EX13-CA-000110 - Exchange must have the Microsoft Active Sync directory removed.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

To reduce the vectors through which a server can be attacked, unneeded application components should be disabled or removed. By default, a virtual directory is installed for Active Sync, and the Exchange application default has Active Sync disabled.

If an attacker were to intrude into an Exchange CA server and reactivate Active Sync, this attack vector could once again be open, provided the virtual directory is present.

Once removed, the Active Sync functionality cannot be used without restoring the virtual directory, not a trivial process.

Solution

Open an Exchange Command Shell and enter the following command:

Remove-ActiveSyncVirtualDirectory <ServerName>\Microsoft-Server-ActiveSync -Confirm $true

Note: The physical directory must also be deleted.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Exchange_2013_CAS_V1R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|III, CCI|CCI-000381, Rule-ID|SV-84381r1_rule, STIG-ID|EX13-CA-000110, Vuln-ID|V-69759

Plugin: Windows

Control ID: b866af4f92fedcee03f5e3cefc51fa493ca3c8327c05f225426a399d3281423e