STIGQter STIGQter: STIG Summary: Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

Exchange internal Receive connectors must not allow anonymous connections.

DISA Rule

SV-221245r612603_rule

Vulnerability Number

V-221245

Group Title

SRG-APP-000261

Rule Version

EX16-ED-000490

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open the Exchange Management Shell and enter the following command:

Set-ReceiveConnector -Identity <'IdentityName'> -PermissionGroups 'valid user group(s)'

Note: The <IdentityName> value and user group(s) must be in single quotes.

Example for user groups only: 'ExchangeServers, ExchangeUsers'

Repeat the procedures for each Receive connector.

This is an Example only: Set-ReceiveConnector -Identity <'IdentityName'> -PermissionGroups 'ExchangeUsers'

Check Contents

Open the Exchange Management Shell and enter the following command:

Get-ReceiveConnector | Select Name, Identity, PermissionGroups

For each Receive connector, if the value of "PermissionGroups" is "AnonymousUsers" for any non-Internet connector, this is a finding.

Vulnerability Number

V-221245

Documentable

False

Rule Version

EX16-ED-000490

Severity Override Guidance

Open the Exchange Management Shell and enter the following command:

Get-ReceiveConnector | Select Name, Identity, PermissionGroups

For each Receive connector, if the value of "PermissionGroups" is "AnonymousUsers" for any non-Internet connector, this is a finding.

Check Content Reference

M

Target Key

4079

Comments