STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Microsoft DotNet Framework 4.0 Security Technical Implementation Guide

V-225234

CAT III (Low)

.NET default proxy settings must be reviewed and approved.

Rule ID

SV-225234r1188289_rule

STIG

Microsoft DotNet Framework 4.0 Security Technical Implementation Guide

Version

V2R8

CCIs

CCI-000366

Discussion

The .Net framework can be configured to utilize a different proxy or altogether bypass the default proxy settings in the client's browser. This may lead to the framework using a proxy that is not approved for use. If the proxy is malicious, this could lead to a loss of application integrity and confidentiality.

Check Content

Open Windows explorer and search for all "*.exe.config" and "machine.config" files.

The referenced file is in the WinSxS directory (original source component file used when the Windows component was installed).

If the files under WinSxS are read-only and cannot be modified, this is not a finding.

Search each file for the "defaultProxy" element.

<defaultProxy
  enabled="true|false"
  useDefaultCredentials="true|false"
  <bypasslist> … </bypasslist>
  <proxy> … </proxy>
  <module> … </module>
/>

If the "defaultProxy" setting "enabled=false" or if the "bypasslist", "module", or "proxy" child elements have configuration entries and there are no documented approvals from the authorizing official (AO), this is a finding.

If the "defaultProxy" element is empty or if "useSystemDefault =True” then the framework is using default browser settings, this is not a finding.

Fix Text

Open Windows explorer and search for all "*.exe.config" and "machine.config" files.

Search each file for the "defaultProxy" element.

Clear the values contained in the "defaultProxy" element, and the "bypasslist", "module", and "proxy" child elements.

The IAO must provide documented approvals of any non-default proxy servers.