EX16-ED-000180 - Exchange Internet-facing Receive connectors must offer Transport Layer Security (TLS) before using basic authentication.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Sending unencrypted email over the Internet increases the risk that messages can be intercepted or altered. TLS is designed to protect confidentiality and data integrity by encrypting email messages between servers and thereby reducing the risk of eavesdropping, interception, and alteration. This setting forces Exchange to offer TLS before using basic authentication.

Solution

Open the Exchange Management Shell and enter the following command:

Set-ReceiveConnector -Identity <'IdentityName'> -AuthMechanism 'Tls, BasicAuth, BasicAuthRequireTLS'

Note: The <IdentityName> value must be in single quotes.

Example only for the Identity: <ServerName>\Frontend <ServerName>

Repeat the procedure for each receive connector.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Exchange_2016_Y20M10_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1), CAT|II, CCI|CCI-001184, Rule-ID|SV-221219r508017_rule, STIG-ID|EX16-ED-000180, STIG-Legacy|SV-95229, STIG-Legacy|V-80519, Vuln-ID|V-221219

Plugin: Windows

Control ID: fb7c1eab3e8f9b3d6abeaa6f34e9c2e4ba14725428de40037f45940998e50f4b