EX13-CA-000025 - Exchange must have Administrator audit logging enabled.

Information

Unauthorized or malicious data changes can compromise the integrity and usefulness of the data. Automated attacks or malicious users with elevated privileges have the ability to affect change using the same mechanisms as email administrators.

Auditing changes to access mechanisms not only supports accountability and non-repudiation for those authorized to define the environment but also enables investigation of changes made by others who may not be authorized.

Note: This administrator auditing feature audits all exchange changes regardless of the users' assigned role or permissions.

Solution

Open the Exchange Management Shell and enter the following command:

Set-AdminAuditLogConfig -AdminAuditLogEnabled $true

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Exchange_2013_Y24M07_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2(4), CAT|II, CCI|CCI-001403, Rule-ID|SV-234769r960780_rule, STIG-ID|EX13-CA-000025, STIG-Legacy|SV-84345, STIG-Legacy|V-69723, Vuln-ID|V-234769

Plugin: Windows

Control ID: 4a681e9261c20771687a8e48f019b654658141fe61db0672e5d93edc239772a3