DISA STIG for Microsoft Dot Net Framework 4.0 v2r4

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG for Microsoft Dot Net Framework 4.0 v2r4

Updated: 7/30/2025

Authority: DISA STIG

Plugin: Windows

Revision: 1.2

Estimated Item Count: 17

Audit Items

DescriptionCategories
APPNET0031 - Digital signatures assigned to strongly named assemblies must be verified.
APPNET0046 - The Trust Providers Software Publishing State must be set to 0x23C00.
APPNET0048 - Developer certificates used with the .NET Publisher Membership Condition must be approved by the ISSO.
APPNET0052 - Encryption keys used for the .NET Strong Name Membership Condition must be protected.
APPNET0055 - CAS and policy configuration files must be backed up.
APPNET0060 - Remoting Services HTTP channels must utilize authentication and encryption.
APPNET0061 - .Net Framework versions installed on the system must be supported.
APPNET0062 - The .NET CLR must be configured to use FIPS approved encryption modules.
APPNET0063 - .NET must be configured to validate strong names on full-trust assemblies.
APPNET0064 - .Net applications that invoke NetFx40_LegacySecurityPolicy must apply previous versions of .NET STIG guidance.
APPNET0065 - Trust must be established prior to enabling the loading of remote code in .Net 4.
APPNET0066 - .NET default proxy settings must be reviewed and approved.
APPNET0067 - Event tracing for Windows (ETW) for Common Language Runtime events must be enabled.
APPNET0070 - Software utilizing .Net 4.0 must be identified and relevant access controls configured.
APPNET0071 - Remoting Services TCP channels must utilize authentication and encryption.
APPNET0075 - Disable TLS RC4 cipher in .Net
DISA_STIG_Microsoft_Dot_Net_Framework_4.0_v2r4.audit from DISA Microsoft DotNet Framework 4.0 v2r4 STIG