CIS Exchange 2013
CIS Exchange 2013
CIS Exchange 2013
Benchmark
v1.1.0 - 03-25-2015
http://benchmarks.cisecurity.org
The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and
recommendations (the “SB Products”) as a public service to Internet users worldwide. Downloading or using SB Products in any way signifies
and confirms your acceptance of and your binding agreement to these CIS Security Benchmarks Terms of Use.
SPECIAL RULES FOR CIS MEMBER ORGANIZATIONS: CIS reserves the right to create special rules for: (1) CIS Members; and (2) Non-
Member organizations and individuals with which CIS has a written contractual relationship. CIS hereby grants to each CIS Member
Organization in good standing the right to distribute the SB Products within such Member's own organization, whether by manual or
electronic means. Each such Member Organization acknowledges and agrees that the foregoing grants in this paragraph are subject to the
terms of such Member's membership arrangement with CIS and may, therefore, be modified or terminated by CIS at any time.
1|Page
Table of Contents
Table of Contents .................................................................................................................................................. 2
Overview .................................................................................................................................................................. 3
Intended Audience ........................................................................................................................................... 3
Consensus Guidance........................................................................................................................................ 3
Typographical Conventions ......................................................................................................................... 4
Scoring Information ........................................................................................................................................ 4
Profile Definitions ............................................................................................................................................ 5
Acknowledgements ......................................................................................................................................... 6
Recommendations ................................................................................................................................................ 7
1 Transport ......................................................................................................................................................... 7
2 Mailbox .......................................................................................................................................................... 26
3 Other ............................................................................................................................................................... 48
Appendix: Change History .............................................................................................................................. 59
2|Page
Overview
This document, Security Configuration Benchmark for Microsoft Exchange Server 2013
SP1, provides prescriptive guidance for establishing a secure configuration posture for
Microsoft Exchange Server 2013 SP1. This guide was tested against Microsoft Exchange
Server 2013 SP1. To obtain the latest version of this guide, please visit
http://benchmarks.cisecurity.org.
If you have questions, comments, or have identified ways to improve this guide, please
write us at feedback@cisecurity.org.
Intended Audience
This benchmark is intended for system and application administrators, security specialists,
auditors, help desk, and platform deployment personnel who plan to develop, deploy,
assess, or secure solutions that incorporate Microsoft Exchange Server 2013 SP1 on a
Microsoft Windows platform.
Consensus Guidance
This benchmark was created using a consensus review process comprised subject matter
experts. Consensus participants provide perspective from a diverse set of backgrounds
including consulting, software development, audit and compliance, security research,
operations, government, and legal.
Each CIS benchmark undergoes two phases of consensus review. The first phase occurs
during initial benchmark development. During this phase, subject matter experts convene
to discuss, create, and test working drafts of the benchmark. This discussion occurs until
consensus has been reached on benchmark recommendations. The second phase begins
after the benchmark has been published. During this phase, all feedback provided by the
Internet community is reviewed by the consensus team for incorporation in the
benchmark. If you are interested in participating in the consensus process, please visit
https://community.cisecurity.org.
3|Page
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Stylized Monospace font Used for blocks of code, command, and script examples.
Text should be interpreted exactly as presented.
Monospace font Used for inline code, commands, or examples. Text should
be interpreted exactly as presented.
<italic font in brackets> Italic texts set in angle brackets denote a variable
requiring substitution for a real value.
Scoring Information
A scoring status indicates whether compliance with the given recommendation impacts the
assessed target's benchmark score. The following scoring statuses are used in this
benchmark:
Scored
Failure to comply with "Scored" recommendations will decrease the final benchmark score.
Compliance with "Scored" recommendations will increase the final benchmark score.
Not Scored
Failure to comply with "Not Scored" recommendations will not decrease the final
benchmark score. Compliance with "Not Scored" recommendations will not increase the
final benchmark score.
4|Page
Profile Definitions
The following configuration profiles are defined by this Benchmark:
Items in this profile apply to the Client Access Server role and intend to:
Items in this profile apply to the Edge Server role and intend to:
Items in this profile apply to the Hub Server role and intend to:
Items in this profile apply to the Mailbox Server role and intend to:
Items in this profile apply to the Unified Messaging Server role and intend to:
5|Page
Acknowledgements
This benchmark exemplifies the great things a community of users, vendors, and subject matter
experts can accomplish through consensus collaboration. The CIS community thanks the entire
consensus team with special recognition to the following individuals who contributed greatly to
the creation of this guide:
Editor
David Berube CISSP
Contributors
Dave Colbeck
6|Page
Recommendations
1 Transport
This section contains recommendations that impact messages while they are in transit. The
following PowerShell Cmdlet are covered in this section:
Set-SendConnector
Set-SenderFilterConfig
Set-SenderReputationConfig
Set-ReceiveConnector
Set-TransportServer
Set-TransportService
Set-TransportConfig
Set-PopSettings
Set-ImapSettings
7|Page
1.1 Set 'Maximum send size - connector level' to '10240' (Not Scored)
Profile Applicability:
Description:
This setting limits the total size of messages at the connector level. This includes the
message header, the message body, and any attachments. For internal message flow,
Exchange Server uses the custom X-MS-Exchange-Organization-OriginalSize message
header to record the original message size of the message as it enters the Exchange Server
organization. Whenever the message is checked against the specified message size limits,
the lower value of the current message size or the original message size header is used. The
size of the message can change because of content conversion, encoding, and agent
processing.
Rationale:
This setting somewhat limits the impact a malicious user or a computer with malware can
have on the Exchange infrastructure by restricting the size of incoming messages.
Audit:
Remediation:
Impact:
Users will not be able to send messages larger than the limit.
Default Value:
10240
8|Page
1.2 Set 'Maximum receive size - organization level' to '10240' (Not
Scored)
Profile Applicability:
Description:
This limit includes the message header, the message body, and any attachments. For
internal message flow, Exchange Server uses the custom X-MS-Exchange-Organization-
OriginalSize message header to record the original message size of the message as it
enters the Exchange Server organization. Whenever the message is checked against the
specified message size limits, either the lower value of the current message size or the
original message size header is used. The size of the message can change because of
content conversion, encoding, and agent processing.
Rationale:
This setting somewhat limits the impact that a malicious user or a computer with malware
can have on the Exchange infrastructure by restricting the size of incoming messages.
Audit:
Execute the following cmdlet and ensure MaxReceiveSize is set to '10240 ':
Remediation:
Impact:
Users will not be able to receive messages larger than the limit.
Default Value:
10240
9|Page
1.3 Set 'Enable Sender ID agent' to 'True' (Scored)
Profile Applicability:
Description:
The Sender ID agent is an antispam agent enabled on Exchange servers that perform the
Edge Transport server role. Sender ID tries to verify that every e-mail message originates
from the Internet domain from which it claims to have been sent. Sender ID checks the
address of the server that sends the message against a registered list of servers that the
domain owner has authorized to send e-mail.
Rationale:
Spam consumes a large amount of network bandwidth and server capacity. In addition, it is
often the source of malicious software.
Audit:
Remediation:
Impact:
Default Value:
True
10 | P a g e
1.4 Set 'External send connector authentication: DNS Routing' to 'True'
(Not Scored)
Profile Applicability:
Description:
Select this option to use DNS to route outbound mail. If enabled the connector will use DNS
to resolve the IP address of the remote SMTP server.
Rationale:
Basic authentication sends credentials across the network in plaintext. DNS routing helps
protect connections from tampering or interception by unauthorized users.
Audit:
Remediation:
Impact:
The organization's servers will only be able to send e-mail to remote servers that are
located through DNS routing.
Default Value:
False
11 | P a g e
1.5 Set 'Configure Sender Filtering' to 'Enabled' (Scored)
Profile Applicability:
Description:
By default, sender filtering is enabled on a computer performing the Edge Transport server
role for inbound messages from the Internet that are not authenticated. These messages
are handled as external messages. You can disable the Sender Filter agent in individual
computer configurations by using the Exchange admin center or the Exchange Management
Shell. When you enable the Sender Filter agent on a computer running Exchange, it filters
all messages from all Receive connectors on that computer. Only messages from external
sources are filtered. External sources are defined as non-authenticated sources. These are
considered anonymous Internet sources.
Rationale:
Spam consumes a large amount of network bandwidth and server capacity. In addition, it is
often the source of malicious software.
Audit:
Remediation:
Impact:
Default Value:
True
12 | P a g e
1.6 Set 'Enable Sender reputation' to 'True' (Scored)
Profile Applicability:
Description:
When sender reputation is enabled on a computer, sender reputation filters all messages
from all Receive connectors on that computer. Only messages from external sources are
filtered. External sources are defined as non-authenticated sources, which are considered
anonymous Internet sources.
Rationale:
Spam consumes a large amount of network bandwidth and server capacity. In addition, it is
often the source of malicious software.
Audit:
Remediation:
Impact:
Some legitimate messages may be blocked if the threshold is set too high.
Default Value:
True
13 | P a g e
1.7 Set 'Maximum number of recipients - organization level' to '5000'
(Scored)
Profile Applicability:
Description:
You can use this setting to control the total number of message recipients. When a message
is first composed, the recipients exist in the To:, Cc:, and Bcc: header fields. When the
message is submitted for delivery, the message recipients are converted into RCPT TO:
entries in the message envelope. A distribution group is counted as a single recipient
during message submission.
Rationale:
This setting somewhat limits the impact that a malicious user or a computer with malware
can have on the Exchange infrastructure by restricting the number of recipients for any
single message.
Audit:
Remediation:
Impact:
Users will not be able to send a message to more recipients than the limit.
Default Value:
5000
14 | P a g e
1.8 Set 'External send connector authentication: Ignore Start TLS' to
'False' (Scored)
Profile Applicability:
Description:
If this setting is enabled then you will not be able to configure mutual authentication TLS,
referred to as "External send connector authentication: Domain Security" in this baseline.
Rationale:
Basic authentication sends credentials across the network in plaintext. TLS helps protect
credentials from interception by unauthorized users.
Audit:
Remediation:
Impact:
The organization's servers will only be able to send e-mail to remote servers that TLS.
Default Value:
True
15 | P a g e
1.9 Set 'Configure login authentication for POP3' to 'SecureLogin'
(Scored)
Profile Applicability:
Description:
POP3 transmits all data, including user credentials and potentially sensitive messages, in
plaintext. Using this setting to enable TLS ensures that POP3 network traffic is encrypted,
and it allows the client to verify the server's address.
Rationale:
An attacker who can intercept or eavesdrop on the POP3 traffic could view sensitive
information.
Audit:
Remediation:
Impact:
Clients that do not support TLS will not be able to access e-mail via POP3.
Default Value:
SecureLogin
16 | P a g e
1.10 Set receive connector 'Configure Protocol logging' to 'Verbose'
(Scored)
Profile Applicability:
Description:
A protocol log is a record of the SMTP activity between messaging servers as part of
message delivery. This SMTP activity occurs on Send connectors and Receive connectors
that are configured on Hub Transport servers and Edge Transport servers. By default,
protocol logging is disabled.
Rationale:
If events are not recorded it may be difficult or impossible to determine the root cause of
system problems or the unauthorized activities of malicious users.
Audit:
Remediation:
Impact:
The impact should be small: additional storage space will be required and some processing
power will be used to track and record information.
Default Value:
None
17 | P a g e
1.11 Set send connector 'Configure Protocol logging' to 'Verbose'
(Scored)
Profile Applicability:
Description:
A protocol log is a record of the SMTP activity between messaging servers as part of
message delivery. This SMTP activity occurs on Send connectors and Receive connectors
that are configured on Hub Transport servers and Edge Transport servers. By default,
protocol logging is disabled.
Rationale:
If events are not recorded it may be difficult or impossible to determine the root cause of
system problems or the unauthorized activities of malicious users.
Audit:
Remediation:
Impact:
The impact should be small: additional storage space will be required and some processing
power will be used to track and record information.
Default Value:
None
18 | P a g e
1.12 Set 'External send connector authentication: Domain Security' to
'True' (Scored)
Profile Applicability:
Description:
If enabled, the Send connector will attempt to establish a mutual Transport Layer Security
(TLS) connection with remote servers when sending mail. There are additional
configuration steps required before you can start using TLS. For more information about
how to configure mutual TLS, see Using Domain Security: Configuring Mutual TLS.
Rationale:
Basic authentication sends credentials across the network in plaintext. Domain Security
(Mutual Auth TLS) helps protect credentials from interception by unauthorized users.
Audit:
Remediation:
Impact:
The organization's servers will only be able to send e-mail to remote servers that support
Domain Security (Mutual Auth TLS).
Default Value:
False
19 | P a g e
References:
1. http://technet.microsoft.com/en-us/library/bb123543(EXCHG.140).aspx
Description:
A message tracking log provides a detailed log of all message activity as messages are
transferred to and from a computer running Exchange. Message tracking is available on
Hub Transport servers, Edge Transport servers, and Mailbox servers. By default, message
tracking is enabled.
Rationale:
If events are not recorded it may be difficult or impossible to determine the root cause of
system problems or the unauthorized activities of malicious users.
Audit:
Remediation:
Impact:
The impact should be small: additional storage space will be required and some processing
power will be used to track and record information.
Default Value:
True
20 | P a g e
1.14 Set 'Message tracking logging - Mailbox' to 'True' (Scored)
Profile Applicability:
Description:
A message tracking log provides a detailed log of all message activity as messages are
transferred to and from a computer running Exchange. Message tracking is available on
Hub Transport servers, Edge Transport servers, and Mailbox servers. By default, message
tracking is enabled.
Rationale:
If events are not recorded it may be difficult or impossible to determine the root cause of
system problems or the unauthorized activities of malicious users.
Audit:
Remediation:
Impact:
The impact should be small: additional storage space will be required and some processing
power will be used to track and record information.
Default Value:
True
21 | P a g e
1.15 Set 'Configure login authentication for IMAP4' to 'SecureLogin'
(Scored)
Profile Applicability:
Description:
IMAP4 transmits all data, including user credentials and potentially sensitive messages, in
plaintext. Using this setting to enable SSL ensures that IMAP4 network traffic is encrypted,
and it allows the client to verify the server's address.
Rationale:
An attacker who can intercept or eavesdrop on the IMAP4 traffic could view sensitive
information.
Audit:
Remediation:
Impact:
Clients that do not support TLS will not be able to access e-mail via IMAP.
Default Value:
SecureLogin
22 | P a g e
1.16 Set 'Turn on Connectivity logging' to 'True' (Scored)
Profile Applicability:
Description:
A connectivity log is a record of the SMTP connection activity of the outbound message
delivery queues to the destination Mailbox server, smart host, or domain. Connectivity
logging is available on Hub Transport servers and Edge Transport servers. By default,
connectivity logging is disabled.
Rationale:
If events are not recorded it may be difficult or impossible to determine the root cause of
system problems or the unauthorized activities of malicious users.
Audit:
Remediation:
Impact:
The impact should be small: additional storage space will be required and some processing
power will be used to track and record information.
Default Value:
False
23 | P a g e
1.17 Set 'Maximum send size - organization level' to '10240' (Scored)
Profile Applicability:
Description:
This limit includes the message header, the message body, and any attachments. For
internal message flow, Exchange Server uses the custom X-MS-Exchange-Organization-
OriginalSize message header to record the original message size of the message as it
enters the Exchange Server organization. Whenever the message is checked against the
specified message size limits, the lower value of the current message size or the original
message size header is used. The size of the message can change because of content
conversion, encoding, and agent processing.
Rationale:
This setting somewhat limits the impact that a malicious user or a computer with malware
can have on the Exchange infrastructure by restricting the size of outgoing messages.
Audit:
Remediation:
Impact:
Users will not be able to send a message larger than the limit.
Default Value:
10240
24 | P a g e
1.18 Set 'Maximum receive size - connector level' to '10240' (Scored)
Profile Applicability:
Description:
You can use this setting to limit the total size of messages at the connector level. This
includes the message header, the message body, and any attachments. For internal message
flow, Exchange Server uses the custom X-MS-Exchange-Organization-
OriginalSize message header to record the original message size of the message as it
enters the Exchange Server organization. Whenever the message is checked against the
specified message size limits, the lower value of the current message size or the original
message size header is used. The size of the message can change because of content
conversion, encoding, and agent processing.
Rationale:
This setting somewhat limits the impact a malicious user or a computer with malware can
have on the Exchange infrastructure by restricting the size of incoming messages.
Audit:
Remediation:
Impact:
Users will not be able to receive messages larger than the limit.
Default Value:
10240
25 | P a g e
2 Mailbox
This section contains recommendations that impact mailboxes, unified messaging, address
books and public folders. The following PowerShell Cmdlet are covered in this section:
Set-MailboxDatabase
Set-ActiveSyncMailboxPolicy
Set-UMService
Set-UMMailboxPolicy
Set-UMDialPlan
Set-CASMailbox
26 | P a g e
2.1 Set 'Mailbox quotas: Issue warning at' to '1991680' (Not Scored)
Profile Applicability:
Description:
You can configure this setting to automatically warn mailbox users that their mailbox is
approaching its storage limit. To specify the storage limit, select the check box for this
capability, and then specify in kilobytes (KB) how much content users can store in their
mailboxes before a warning e-mail message is sent to them. You can enter a value between
0 and 2,147,483,647 KB (2.1 terabytes).
Rationale:
If users exceed their mailbox limits without warning, they may miss important messages
requiring them to take immediate action to mitigate a security risk.
Audit:
Remediation:
Impact:
Users will receive a warning when their mailboxes reach the specified value.
Default Value:
1991680
27 | P a g e
2.2 Set 'Mailbox quotas: Prohibit send and receive at' to '2411520' (Not
Scored)
Profile Applicability:
Description:
Configure this setting to prevent users from sending and receiving e-mail messages after
their mailbox size reaches the specified limit. To specify this limit, select the check box, and
then type the size of the mailbox in kilobytes (KB) at which you want to prohibit the
sending and receiving of e-mail messages and notify the user. You can enter a value
between 0 and 2,147,483,647 KB (2.1 terabytes).
Rationale:
If users exceed their mailbox limits without warning, they may miss important messages
requiring them to take immediate action to mitigate a security risk.
Audit:
Remediation:
Impact:
Users will be unable to send or receive messages when their mailboxes reach the specified
value.
Default Value:
2411520
28 | P a g e
2.3 Set 'Mailbox quotas: Prohibit send at' to '2097152' (Not Scored)
Profile Applicability:
Description:
You can configure this setting to prevent users from sending new e-mail messages after
their mailboxes reach a specified limit. To specify this limit, select the check box for this
capability, and then type the size of the mailbox in kilobytes (KB) at which you want to
prohibit the sending and receiving of e-mail messages and notify the user. You can enter a
value between 0 and 2,147,483,647 KB (2.1 terabytes).
Rationale:
This setting prevents users from sending messages when their mailbox is approaching its
size limit. However, they can continue to receive messages.
Audit:
Remediation:
Impact:
Users will be unable to send messages when their mailboxes reach the specified value.
Default Value:
2097152
29 | P a g e
2.4 Set 'Keep deleted mailboxes for the specified number of days' to '30'
(Scored)
Profile Applicability:
Description:
You can use this setting to specify how long deleted mailboxes are retained before they are
permanently removed from the database. Defining a reasonable retention period facilitates
recovering accidentally deleted mailboxes while controlling the volume of storage that
retained mailboxes require.
Rationale:
Administrators may want to recover accidentally deleted mailboxes or they may need to
recover deliberately deleted mailboxes for legal or managerial reasons.
Audit:
Remediation:
Impact:
The impact should be small: additional storage space will be required for storing deleted
mailboxes until they are purged.
Default Value:
30
30 | P a g e
2.5 Set 'Do not permanently delete items until the database has been
backed up' to 'True' (Scored)
Profile Applicability:
Description:
This setting allows you to ensure that items are not permanently deleted until the database
has been backed up.
Rationale:
To ensure that accidentally deleted items can be recovered, they should not be
permanently deleted until the database is backed up.
Audit:
Remediation:
Impact:
The impact of enabling this setting should be minimal. More storage space will be required
until any pending items are permanently deleted.
Default Value:
False
31 | P a g e
2.6 Set 'Allow simple passwords' to 'False' (Scored)
Profile Applicability:
Description:
You can configure this setting to require strong passwords to unlock mobile devices before
they can connect via ActiveSync to an Exchange server.
Rationale:
Allowing simple passwords can make it easier for an attacker to correctly guess them.
Audit:
Remediation:
Impact:
Default Value:
True
32 | P a g e
2.7 Set 'Enforce Password History' to '4' or greater (Scored)
Profile Applicability:
Description:
Retaining the password history ensures that old passwords will not be reused within a
reasonable timeframe.
Rationale:
The longer a user uses the same password, the greater the chance that an attacker can
determine the password through a brute force attack. Also, any accounts that may have
been compromised will remain exploitable for as long as the password is left unchanged. If
password changes are required but password reuse is not prevented, or if users continually
reuse a small number of passwords, the effectiveness of a good password policy is greatly
reduced. If you specify a low number for this setting, users will be able to use the same
small number of passwords repeatedly.
Audit:
Execute the following cmdlet and ensure DevicePasswordHistory is set to '4' or greater:
Remediation:
Impact:
The major impact of this setting configuration is that it requires users to create a new
password every time they change an old one. Requiring users to change their passwords to
new unique values increases the risk of users writing them down to not forget them.
Another risk is that users may create passwords that change incrementally to make them
easier to remember but also easier to guess. An example of this would be password01,
password02, and so on.
Default Value:
33 | P a g e
2.8 Set 'Password Expiration' to '90' or less (Scored)
Profile Applicability:
Description:
You can configure this setting to specify how long before passwords expire and users must
change them.
Rationale:
The longer a password exists the higher the likelihood that it will be compromised by a
brute force attack, by an attacker gaining general knowledge about the user, or by the user
sharing the password. Configuring this setting to 0 so that users are never required to
change their passwords is a major security risk because doing so allows a compromised
password to be used by a malicious user for as long as the valid user has authorized access
to the system.
Audit:
Execute the following cmdlet and ensure DevicePasswordExpiration is set to '90' or less:
Remediation:
Impact:
Configuring the value of this setting too low requires users to change their passwords very
often. This can reduce security in the organization, because users might write their
passwords in an unsecured location or lose them. Configuring the value of this setting too
high also reduces the level of security in an organization, because it allows potential
attackers more time to discover user passwords or to use compromised accounts.
Default Value:
Unlimited
34 | P a g e
2.9 Set 'Minimum password length' to '4' or greater (Scored)
Profile Applicability:
Description:
You can configure this setting to specify a minimum password length for device passwords.
Long passwords can provide increased security. However, long passwords can decrease
device usability.
Rationale:
Types of password attacks include dictionary attacks that use common words and phrases,
and brute force attacks that use character combinations. Attackers also sometimes try to
obtain an account database so they can use tools to discover accounts and passwords.
Audit:
Execute the following cmdlet and ensure MinDevicePasswordLength is set to '4' or greater:
Remediation:
Impact:
Requirements for extremely long passwords can actually decrease the security of an
organization, because users might leave password information in an unsecured location or
lose it. If very long passwords are required, mistyped passwords could cause account
lockouts and increase help desk calls. If your organization has issues with forgotten
passwords due to password length requirements, consider teaching your users about pass
phrases, which are often easier to remember and, due to the larger number of character
combinations, much harder to discover.
Default Value:
35 | P a g e
2.10 Set 'Configure startup mode' to 'TLS' (Scored)
Profile Applicability:
Description:
Use this setting to start the UM Server in secure mode. This forces all dial plans to use TLS.
Rationale:
Communications between other VOIP systems and Exchange that are not protected by TLS
are vulnerable to being captured by a malicious third party.
Audit:
Remediation:
Impact:
VOIP systems that do not support TLS will be blocked from connecting to your Exchange
servers after this is applied.
Default Value:
TCP
36 | P a g e
2.11 Set 'Refresh interval' to '1' (Scored)
Profile Applicability:
Description:
You can configure this setting to specify how often in hours that policy settings should be
refreshed. Refreshing the policy settings sends a fresh copy of the policy down to devices.
Rationale:
Audit:
Remediation:
Impact:
Clients will attempt to acquire the latest policy at a shorter interval impacting server and
client bandwidth.
Default Value:
Unlimited
37 | P a g e
2.12 Set 'Configure dial plan security' to 'Secured' (Scored)
Profile Applicability:
Description:
Use this setting to protect individual dial plans if the UM Server cannot be started in TLS
Mode. To use this setting, the UM Server must be started in DUAL Mode.
Rationale:
If the UM role is not started in secure mode, each dial plan is individually vulnerable to
traffic being captured by a malicious third party.
Audit:
Remediation:
Impact:
VOIP systems that do not support TLS will be blocked from connecting to your Exchange
servers after this is applied.
Default Value:
Unsecured
38 | P a g e
2.13 Set 'Allow access to voicemail without requiring a PIN' to 'False'
(Scored)
Profile Applicability:
Description:
Use this setting to ensure PIN access to mailbox data via voice is required.
Rationale:
If PINLess access is enabled, the mailbox data is unsecured and vulnerable to capture when
being accessed via the phone
Audit:
Remediation:
Impact:
Default Value:
False
39 | P a g e
2.14 Set 'Retain deleted items for the specified number of days' to '14'
(Scored)
Profile Applicability:
Description:
You can use this setting to specify how long deleted messages are retained before they are
permanently removed from the database. Defining a reasonable retention period facilitates
recovering accidentally deleted messages while controlling the volume of storage that
retained messages require.
Rationale:
Users may want to recover accidentally deleted messages, or administrators may need to
recover deliberately deleted messages for legal or managerial reasons.
Audit:
Execute the following PowerShell cmdlet and ensure DeletedItemRetention is set to '14':
Remediation:
Impact:
The impact should be small: additional storage space will be required for storing deleted
messages until they are purged.
Default Value:
14
40 | P a g e
2.15 Set 'Allow unmanaged devices' to 'False' (Scored)
Profile Applicability:
Description:
This setting determines whether Exchange allow devices that do not accept security policy
updates from the Exchange server to use ActiveSync.
Rationale:
Unmanaged devices are more likely to not comply with an organization's security policies
and to be infected by malicious software.
Audit:
Remediation:
Impact:
Users who configure their devices to block security policy or have devices that cannot
receive security policy will be unable to use ActiveSync to connect to the server.
Default Value:
False
41 | P a g e
2.16 Set 'Require encryption on device' to 'True' (Scored)
Profile Applicability:
Description:
You can use this setting to require device encryption. Configuring this setting to require
device encryption increases security by encrypting all information on the storage cards for
the device.
Rationale:
Audit:
Remediation:
Impact:
Devices that do not support data encryption will be unable to connect to Exchange servers
in your organization.
Default Value:
False
42 | P a g e
2.17 Set 'Time without user input before password must be re-entered'
to '15' (Scored)
Profile Applicability:
Description:
You can configure this setting to prompt the user for a password after the user's device has
been inactive for a specified period of time. For example, if you configure the time period
for this setting to 15 minutes, the user must enter the device password every time it has
been idle for 15 minutes. If the device has been idle less than 15 minutes, the user is not
required to re-enter the password.
Rationale:
Mobile devices are often left unattended or lost in public places. Requiring devices to lock
after 15 minutes minimizes the window of opportunity for an attacker to tamper with a lost
or stolen device.
Audit:
Execute the following PowerShell cmdlet and ensure MaxInactivityTimeLock is set to '15':
Get-MobileDeviceMailboxPolicy -Identity Default | fl -property MaxInactivityTimeLock
Remediation:
Impact:
Users must re-enter their passwords each time their devices remain idle for 15 minutes or
longer.
Default Value:
15
43 | P a g e
2.18 Set 'Require alphanumeric password' to 'True' (Scored)
Profile Applicability:
Description:
Rationale:
Not requiring alphanumeric passwords can make it easier for an attacker to correctly guess
them.
Audit:
Remediation:
Impact:
Default Value:
False
44 | P a g e
2.19 Set 'Require client MAPI encryption' to 'True' (Scored)
Profile Applicability:
Description:
Certificates can reside in the certificate store on a mobile device or on a smart card. A
certificate authentication method uses the Extensible Authentication Protocol (EAP) and
the Transport Layer Security (TLS) protocol. During EAP-TLS certificate authentication, the
client and the server prove their identities to each other. For example, an Exchange
ActiveSync client presents its user certificate to the Client Access server, and the Client
Access server presents its computer certificate to the mobile device to provide mutual
authentication.
Rationale:
Communications between Outlook and Exchange that are sent unencrypted are vulnerable
to being captured by a malicious third party.
Audit:
Execute the following PowerShell cmdlet and ensure EncryptionRequired is set to 'True'
Get-RpcClientAccess | fl -property EncryptionRequired
Remediation:
Impact:
Client computers running earlier versions of Outlook or Outlook with profiles set to not use
encryption will be blocked from connecting to your Exchange servers after this is applied.
Default Value:
False
45 | P a g e
2.20 Set 'Number of attempts allowed' to '10' (Scored)
Profile Applicability:
Description:
Use this setting to restrict the number of failed logon attempts a user can make.
Rationale:
There is a high risk that mobile devices will be lost or stolen. Enforcing this setting reduces
the likelihood that an unauthorized user can guess the password of a device to access data
stored on it.
Audit:
Remediation:
Impact:
If you enable this setting, a locked-out account cannot be used again until an administrator
either resets it or the account lockout duration expires. This setting will likely generate
additional help desk calls. In fact, locked accounts cause the greatest number of help desk
calls in many organizations.
Default Value:
46 | P a g e
2.21 Set 'Require password' to 'True' (Scored)
Profile Applicability:
Description:
Passwords should be necessary to unlock mobile devices because they will help secure
sensitive information stored on the devices in the event of loss or theft.
Rationale:
Allowing users to access devices without passwords means that anyone with physical
access to them can view data on the devices.
Audit:
Execute the following PowerShell cmdlet and ensure PasswordEnabled is set to 'True':
Remediation:
Impact:
Users will have to re-enter their password each time they want to use their device.
Default Value:
False
47 | P a g e
3 Other
This section contains recommendations for miscellaneous items. The following PowerShell
Cmdlet are covered in this section:
Set-ExecutionPolicy
Set-RemoteDomain
Set-OwaVirtualDirectory
Set-AdminAuditLogConfig
Description:
Administrator audit logging is used to provide a log of the settings that are changed by
administrators anywhere in the system. By default this setting is turned on to ensure
discovery of configuration related security breaches.
Rationale:
Audit:
Remediation:
Impact:
The impact should be small: additional storage space will be required and some processing
power will be used to track and record information.
Default Value:
True
48 | P a g e
3.2 Set 'Require Client Certificates' to 'Required' (Not Scored)
Profile Applicability:
Description:
Certificates can reside in the certificate store on a mobile device or on a smart card. A
certificate authentication method uses the Extensible Authentication Protocol (EAP) and
the Transport Layer Security (TLS) protocol. During EAP-TLS certificate authentication, the
client and the server prove their identities to each other. For example, an Exchange
ActiveSync client presents its user certificate to the Client Access server, and the Client
Access server presents its computer certificate to the mobile device to provide mutual
authentication.
Rationale:
The default behavior of Exchange is to only require Basic Authentication. This type of
authentication occurs in plaintext, which increases the possibility that an attacker could
capture a user's credentials. In addition to configuring this setting to require client
certificates, you can further mitigate the risk that the default behavior poses by configuring
IIS to require SSL or TLS user connections to the Exchange servers in your organization.
Audit:
Remediation:
Impact:
Mobile devices will only be able to connect via ActiveSync if they have a trusted client
certificate installed.
Default Value:
Not Configured
References:
1. http://technet.microsoft.com/en-us/library/bb266938%28v=exchg.141%29.aspx
49 | P a g e
3.3 Set 'Turn on script execution' to 'RemoteSigned' (Scored)
Profile Applicability:
Description:
Use this setting to configure the script execution policy that controls what script types
users can run.
Rationale:
Audit:
Remediation:
Impact:
Default Value:
RemoteSigned
50 | P a g e
3.4 Set 'Turn on Administrator Audit Logging' to 'True' (Scored)
Profile Applicability:
Description:
Administrator audit logging is used to provide a log of the settings that are changed by
administrators anywhere in the system. By default this setting is turned on to ensure
discovery of configuration related security breaches.
Rationale:
Audit:
Remediation:
Impact:
The impact should be small: additional storage space will be required and some processing
power will be used to track and record information.
Default Value:
True
51 | P a g e
3.5 Set 'Enable automatic replies to remote domains' to 'False' (Scored)
Profile Applicability:
Description:
You can use this setting to determine if the server automatically replies to remote domains.
Rationale:
Attackers can use automated messages to determine whether a user account is active, in
the office, traveling, and so on. An attacker might use this information to conduct other
types of attacks.
Audit:
Remediation:
Impact:
Default Value:
False
52 | P a g e
3.6 Set 'Allow basic authentication' to 'False' (Scored)
Profile Applicability:
Description:
Use this setting to determine whether you want to allow clients to use basic authentication.
Rationale:
The default behavior of Exchange is to only require Basic Authentication. This type of
authentication occurs in plaintext, which increases the possibility that an attacker could
capture a user's credentials. In addition to configuring this setting to require client
certificates, you can further mitigate the risk that the default behavior poses by configuring
IIS to require SSL or TLS user connections to the Exchange servers in your organization.
Audit:
Remediation:
Impact:
Mobile devices will only be able to connect via ActiveSync if they do not use basic
authentication.
Default Value:
True
53 | P a g e
3.7 Set 'Enable non-delivery reports to remote domains' to 'False'
(Scored)
Profile Applicability:
Description:
You can use this setting to determines if the server automatically sends delivery reports to
remote domains.
Rationale:
Attackers can use automated messages to determine whether a user account is active, in
the office, traveling, and so on. An attacker might use this information to conduct other
types of attacks.
Audit:
Remediation:
Impact:
Default Value:
True
54 | P a g e
3.8 Set 'Enable OOF messages to remote domains' to 'None' (Scored)
Profile Applicability:
Description:
You can use this setting to determine if the server automatically forwards out-of-office
messages to remote domains.
Rationale:
Attackers can use automated messages to determine whether a user is active, in the office,
traveling, and so on. An attacker might use this information to conduct other types of
attacks.
Audit:
Remediation:
Impact:
Default Value:
External
55 | P a g e
3.9 Set 'Enable automatic forwards to remote domains' to 'False'
(Scored)
Profile Applicability:
Description:
You can use this setting to determine if the server sends automatic forwards to remote
domains.
Rationale:
Attackers can use automated messages to determine whether a user account is active, in
the office, traveling, and so on. An attacker might use this information to conduct other
types of attacks.
Audit:
Remediation:
Impact:
Default Value:
False
56 | P a g e
3.10 Set 'Enable S/MIME for OWA 2010' to 'True' (Scored)
Profile Applicability:
Description:
You can enable this setting to allow users to download the S/MIME control to read and
create signed and encrypted messages.
Rationale:
S/MIME uses digital signatures and encryption to protect against several classes of attacks
including eavesdropping, impersonation, and tampering.
Audit:
Remediation:
Impact:
Users will be able to use the S/MIME control when accessing their e-mail via OWA.
Default Value:
True
57 | P a g e
3.11 Set mailbox 'Turn on Administrator Audit Logging' to 'True' (Scored)
Profile Applicability:
Description:
Administrator audit logging is used to provide a log of the settings that are changed by
administrators anywhere in the system. By default this setting is turned on to ensure
discovery of configuration related security breaches.
Rationale:
Audit:
Remediation:
Impact:
The impact should be small: additional storage space will be required and some processing
power will be used to track and record information.
Default Value:
True
58 | P a g e
Appendix: Change History
Date Version Changes for this version
59 | P a g e