| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-228399 | CAT III | MONT-MB-002 | Microsoft Exchange 2016 Mailbox Server S... | The Exchange Receive connector timeout must be lim... | - | |||
Check TextReview the Email Domain Security Plan (EDSP). Determine the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Get-ReceiveConnector | Select Name, Identity, ConnectionTimeout For each Receive connector, if the value of "ConnectionTimeout" is not set to "00:10:00", this is a finding. or If "ConnectionTimeout" is set to other than "00:10:00" and has signoff and risk acceptance in the EDSP, this is not a finding. Fix TextUpdate the EDSP to specify the Connection Timeout value. Open the Exchange Management Shell and enter the following command: Set-ReceiveConnector -Identity <'IdentityName'> -ConnectionTimeout 00:10:00 Note: The <IdentityName> value must be in single quotes. or Enter the value as identified by the EDSP that has obtained a signoff with risk acceptance. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MSExchange2016MB_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: B8810113895A99B17130D8D5D2A5CEDB7A1E6A0E ~~~~~ Default MONT-MB-002 ConnectionTimeout: 00:10:00 Client Proxy MONT-MB-002 ConnectionTimeout: 00:10:00 Default Frontend MONT-MB-002 ConnectionTimeout: 00:10:00 Outbound Proxy Frontend MONT-MB-002 ConnectionTimeout: 00:10:00 Client Frontend MONT-MB-002 ConnectionTimeout: 00:10:00
Source: _Reviewed/MONT-MB-002/Checklist/MONT-MB-002_MSExchange2016MB_V2R6_20251023-152357.ckl
Scan Date: 2026-01-14T12:57:33.455034
Technology Area: Exchange Server
|
||||||||