EX16-MB-000590 - Exchange software must be monitored for unauthorized changes.

Information

Monitoring software files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Update the EDSP to specify that the organization monitors system files on servers for unauthorized changes against a baseline on a weekly basis or verify that this information is documented by the organization.

Monitor the software files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on Exchange servers for unauthorized changes against a baseline on a weekly basis.

Note: This can be done with the use of various monitoring tools.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Exchange_2016_Y24M01_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-5(1), CAT|II, CCI|CCI-001814, Rule-ID|SV-228402r928977_rule, STIG-ID|EX16-MB-000590, STIG-Legacy|SV-95441, STIG-Legacy|V-80731, Vuln-ID|V-228402

Plugin: Windows

Control ID: a5797d1eb5ac296756c383427eb80507c1f1759b71a544299e0134a39a479066