Check: Exch-2-736
Exchange 2010 Hub Transport Server STIG:
Exch-2-736
(in version v1 r12)
Title
Auto-forwarding email to remote domains must be disabled or restricted. (Cat II impact)
Discussion
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure Automatic Forwards to remote domains are disabled, except for enterprise mail that must be restricted to forward-only to .mil and .gov. domains. Before enabling this setting first configure a remote domain.
Check Content
Non- Enterprise Mail Check Content: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | select identity, AutoForwardEnabled If the value of 'AutoForwardEnabled' is not set to 'False', this is a finding. Enterprise Mail Check Content: If the value of 'AutoForwardEnabled' is set to 'True', this is not a finding. and In the Exchange Management Shell and enter the following command: Get-RemoteDomain If the value of 'RemoteDomain ' is not set to a ' .mil' and/or '.gov ' domain(s), this is a finding.
Fix Text
Non- Enterprise Mail Fix Text: Open the Exchange Management Shell and enter the following command: Set-RemoteDomain -Identity <'RemoteDomainName'> -AutoForwardEnabled $false Enterprise Mail Fix Text: New-RemoteDomain -Name <Descriptive Name> -DomainName <SMTP address space> Set-RemoteDomain -Identity <'RemoteDomainName'> -AutoForwardEnabled $true
Additional Identifiers
Rule ID: SV-43996r2_rule
Vulnerability ID: V-33576
Group Title: Exch-2-736
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |