UCF STIG Viewer Logo

Microsoft Dot Net Framework 4.0 STIG



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-30935 Medium .NET must be configured to validate strong names on full-trust assemblies.
V-7061 Medium Windows systems must be configured to prevent application use of Test Root certificates.
V-7069 Medium CAS and policy configuration files must be backed up.
V-30926 Medium The .NET CLR must be configured to use FIPS approved encryption modules.
V-30986 Medium Software utilizing .Net 4.0 must be identified and relevant access controls configured.
V-18395 Medium .Net Framework versions installed on the system must be supported.
V-7063 Medium Developer certificates used with the .NET Publisher Membership Condition must be approved by the IAO.
V-32025 Medium Remoting Services TCP channels must utilize authentication and encryption.
V-31307 Medium Software publishing state table must be configured to only trust items in the users trust database.
V-31212 Medium Windows must be configured to invalidate PKCS #7 version 1 signed objects
V-7062 Medium Windows must check for expired application certificates
V-7070 Medium Remoting Services HTTP channels must utilize authentication and encryption.
V-31026 Medium Event tracing for Windows (ETW) for Common Language Runtime events must be enabled.
V-7066 Medium Windows must be configured to check the time stamp servers certificate for revocation.
V-7067 Medium Encryption keys used for the .NET Strong Name Membership Condition must be protected.
V-30968 Medium Trust must be established prior to enabling the loading of remote code in .Net 4.
V-7065 Medium Windows must be configured to block application execution if certificate server status is unavailable.
V-7064 Medium Windows must be configured to check for revoked application certificates.
V-7055 Medium Digital signatures assigned to strongly named assemblies must be verified.
V-30937 Low .Net applications that invoke NetFx40_LegacySecurityPolicy must apply previous versions of .NET STIG guidance.
V-30972 Low .NET default proxy settings must be reviewed and approved.