STIGQter STIGQter: STIG Summary: Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 24 Jan 2020: The Exchange application directory must be protected from unauthorized access.

DISA Rule

SV-95299r1_rule

Vulnerability Number

V-80589

Group Title

SRG-APP-000378

Rule Version

EX16-ED-000580

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Update the EDSP to reflect the authorized groups and users that have access to the Exchange application directories.

Navigate to the Exchange application directory and remove or modify the group or user access permissions.

Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.

Check Contents

Review the Email Domain Security Plan (EDSP).

Determine the authorized groups and users that have access to the Exchange application directories.

Determine if the access permissions on the directory match the access permissions listed in the EDSP.

If any group or user has different access permissions than listed in the EDSP, this is a finding.

Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.

Vulnerability Number

V-80589

Documentable

False

Rule Version

EX16-ED-000580

Severity Override Guidance

Review the Email Domain Security Plan (EDSP).

Determine the authorized groups and users that have access to the Exchange application directories.

Determine if the access permissions on the directory match the access permissions listed in the EDSP.

If any group or user has different access permissions than listed in the EDSP, this is a finding.

Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.

Check Content Reference

M

Target Key

3353

Comments