STIGQter STIGQter: STIG Summary: MS Exchange 2013 Client Access Server Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Jan 2020:

Exchange IMAP4 service must be disabled.

DISA Rule

SV-84375r1_rule

Vulnerability Number

V-69753

Group Title

SRG-APP-000141

Rule Version

EX13-CA-000095

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open the Windows PowerShell and enter the following command:

services.msc

Navigate to and double-click on Microsoft Exchange IMAP4 Backend.

Click on the General tab.

In the Startup Type: dropdown, select Disabled.

Click the OK button.

Check Contents

Open the Windows PowerShell and enter the following command:

Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangeIMAP4' | Select Start

Note: The hklm:\system\currentcontrolset\services\MSExchangeIMAP4 value must be in quotes.

If the value of Start is not set to 4, this is a finding.

Vulnerability Number

V-69753

Documentable

False

Rule Version

EX13-CA-000095

Severity Override Guidance

Open the Windows PowerShell and enter the following command:

Get-ItemProperty 'hklm:\system\currentcontrolset\services\MSExchangeIMAP4' | Select Start

Note: The hklm:\system\currentcontrolset\services\MSExchangeIMAP4 value must be in quotes.

If the value of Start is not set to 4, this is a finding.

Check Content Reference

M

Target Key

3097

Comments