CIS Microsoft Exchange Server 2010 Benchmark 1.1.0 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Prose - CIS Microsoft Exchange Server 2010 Benchmark v1.1.0
- Center for Internet Security (CIS)
Target:
Target | CPE Name |
---|---|
Microsoft Exchange Server 2010 | cpe:/a:microsoft:exchange_server:2010 (View CVEs) |
Checklist Highlights
- Checklist Name:
- CIS Microsoft Exchange Server 2010 Benchmark
- Checklist ID:
- 503
- Version:
- 1.1.0
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Third Party: Center for Internet Security (CIS)
- Original Publication Date:
- 02/20/2014
Checklist Summary:
This document, Security Configuration Benchmark for Microsoft Exchange Server 2010 SP2, provides prescriptive guidance for establishing a secure configuration posture for Microsoft Exchange Server 2010 SP2 versions. This guide was tested against Microsoft Exchange Server 2010 SP2. To obtain the latest version of this guide, please visit http://benchmarks.cisecurity.org. If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org.
Checklist Role:
- Enterprise Email Server
Known Issues:
Not Provided
Target Audience:
This benchmark is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Microsoft Exchange Server 2010 SP2 on a Microsoft Windows platform.
Target Operational Environment:
- Standalone
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not Provided
Regulatory Compliance:
Not Provided
Comments/Warnings/Miscellaneous:
The CIS community thanks the entire consensus team with special recognition to the following individuals: David Bérubé Microsoft’s Security Compliance Management Toolkit was an excellent resource in the development of this Benchmark. CIS also extends special recognition to the development teams of those resources. Readers are encouraged to download the toolkit to access many great resources, including tools such as GPOAccelerator and DCM Configuration Packs, which aid in the rapid deployment of security configuration policies
Disclaimer:
Not Provided
Product Support:
Not Provided
Point of Contact:
feedback@cisecurity.org
Sponsor:
Center for Internet Security
Licensing:
http://benchmarks.cisecurity.org/downloads/terms-of-use/
Change History:
11/13/2014 - Status updated to Final Updated URL - 7/26/19 updated to 1.1.0 - 1/3/2020
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|