EDCA: Exchange Deployment & Compliance Assessment v0.9 Preview

Source | Data collected: 2026-04-24 08:20 | Report generated: 2026-04-24 08:22 | Executed by: AD\Administrator

Show skipped Dark mode
Edge Transport servers collected and assessed1 Edge Transport server(s) were collected and assessed with role-specific controls: ex1.

Framework Scoreboard

Total

Best Practice

ANSSI

BSI

CIS

CISA

NIS2

DISA

Findings

Data Security (18 controls)
EDCA-DATA-001 No expired Exchange certificates
EDCA-DATA-002 Auth certificate baseline
EDCA-DATA-003 Internal transport certificate baseline
EDCA-DATA-004 Serialized data signing baseline
EDCA-DATA-005 TLS 1.0 and TLS 1.1 are disabled
EDCA-DATA-006 TLS 1.2 is enabled
EDCA-DATA-007 TLS 1.3 is disabled for Exchange compatibility
EDCA-DATA-008 Trusted root certificates baseline
EDCA-DATA-009 IIS HSTS configuration baseline for Exchange sites
EDCA-DATA-010 TLS insecure renegotiation values hardened
EDCA-DATA-011 Weak Schannel ciphers (NULL, DES, RC4, Triple-DES) are explicitly disabled
EDCA-DATA-012 Weak Schannel hash algorithms (MD5, SHA-1) are explicitly disabled
EDCA-DATA-013 Non-forward-secret key exchange (PKCS / static RSA) is explicitly disabled
EDCA-DATA-014 S/MIME is enabled for Outlook Web App
EDCA-DATA-015 RPC client access connections require encryption
EDCA-DATA-016 AES256-CBC encryption mode is enabled for IRM-protected messages
EDCA-DATA-017 Exchange database/log volumes are BitLocker-protected
EDCA-DATA-018 TLS 1.2 approved cipher suite allowlist enforces forward secrecy
EDCA-DATA-019 SchUseStrongCrypto is enabled for .NET Framework
Governance (11 controls)
EDCA-GOV-001 Shared mailbox type consistency
EDCA-GOV-002 Exchange product line lifecycle status
EDCA-GOV-003 EEMS baseline
EDCA-GOV-004 Exchange Hybrid Application baseline
EDCA-GOV-005 Mailbox database issue-warning quota is configured
EDCA-GOV-006 Mailbox database prohibit-send-receive quota is configured
EDCA-GOV-007 Mailbox database prohibit-send quota is configured
EDCA-GOV-008 Exchange Send Fatal Errors to Microsoft is disabled
EDCA-GOV-009 Exchange Customer Experience Improvement Program (CEIP) is disabled
EDCA-GOV-010 Exchange mail quota settings do not block mail flow
EDCA-GOV-011 Exchange software baseline is documented and monitored for unauthorized changes
EDCA-GOV-012 Exchange services are documented and unnecessary services are disabled
Identity and Access Control (26 controls)
EDCA-IAC-001 UPN matches primary SMTP address
EDCA-IAC-002 Exchange computer membership baseline
EDCA-IAC-003 NTLMv2 authentication enforcement baseline
EDCA-IAC-004 Modern Authentication is configured
EDCA-IAC-005 RDP requires Network Level Authentication
EDCA-IAC-006 WDigest UseLogonCredential disabled
EDCA-IAC-007 Alternate Service Account (ASA) usage follows Kerberos best practice
EDCA-IAC-008 Exchange split permissions are enabled
EDCA-IAC-009 Basic Authentication is disabled after Modern Authentication rollout
EDCA-IAC-010 Administrative access to EAC and remote PowerShell is restricted
EDCA-IAC-011 Dedicated hybrid app is used by EvoSTS AuthServer
EDCA-IAC-012 Windows Integrated Authentication (NTLM/Negotiate) is present on Exchange virtual directories
EDCA-IAC-013 OWA forms-based authentication is configured per version requirements
EDCA-IAC-014 Mobile device mailbox policy does not allow simple passwords
EDCA-IAC-015 Mobile device mailbox policy does not allow unmanaged devices
EDCA-IAC-016 Mobile device mailbox policy enforces password history of 4 or more
EDCA-IAC-017 Mobile device mailbox policy requires a minimum password length of 4 or more
EDCA-IAC-018 Mobile device mailbox policy limits maximum failed password attempts to 10 or fewer
EDCA-IAC-019 Mobile device mailbox policy requires password expiration of 365 days or less
EDCA-IAC-020 Mobile device mailbox policy refresh interval is 1 day or less
EDCA-IAC-021 Mobile device mailbox policy requires an alphanumeric password
EDCA-IAC-022 Mobile device mailbox policy requires device encryption
EDCA-IAC-023 Mobile device mailbox policy requires a device password
EDCA-IAC-024 Mobile device mailbox policy locks after 15 minutes of inactivity
EDCA-IAC-026 Kerberos AES encryption is enforced; RC4 and DES are disabled
EDCA-IAC-027 Exchange computer accounts do not have unconstrained Kerberos delegation
EDCA-IAC-028 Domain object DACL WriteDACL ACEs carry the Inherit-Only flag
Monitoring (14 controls)
EDCA-MON-001 Admin audit logging enabled and configured
EDCA-MON-002 PowerShell Script Block Logging enabled
EDCA-MON-003 Server pending reboot cleared
EDCA-MON-004 Transport connectivity logging is enabled
EDCA-MON-005 Transport message tracking logging is enabled
EDCA-MON-006 Transport message subject logging is disabled
EDCA-MON-007 Receive connector protocol logging is set to Verbose
EDCA-MON-008 Send connector protocol logging is set to Verbose
EDCA-MON-009 Exchange transport queue monitoring is configured
EDCA-MON-010 Exchange audit data is protected from unauthorized access
EDCA-MON-011 Exchange audit data resides on a separate partition
EDCA-MON-012 Exchange diagnostic event log levels are set to Lowest
EDCA-MON-013 Windows Advanced Audit Policy is configured
EDCA-MON-014 PowerShell Module Logging is enabled
Performance (13 controls)
EDCA-PERF-001 CTS processor affinity baseline
EDCA-PERF-002 High Performance power plan is active
EDCA-PERF-003 Hyper-Threading/SMT not enabled
EDCA-PERF-004 NodeRunner memory limit baseline
EDCA-PERF-005 NUMA BIOS baseline
EDCA-PERF-006 Processor socket count and logical core baseline
EDCA-PERF-007 Receive Side Scaling (RSS) enabled
EDCA-PERF-008 Single page file configuration
EDCA-PERF-009 Sleepy NIC baseline
EDCA-PERF-010 TCP/IP settings baseline
EDCA-PERF-011 VMXNET3 adapter health baseline (ESX)
EDCA-PERF-012 Exchange-to-DC/GC processor core ratio does not exceed 8:1
EDCA-PERF-013 Page file initial and maximum size match Exchange version baseline
EDCA-PERF-014 Memory meets Exchange version and role requirements
EDCA-PERF-015 Processor cores meet Exchange version and role requirements
EDCA-PERF-016 TcpAckFrequency is at its default value on all IP-enabled network adapters
EDCA-PERF-017 VMware NSX Introspection drivers are not running
Platform Security (42 controls)
EDCA-SEC-001 MAPI over HTTP is enabled
EDCA-SEC-002 .NET Framework version compatible with Exchange
EDCA-SEC-003 AD Domain functional level compatible with Exchange
EDCA-SEC-004 AD Forest functional level compatible with Exchange
EDCA-SEC-005 AD site count baseline
EDCA-SEC-006 Setting overrides baseline
EDCA-SEC-007 Visual C++ redistributable version baseline
EDCA-SEC-008 Exchange database/log volume block size is 64KB
EDCA-SEC-009 Exchange database/log volumes use NTFS or ReFS
EDCA-SEC-010 OS volume filesystem is NTFS
EDCA-SEC-011 RPC minimum connection timeout baseline
EDCA-SEC-012 AMSI integration baseline
EDCA-SEC-013 Credential Guard disabled on Exchange servers
EDCA-SEC-014 Extended Protection enabled on Exchange virtual directories
EDCA-SEC-015 FIP-FS baseline
EDCA-SEC-016 IIS web.config baseline
EDCA-SEC-017 IPv6 enabled baseline
EDCA-SEC-018 LLMNR disabled by policy
EDCA-SEC-019 Microsoft Defender antivirus exclusions configured for Exchange
EDCA-SEC-020 OWA Download Domains configured
EDCA-SEC-021 POP3 and IMAP services disabled unless explicitly required
EDCA-SEC-022 PowerShell execution policy is not unrestricted
EDCA-SEC-023 SMBv1 server protocol is disabled
EDCA-SEC-024 Vulnerability baseline
EDCA-SEC-025 Windows Firewall enabled for all profiles
EDCA-SEC-026 Microsoft Defender real-time protection enabled
EDCA-SEC-027 IIS loaded modules are signed and trusted
EDCA-SEC-028 Dynamic memory disabled for virtualized Exchange hosts
EDCA-SEC-029 MSMQ feature not installed on Exchange hosts
EDCA-SEC-030 DisableAsyncNotification reset to baseline
EDCA-SEC-031 TokenCacheModule loaded status reviewed
EDCA-SEC-032 P2 FROM header manipulation detection is not disabled
EDCA-SEC-033 Transport pickup directory path is not configured
EDCA-SEC-034 Exchange anti-spam filtering is installed, enabled, and configured
EDCA-SEC-035 Exchange application directory is protected from unauthorized access
EDCA-SEC-036 Exchange email application does not share a partition with another application
EDCA-SEC-037 LDAP client signing is set to require signing
EDCA-SEC-038 Exchange has the most current approved update installed
EDCA-SEC-039 Exchange built-in Malware Agent is properly configured for the Exchange version
EDCA-SEC-040 Exchange database/log volumes are formatted with ReFS
EDCA-SEC-041 LAPS is deployed for local administrator accounts
EDCA-SEC-042 NetBIOS over TCP/IP is disabled on all network interfaces
EDCA-SEC-043 SMB packet signing is required on server and client
Resilience (10 controls)
EDCA-RES-001 Core Exchange services are running
EDCA-RES-002 Unified content cleanup baseline
EDCA-RES-003 Replication health checks pass
EDCA-RES-004 Mailbox database deleted item retention is at least 14 days
EDCA-RES-005 Mailbox database deleted mailbox retention is at least 30 days
EDCA-RES-006 Mailbox database is not permanently deleted until it has been backed up
EDCA-RES-007 Exchange circular logging is disabled
EDCA-RES-008 Exchange mailbox databases reside on a dedicated partition
EDCA-RES-009 Exchange mailbox stores mount at startup
EDCA-RES-010 Exchange mailbox databases are in a highly available and redundant configuration
EDCA-RES-011 Single Item Recovery enabled on user mailboxes
EDCA-RES-012 DAG members span at least two Active Directory sites
Transport Security (48 controls)
EDCA-TLS-001 Receive connector internal and external relay patterns are separated
EDCA-TLS-002 Transport retry configuration baseline
EDCA-TLS-003 Hybrid send connector TLS integrity
EDCA-TLS-004 Automatic forwarding to all remote domains is disabled
EDCA-TLS-005 Automatic replies to remote domains are disabled
EDCA-TLS-006 Non-delivery reports to remote domains are disabled
EDCA-TLS-007 Out-of-Office messages to remote domains are set to None
EDCA-TLS-008 Organization-wide maximum send message size is 25 MB or less
EDCA-TLS-009 Organization-wide maximum receive message size is 25 MB or less
EDCA-TLS-010 External send connector uses DNS routing
EDCA-TLS-011 External send connector does not ignore STARTTLS
EDCA-TLS-012 Send connector maximum message size is 25 MB or less
EDCA-TLS-013 Receive connector maximum message size is 25 MB or less
EDCA-TLS-014 External send connector has domain security enabled
EDCA-TLS-015 Exchange Receive Connector maximum hop count is 60
EDCA-TLS-016 Exchange transport service maximum outbound connections is 1000
EDCA-TLS-017 Exchange outbound connection limit per domain is controlled
EDCA-TLS-018 Exchange outbound connection timeout is 10 minutes or less
EDCA-TLS-019 Exchange global recipient count limit is set
EDCA-TLS-020 Exchange receive connector connection timeout is limited
EDCA-TLS-021 Exchange internal receive connectors require encryption
EDCA-TLS-022 Exchange receive connectors control the number of recipients per message
EDCA-TLS-023 Accepted domains publish enforcing DMARC records
EDCA-TLS-024 Accepted domains publish SMTP DANE TLSA for MX hosts
EDCA-TLS-025 Accepted domains publish valid MTA-STS policies
EDCA-TLS-026 Accepted domains publish valid SPF records
EDCA-TLS-027 DKIM signing is enabled for all accepted domains
EDCA-TLS-028 Accepted domains publish a valid TLS-RPT record
EDCA-TLS-029 Hybrid receive connector TLS integrity
EDCA-TLS-030 Edge subscription is active and valid
EDCA-TLS-031 Edge anti-spam agents are enabled
EDCA-TLS-032 Edge recipient validation is enabled
EDCA-TLS-033 Edge blank sender blocking is enabled
EDCA-TLS-034 Edge outbound send connectors require TLS
EDCA-TLS-035 Edge send connector protocol logging is Verbose
EDCA-TLS-036 Edge SMTP certificate has the SMTP service assigned
EDCA-TLS-037 Edge Receive connectors have domain secure enabled
EDCA-TLS-038 Edge internet-facing Receive connectors offer TLS before basic authentication
EDCA-TLS-039 Edge internal Receive connectors require TLS encryption
EDCA-TLS-040 Edge internal Receive connectors disallow anonymous connections
EDCA-TLS-041 SMTP banner must not reveal server version details
EDCA-TLS-042 Edge internet-facing Send connectors route via a Smart Host
EDCA-TLS-043 Edge internal Send connectors use mutual-TLS domain security
EDCA-TLS-044 Edge Sender Filter blocks messages from unaccepted domains
EDCA-TLS-045 Edge Sender Reputation filter is enabled
EDCA-TLS-046 Edge content filter is enabled
EDCA-TLS-047 Edge Sender ID filter rejects malformed From addresses
EDCA-TLS-048 Edge Receive connector tarpitting interval is configured