STIGQter STIGQter: STIG Summary: Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The Exchange Receive connector timeout must be limited.

DISA Rule

SV-228399r612748_rule

Vulnerability Number

V-228399

Group Title

SRG-APP-000295

Rule Version

EX16-MB-000550

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Update the EDSP to specify the Connection Timeout value.

Open the Exchange Management Shell and enter the following command:

Set-ReceiveConnector -Identity <'IdentityName'> -ConnectionTimeout 00:10:00

Note: The <IdentityName> value must be in single quotes.

or

Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance.

Check Contents

Review the Email Domain Security Plan (EDSP).

Determine the Connection Timeout value.

Open the Exchange Management Shell and enter the following command:

Get-ReceiveConnector | Select Name, Identity, ConnectionTimeout

For each Receive connector, if the value of "ConnectionTimeout" is not set to "00:10:00", this is a finding.

or

If "ConnectionTimeout" is set to other than "00:10:00" and has signoff and risk acceptance in the EDSP, this is not a finding.

Vulnerability Number

V-228399

Documentable

False

Rule Version

EX16-MB-000550

Severity Override Guidance

Review the Email Domain Security Plan (EDSP).

Determine the Connection Timeout value.

Open the Exchange Management Shell and enter the following command:

Get-ReceiveConnector | Select Name, Identity, ConnectionTimeout

For each Receive connector, if the value of "ConnectionTimeout" is not set to "00:10:00", this is a finding.

or

If "ConnectionTimeout" is set to other than "00:10:00" and has signoff and risk acceptance in the EDSP, this is not a finding.

Check Content Reference

M

Target Key

4223

Comments