1. Home
  2. Security Hardening
  3. DISA Microsoft Exchange 2016 Edge Transport Server STIG V2R2
  4. EX16-ED-000170 – Exchange internal Send connectors must use domain security (mutual authentication Transport Layer Security).

EX16-ED-000170 – Exchange internal Send connectors must use domain security (mutual authentication Transport Layer Security).

Details

The Simple Mail Transfer Protocol (SMTP) connector is used by Exchange to send and receive messages from server to server. Several controls work together to provide security between internal servers. This setting controls the authentication method used for communications between servers. With this feature enabled, only servers capable of supporting domain authentication will be able to send and receive mail within the domain.

The use of secure communication prevents eavesdroppers from reading or modifying communications between mail clients and servers. While sensitive message bodies should be encrypted by the sender at the client, requiring a secure connection from server to server adds protection by encrypting the sender and recipient information that cannot be encrypted by the sender.

Individually, channel security and encryption can be compromised by attackers. Used together, email becomes a more difficult target, and security is heightened. Failure to enable this feature gives eavesdroppers an opportunity to read or modify messages between servers.

Solution

Open the Exchange Management Shell and enter the following command:

Set-SendConnector <'IdentityName'> -DomainSecureEnabled $true

Note: The value must be in single quotes.

Repeat the procedures for each send connector.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: System and Communications Protection.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles