Details
Event tracing captures information about applications utilizing the .NET CLR and the .NET CLR itself. This includes security oriented information, such as Strong Name and Authenticode verification.
Beginning with Windows Vista, ETW is enabled by default however, the .Net CLR and .Net applications can be configured to not utilize Event Tracing. If ETW event tracing is disabled, critical events that occurred within the runtime will not be captured in event logs.
Solution
Open Windows explorer and search for all .NET config files including application config files (*.exe.config).
Examine the configuration settings for
Enable ETW Tracing by setting the etwEnable flag to ‘true’ or obtain documented IAO approvals.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Windows.
References
- 800-53|AU-3
- CAT|II
- CCI|CCI-000130
- Rule-ID|SV-225235r615940_rule
- STIG-ID|APPNET0067
- STIG-Legacy|SV-41075
- STIG-Legacy|V-31026
- Vuln-ID|V-225235