STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide

V-228400

CAT II (Medium)

The Exchange application directory must be protected from unauthorized access.

Rule ID

SV-228400r879751_rule

STIG

Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide

Version

V2R6

CCIs

CCI-001812

Discussion

Default product installations may provide more generous access permissions than are necessary to run the application. By examining and tailoring access permissions to more closely provide the least amount of privilege possible, attack vectors that align with user permissions are less likely to access more highly secured areas.

Check Content

Review the Email Domain Security Plan (EDSP) or document that contains this information.

Determine the authorized groups and users that have access to the Exchange application directories.

Verify the access permissions on the directory match the access permissions listed in the EDSP. 

If any group or user has different access permissions, this is a finding. 

Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.

Fix Text

Update the EDSP to specify the authorized groups and users that have access to the Exchange application directories or verify that this information is documented by the organization.

Navigate to the Exchange application directory and remove or modify the group or user access permissions. 

Note: The default installation directory is \Program Files\Microsoft\Exchange Server\V15.