EX19-MB-000007 Exchange must use encryption for Outlook Web App (OWA) access.

Information

This setting controls whether client machines should be forced to use secure channels to communicate with this virtual directory. If this feature is enabled, clients will only be able to communicate with the directory if they are capable of supporting secure communication with the server.

The use of secure communication prevents eavesdroppers from reading or modifying communications between servers and clients. The network and DMZ STIG identify criteria for OWA and Public Folder configuration in the network, including Common Access Card (CAC)-enabled preauthentication through an application firewall proxy.

Failure to require secure connections on a website increases the potential for unintended eavesdropping or data loss.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Ensure a trusted public certificate is installed for the Exchange server with the correct FQDNs that will service the domain. This will allow secure communications between clients and the server. This should be done before the server is put into production.

Once installed, in an elevated Exchange Management Shell, run the following cmdlet to associate the certificate with the IIS service:

Enable-ExchangeCertificate -Thumbprint <thumbprint of public cert> -Services IIS

Set the OWA URL to use HTTPS instead of HTTP by updating the URLs to HTTPS.

If the website is 'http://mail.contoso.com' for both internal and external (for example), run the following cmdlet to set it to HTTPS:

Set-OwaVirtualDirectory -Identity '<Server>\owa (Default Web Site) -InternalUrl 'https://mail.contoso.com/owa' -ExternalUrl 'https://mail.contoso.com/owa'

Note: If this change is made, it must be done for the ECP virtual directory as well. A warning notifies users that this must be done.

Open IIS Manager and locate the Exchange Server. In the navigation pane on the left, navigate to Sites >> Default Web Site >> owa. In the pane on the right, under /owa Home, in the IIS section, double-click 'SSL Settings'.

Check the box for 'Require SSL'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Exchange_2019_Y24M07_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(2), CAT|II, CCI|CCI-000068, Rule-ID|SV-259646r960759_rule, STIG-ID|EX19-MB-000007, Vuln-ID|V-259646

Plugin: Windows

Control ID: bc1067b085ec67b9cdae529adb2dc778f3da50ffc4a046121b00971b6d6359a8