Check: Exch-1-103
Exchange 2010 Client Access Server STIG:
Exch-1-103
(in version v1 r9)
Title
The Public Folder virtual directory must be removed if not in use by the site. (Cat III impact)
Discussion
To reduce the vectors through which a server can be attacked, unneeded application components should be disabled or removed. By default, a virtual directory is installed for Public Folders. If an attacker were to intrude into an Exchange CA server and be able to access the public folder web site, it would provide an additional attack vector, provided the virtual directory was present. Once removed, the Public functionality cannot be used without restoring the virtual directory.
Check Content
If public folders are in use this check is NA. Open the Exchange Management Shell and enter the following command: Get-PublicFolder | Select Name, Identity If public folders are not in use and directories exist, this is a finding.
Fix Text
Open the Exchange Management Shell and enter the following command: Remove-PublicFolder -Identity <'Identity'> -Server <'ServerName'> -Recurse: $true Note: This command removes both the root directory and any subdirectories.
Additional Identifiers
Rule ID: SV-43991r1_rule
Vulnerability ID: V-33571
Group Title: Exch-1-103
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |