STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide

V-259620

CAT II (Medium)

The Exchange Recipient filter must be enabled.

Rule ID

SV-259620r961161_rule

STIG

Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-001308

Discussion

Email system availability depends in part on best practice strategies for setting tuning configurations. Careful tuning reduces the risk that system or network congestion will contribute to availability impacts. Filters that govern inbound email evaluation can significantly reduce spam, phishing, and spoofed emails. Messages from blank senders, known spammers, or zero-day attack modifications must be enabled to be effective.

Check Content

Open the Exchange Management Shell and enter the following command:

Get-RecipientFilterConfig | Select-Object -Property Name, Enabled

If the value of "Enabled" is not set to "True", this is a finding.

Note: The default value is set to "True".

Fix Text

Open the Exchange Management Shell and enter the following command:

Set-RecipientFilterConfig -Enabled $true