UCF STIG Viewer Logo

Microsoft Dot Net Framework 4.0 STIG



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-31307 Medium Software publishing state table must be configured to only trust items in the users trust database.
V-30926 Medium The .NET CLR must be configured to use FIPS approved encryption modules.
V-31212 Medium Windows must be configured to invalidate PKCS #7 version 1 signed objects
V-7062 Medium Windows must check for expired application certificates
V-31026 Medium Event tracing for Windows (ETW) for Common Language Runtime events must be enabled.
V-7061 Medium Windows systems must be configured to prevent application use of Test Root certificates.
V-7066 Medium Windows must be configured to check the time stamp servers certificate for revocation.
V-7064 Medium Windows must be configured to check for revoked application certificates.
V-7065 Medium Windows must be configured to block application execution if certificate server status is unavailable.
V-7055 Medium Digital signatures assigned to strongly named assemblies must be verified.