STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide

V-228360

CAT III (Low)

Exchange Circular Logging must be disabled.

Rule ID

SV-228360r879566_rule

STIG

Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide

Version

V2R6

CCIs

CCI-000133

Discussion

Logging provides a history of events performed and can also provide evidence of tampering or attack. Failure to create and preserve logs adds to the risk that suspicious events may go unnoticed and raises the potential that insufficient history will be available to investigate them. This setting controls how log files are written. If circular logging is enabled, one log file is stored with a default size of 1024 KB. Once the size limit has been reached, additional log entries overwrite the oldest log entries. If circular logging is disabled, once a log file reaches the size limit, a new log file is created. Mailbox should not use circular logging. Logs should be written to a partition separate from the operating system, with log protection and backups being incorporated into the overall System Security Plan.

Check Content

Open the Exchange Management Shell and enter the following command:

Get-MailboxDatabase | Select Name, Identity, CircularLoggingEnabled

If the value of "CircularLoggingEnabled" is not set to "False", this is a finding.

Fix Text

Open the Exchange Management Shell and enter the following command:

Set-MailboxDatabase -Identity <'IdentityName'> -CircularLoggingEnabled $false

Note: The <IdentityName> value must be in single quotes.