EX13-CA-000040 - Exchange must have IIS map client certificates to an approved certificate server.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

For EAS to be used effectively on DoD networks, client certificate authentication must be used for communications between the MEM and email server. Identification and Authentication provide the foundation for access control. IIS must be mapped to an approved certificate server for client certificates. Additionally, the internal and external URLs must be set to the same address, since all EAS traffic must be tunneled to the device from the MEM.

The risk associated with email synchronization with CMD should be mitigated by the introduction of MEM products and is specified in the DoD CIO memo dated 06 Apr 2011. The memo states specifically, 'Email redirection from the email server (e.g., Exchange Server) to the device shall be controlled via centrally managed server.' When EAS is used on DoD networks, the devices must be managed by an MEM.

Solution

Open a command window and enter the following commands:

cd C:\Windows\SysWOW64\InetSrv

appcmd unlock config /section:clientCertificateMappingAuthentication
appcmd set config 'Default Web Site/Microsoft-Server-ActiveSync' -section:clientCertificateMappingAuthentication /enabled:true

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Exchange_2013_Y21M12_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000213, Rule-ID|SV-234772r617257_rule, STIG-ID|EX13-CA-000040, STIG-Legacy|SV-84351, STIG-Legacy|V-69729, Vuln-ID|V-234772

Plugin: Windows

Control ID: ad1f1ee1f4dbdb72390dc0cbae83cec657e6c0efb32e5a95a8519570c35f9b78