STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to AvePoint DocAve 6 Security Technical Implementation Guide

V-253512

CAT I (High)

DocAve must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.

Rule ID

SV-253512r836511_rule

STIG

AvePoint DocAve 6 Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000068

Discussion

Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol. This requirement applies to Transport Layer Security (TLS) gateways (also known as Secure Sockets Layer [SSL] gateways), web servers, and web applications and is not applicable to virtual private network (VPN) devices. DocAve uses HTTPS and NetTcp protocols as the underlying security protocol and thus is in scope for this requirement.

Check Content

Check the .Net Framework version on DocAve servers.
- On the servers where DocAve is installed, open Registry Editor.
- Refer to the official Microsoft document to verify the .Net Framework version supports TLS 1.2. The official Microsoft Document URL is: https://docs.microsoft.com/en-us/mem/configmgr/core/plan-design/security/enable-tls-1-2-client#bkmk_net.
- .NET Framework 4.6.2 or later supports TLS 1.2 inherently.

If the .Net Framework version doesn't support TLS 1.2, this is a finding.

Check that DocAve servers only have TLS 1.2 protocol enabled.
- On the DocAve servers, open Registry Editor.
- Navigate to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols.
- Verify TLS 1.0, TLS 1.1, and any SSL protocols are not enabled.

If TLS 1.0, TLS 1.1, or any SSL protocols are enabled, this is a finding.

Check that DocAve servers have strong cryptography setting enabled.
- On the DocAve servers, open Registry Editor.
- Navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319.
- Verify "SystemDefaultTlsVersions" = dword:00000001 and "SchUseStrongCrypto" = dword:00000001, otherwise this is a finding.

Fix Text

Consult the Microsoft documentation and ensure the .Net Framework on DocAve servers uses a version that supports TLS 1.2. Update if necessary.

Configure the DocAve servers to enable TLS 1.2 protocol only:
- On the DocAve servers, open Registry Editor.
- Navigate to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols.
- Disable TLS 1.0, TLS 1.1, and any SSL protocols if present.

Configure the DocAve servers to enable strong cryptography setting.
- On the DocAve servers, open Registry Editor.
- Navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319 and verify:
"SystemDefaultTlsVersions" = dword:00000001
"SchUseStrongCrypto" = dword:00000001