EX16-ED-000040 – Exchange must have auto-forwarding of email to remote domains disabled or restricted. Details Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so...
EX16-ED-000050 – Exchange external Receive connectors must be domain secure-enabled. Details The Simple Mail Transfer Protocol (SMTP) connector is used by Exchange to send and receive messages from server to...
EX16-ED-000060 – The Exchange email Diagnostic log level must be set to the lowest level. Details Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning...
EX16-ED-000070 – Exchange Connectivity logging must be enabled. Details A connectivity log is a record of the SMTP connection activity of the outbound message delivery queues to the...
EX16-ED-000080 – Exchange Queue monitoring must be configured with threshold and action. Details Monitors are automated ‘process watchers’ that respond to performance changes and can be useful in detecting outages and alerting...
EX16-ED-000090 – Exchange must not send Customer Experience reports to Microsoft. Details It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary...
EX16-ED-000100 – Exchange Audit data must be protected against unauthorized access (read access). Details Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning...
EX16-ED-000110 – Exchange Send Fatal Errors to Microsoft must be disabled. Details It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary...
EX16-ED-000120 – Exchange audit data must be protected against unauthorized access for modification. Details Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning...
EX16-ED-000130 – Exchange audit data must be protected against unauthorized access for deletion. Details Log files help establish a history of activities and can be useful in detecting attack attempts or determining tuning...