We recently installed Solarwinds NPM to a pre-hardened Windows 2012 R2 installation. This pre-hardened image was already configured to be FIPS compliant. After installing NPM we performed STIG compliance checks on the machine. We discovered that there were two checklist items in the Microsoft Dot Net Framework 4.0 STIG checklist that it failed. The first was checklist item v-30926. This one has us perform the following check:
"Examine the .NET CLR configuration files from the vulnerability discussion to find the runtime element and then the "enforceFIPSPolicy" element.
Example:
<configuration>
<runtime>
<enforceFIPSPolicy enabled="true|false" />
</runtime>
</configuration>
By default, the .NET "enforceFIPSPolicy" element is set to "true".
If the "enforceFIPSPolicy" element does not exist within the "runtime" element of the CLR configuration, this is not a finding.
If the "enforceFIPSPolicy" element exists and is set to "false", and the IAO has not accepted the risk and documented the risk acceptance, this is a finding. "
We discovered that the enforceFIPSPolicy parameter had been changed to false in the Common Language Runtime configuration. Does the SolarWinds installation make this change?
The second checklist item that it failed was v-30968. This checklist item has us perform the following check:
"Open Windows explorer and search for *.exe.config.
Search each config file found for the "loadFromRemoteSources" element.
If the loadFromRemoteSources element is enabled
("loadFromRemoteSources enabled = true"), and the remotely loaded application is not run in a sandboxed environment, or if OS based software controls, such as AppLocker or Software Security Policies, are not utilized, this is a finding."
We discovered that the Orion.ActiveDiagnostics.exe.config file has the "loadFromRemoteSources enabled = true" set. Is this typical as well?
Thanks!