Exchange software must be monitored for unauthorized changes.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
|---|---|---|---|---|---|---|
| medium | V-259701 | SRG-APP-000381 | EX19-MB-000197 | SV-259701r1015279_rule | 2025-05-14 | 2 |
| Description |
|---|
| Monitoring software files for changes against a baseline on a regular basis may help detect the possible introduction of malicious code on a system. |
| ℹ️ Check |
|---|
| Review the Email Domain Security Plan (EDSP). Determine whether the site monitors system files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on servers for unauthorized changes against a baseline on a weekly basis. If software files are not monitored for unauthorized changes, this is a finding. Note: An approved and properly configured solution will contain both a list of baselines that includes all system file locations and a file comparison task that is scheduled to run at least weekly. |
| ✔️ Fix |
|---|
| Update the EDSP to specify that the organization monitors system files on servers for unauthorized changes against a baseline on a weekly basis or verify that this information is documented by the organization. Monitor the software files (e.g., *.exe, *.bat, *.com, *.cmd, and *.dll) on Exchange servers for unauthorized changes against a baseline on a weekly basis. Note: This can be done with the use of various monitoring tools. |