Event tracing for Windows (ETW) for Common Language Runtime events must be enabled.
An XCCDF Rule
Description
<VulnDiscussion>Event tracing captures information about applications utilizing the .NET CLR and the .NET CLR itself. This includes security oriented information, such as Strong Name and Authenticode verification. Beginning with Windows Vista, ETW is enabled by default however, the .Net CLR and .Net applications can be configured to not utilize Event Tracing. If ETW event tracing is disabled, critical events that occurred within the runtime will not be captured in event logs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-225235r954774_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
Open Windows explorer and search for all .NET config files including application config files (*.exe.config).
Examine the configuration settings for
<etwEnable enabled="false" />.
Enable ETW Tracing by setting the etwEnable flag to "true" or obtain documented IAO approvals.