Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-225235 | APPNET0067 | SV-225235r615940_rule | Medium |
Description |
---|
Event tracing captures information about applications utilizing the .NET CLR and the .NET CLR itself. This includes security oriented information, such as Strong Name and Authenticode verification. Beginning with Windows Vista, ETW is enabled by default however, the .Net CLR and .Net applications can be configured to not utilize Event Tracing. If ETW event tracing is disabled, critical events that occurred within the runtime will not be captured in event logs. |
STIG | Date |
---|---|
Microsoft DotNet Framework 4.0 Security Technical Implementation Guide | 2022-09-13 |
Check Text ( C-26934r468020_chk ) |
---|
Open Windows explorer and search for all .NET config files including application config files (*.exe.config) NOTE: Beginning with Windows Vista and Windows Server 2008, ETW Tracing is enabled by default and the "etwEnable" setting is not required in order for Event Tracing to be enabled. An etwEnable setting of "true" IS required in earlier versions of Windows as ETW is disabled by default. Examine the configuration settings for If the "etwEnable" element is set to "true", this is not a finding. If the "etwEnable" element is set to "false" and documented approvals by the IAO are not provided, this is a finding. |
Fix Text (F-26922r468021_fix) |
---|
Open Windows explorer and search for all .NET config files including application config files (*.exe.config). Examine the configuration settings for Enable ETW Tracing by setting the etwEnable flag to "true" or obtain documented IAO approvals. |