STIGQter STIGQter: STIG Summary: Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

Exchange email forwarding must be restricted.

DISA Rule

SV-228377r612748_rule

Vulnerability Number

V-228377

Group Title

SRG-APP-000231

Rule Version

EX16-MB-000290

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Update the EDSP.

Open the Exchange Management Shell and enter the following command:

Set-Mailbox -Identity <'IdentityName'> -ForwardingSMTPAdddress $null

Note: The <IdentityName> value must be in quotes.

Check Contents

Review the Email Domain Security Plan (EDSP).

Determine any accounts that have been authorized to have email auto-forwarded.

Note: If email auto-forwarding is not being used, this check is not applicable. .

Open the Exchange Management Shell and enter the following commands:

Get-Mailbox | Select Name, Identity, Filter

If any user has a forwarding SMTP address and is not documented in the EDSP, this is a finding.

Note: If no remote SMTP domain matching the mail-enabled user or contact that allows forwarding is configured for users identified with a forwarding address, this function will not work properly.

Vulnerability Number

V-228377

Documentable

False

Rule Version

EX16-MB-000290

Severity Override Guidance

Review the Email Domain Security Plan (EDSP).

Determine any accounts that have been authorized to have email auto-forwarded.

Note: If email auto-forwarding is not being used, this check is not applicable. .

Open the Exchange Management Shell and enter the following commands:

Get-Mailbox | Select Name, Identity, Filter

If any user has a forwarding SMTP address and is not documented in the EDSP, this is a finding.

Note: If no remote SMTP domain matching the mail-enabled user or contact that allows forwarding is configured for users identified with a forwarding address, this function will not work properly.

Check Content Reference

M

Target Key

4223

Comments