Check: EMG1-012 Exch2K3
Microsoft Exchange Server 2003:
EMG1-012 Exch2K3
(in version v1 r5)
Title
Unneeded "Public" E-mail Virtual Directory is not removed. (Cat III impact)
Discussion
To reduce the vectors through which a server can be attacked, unneeded application components should be disabled or removed. By default, a virtual directory is installed for Public Folders. If an attacker were to intrude into an Exchange Front-End server and be able to access the public folder web site, it would provide an additional attack vector, provided the virtual directory were present. Once removed, the Public functionality cannot be used without restoring the virtual directory, not a trivial process.
Check Content
If Public Folders are in use at the site, this check is N/A. Verify that "Public" Virtual Directory is removed. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site The "Public" virtual directory should be missing from the list. Criteria: If the "Public" virtual directory is missing from the list, this is not a finding.
Fix Text
Delete the Public Folder virtual directory. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify and delete the "Public" Virtual Directory.
Additional Identifiers
Rule ID: SV-20306r1_rule
Vulnerability ID: V-18683
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |