V-228395
CAT IIExchange must have anti-spam filtering configured.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 0
Check Text
Review the Email Domain Security Plan (EDSP).
Note: If using another DoD-approved antispam product for email or a DoD-approved email gateway spamming device, such as Enterprise Email Security Gateway (EEMSG), this is not applicable (NA).
Determine the internal SMTP servers.
Open the Exchange Management Shell and enter the following command:
Get-TransportConfig | Format-List InternalSMTPServers
If any internal SMTP server IP address returned does not reflect the list of accepted SMTP server IP addresses, this is a finding.
Fix Text
Note: Configure the IP addresses of every internal SMTP server. If the Mailbox server is the only SMTP server running the antispam agents, configure the IP address of the Mailbox server.
Update the EDSP with the anti-spam mechanism used.
Open the Exchange Management Shell and enter the following command:
Single SMTP server address:
Set-TransportConfig -InternalSMTPServers @{Add='<ip address1>'}
Multiple SMTP server addresses:
Set-TransportConfig -InternalSMTPServers @{Add='<ip address1>','<ip address2>'}
STIG Reference
- STIG
- Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
- Version
- 2
- Release
- 6
- Rule ID
- SV-228395r879653_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONT-MB-002/Checklist/MONT-MB-002_MSExchange2016MB_V2R6_20251023-152357.ckl | Unassigned | 2026-01-14T12:57:33.455034 | View in Context |