STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide

V-259694

CAT II (Medium)

Exchange antimalware agent must be enabled and configured.

Rule ID

SV-259694r1015276_rule

STIG

Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-004964CCI-002624CCI-001247

Discussion

Microsoft Exchange 2019 offers built-in antimalware protection for messages going through the transport pipeline. When enabled, the default settings are configured to automatically update. Exchange's built-in Malware Agent is not designed to address all malicious code protection workloads. This workload is best handled by third-party antivirus and intrusion prevention software. Sites must use an approved DOD scanner. Exchange Malware software has a limited scanning capability and does not scan files that are downloaded, opened, or executed.

Check Content

Open the Exchange Management Shell and run the following cmdlets:

Get-TransportAgent "Malware Agent"

If the identity "Malware Agent" is not set to "Enabled", this is a finding.

Fix Text

Open the Exchange Management Shell and run the following command:

& $env:ExchangeInstallPath\Scripts\Enable-AntimalwareScanning.ps1

This will automatically enable the anti-malware agent. After the script completes, run the following cmdlet to complete the process:

Restart-Service MSExchangeTransport

This may take up to 10 minutes to take effect.