STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide

V-259694

CAT II (Medium)

Exchange antimalware agent must be enabled and configured.

Rule ID

SV-259694r1015276_rule

STIG

Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-004964CCI-002624CCI-001247

Discussion

Microsoft Exchange 2019 offers built-in antimalware protection for messages going through the transport pipeline. When enabled, the default settings are configured to automatically update. Exchange's built-in Malware Agent is not designed to address all malicious code protection workloads. This workload is best handled by third-party antivirus and intrusion prevention software. Sites must use an approved DOD scanner. Exchange Malware software has a limited scanning capability and does not scan files that are downloaded, opened, or executed.

Check Content

Open the Exchange Management Shell and run the following cmdlets:

Get-TransportAgent "Malware Agent"

If the identity "Malware Agent" is not set to "Enabled", this is a finding.

Fix Text

Open the Exchange Management Shell and run the following command:

& $env:ExchangeInstallPath\Scripts\Enable-AntimalwareScanning.ps1

This will automatically enable the anti-malware agent. After the script completes, run the following cmdlet to complete the process:

Restart-Service MSExchangeTransport

This may take up to 10 minutes to take effect.