1. Home
  2. Security Hardening
  3. DISA Microsoft Exchange 2013 Client Access Server STIG V1R3
  4. EX13-CA-000035 – Exchange ActiveSync (EAS) must only use certificate-based authentication to access email – BasicAuthEnabled

EX13-CA-000035 – Exchange ActiveSync (EAS) must only use certificate-based authentication to access email – BasicAuthEnabled

Details

Identification and Authentication provide the foundation for access control. For EAS to be used effectively on DoD networks, client certificate authentication must be used for communications between the MEM and email server. Additionally, the internal and external URLs must be set to the same address, since all EAS traffic must be tunneled to the device from the MEM.

The risk associated with email synchronization with CMD should be mitigated by the introduction of MEM products and is specified in the DoD CIO memo dated 06 Apr 2011. The memo states specifically, ‘Email redirection from the email server (e.g., Exchange Server) to the device shall be controlled via centrally managed server.’ When EAS is used on DoD networks, the devices must be managed by an MEM.

Solution

Open the Exchange Management Shell and enter the following command:

Set-ActiveSyncVirtualDirectory -Identity ‘Microsoft-Server-ActiveSync (Default Web Site)’ -BasicAuthEnabled $False -WindowsAuthEnabled $False -ClientCertAuth ‘Required’ -WebSites-InternalAuthenticationMethods ‘Certificate’ -ExternalAuthenticationMethods ‘Certificate’

Note: The Microsoft-Server-ActiveSync (Default Web Site) value must be in quotes.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles