EX19-MB-000021 Exchange auto-forwarding email to remote domains must be disabled or restricted.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Verify Automatic Forwards to remote domains are disabled, except for enterprise mail that must be restricted to forward only to .mil and .gov. domains.

Before enabling this setting, configure a remote domain.

Solution

For Non-Enterprise Mail:

Open the Exchange Management Shell and enter the following command:

Set-RemoteDomain -Identity <'IdentityName'> -AutoForwardEnabled $false

Note: The <IdentityName> value must be in quotes.

For Enterprise Mail:

New-RemoteDomain -Name <NewRemoteDomainName> -DomainName <SMTP Address>

Note: <NewRemoteDomainName> must either be a .mil or .gov domain.

Set-RemoteDomain -Identity <'RemoteDomainIdentity'> -AutoForwardEnabled $true

Note: The <RemoteDomainIdentity> value must be in quotes.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Exchange_2019_Y24M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001368, Rule-ID|SV-259651r960801_rule, STIG-ID|EX19-MB-000021, Vuln-ID|V-259651

Plugin: Windows

Control ID: cc0d3f2d195a3d87564dc9d6509802f01fb8a301a4395c8b82d9f663e0f22748