value of "DomainSecureEnabled" is "$true".

Vulnerability Number

V-221218

Documentable

False

Rule Version

EX16-ED-000170

Severity Override Guidance

Open the Exchange Management Shell and enter the following command:

Get-SendConnector | Select Name, Identity, DomainSecureEnabled

For each send connector, if the value of "DomainSecureEnabled" is not set to "True", this is a finding.

If the "TlsAuthLevel" parameter is set to "DomainValidation" then the "TlsDomain" parameter is required if "DNSRoutingEnabled" parameter is set to "$false".

The "DNSRoutingEnabled" parameter must be "$true" If the value of "DomainSecureEnabled" is "$true".

Check Content Reference

M

Target Key

4079

Comments