From Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide
Part of SRG-APP-000038
Associated with: CCI-001368
Attackers can use automated messages to determine whether a user account is active, in the office, traveling, and so on. An attacker might use this information to conduct future attacks. Ensure Automatic Forwards to remote domains are disabled, except for enterprise email that must be restricted to forward-only to .mil and .gov. domains.
Non-Enterprise Mail Check Content: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, DomainName, Identity, AutoForwardEnabled If the value of "AutoForwardEnabled" is not set to "False", this is a finding. Enterprise Mail Check Content: Open the Exchange Management Shell and enter the following command: Get-RemoteDomain | Select Name, DomainName, Identity, AutoForwardEnabled If the value of "DomainName" is not set to a ".mil" and/or ".gov" domain(s) and the value of "AutoForwardEnabled" is not set to "True", this is a finding.
For Non-Enterprise Mail Fix Text:
Open the Exchange Management Shell and enter the following command:
Set-RemoteDomain -Identity <'IdentityName'> -AutoForwardEnabled $false
Note: The
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer