SCOM STIG V-237439

SCOM STIG V-237439 - Do Audit and compliance leave you squinting and looking at documentation with a magnifying glass.
SCOM STIG V-237439 – Do Audit and compliance leave you squinting and looking at documentation with a magnifying glass.

SCOM STIG V-237439: Achieving FIPS 140-2 Compliance in System Center Operations Manager

Published: June 30, 2025
Author: Kevin Justin

System Center Operations Manager (SCOM) environments in US Sovereign government entities  must comply with STIG V-237439 for FIPS 140-2 cryptographic standards.  This post provides a deep technical walkthrough for achieving compliance, referencing the latest SCOM core addendum blog and the official GitHub repository for scripts and automation.

 

🔗 Reference Links

🛡️ Satisfying SCOM STIG V-237439 for FIPS Compliance

STIG V-237439 requires all SCOM servers to be configured for FIPS 140-2 compliance. This involves registry changes, .NET cryptography settings, DLL imports, and web.config edits across SCOM Management Servers, Web Console, Reporting roles, and SQL SSRS servers.

Snapshot of vulnerability from SCOM STIG:

SCOM STIG V-237439 for FIPS compliance from DISA/STIG website.
SCOM STIG V-237439 for FIPS compliance from DISA/STIG website.

 

Step 1: Verify and Enable FIPS Registry Key

On all SCOM Management Servers and SSRS/Reporting role servers, verify the FIPS registry key:

HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy

PowerShell verification:

$RegPath = "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy"
[string]$FIPSEnabled = (Get-ItemProperty -Path $RegPath -Name Enabled).Enabled
if ( $FIPSEnabled -eq 0 ) {write-host "FIPS disabled"}

If FIPS is disabled, set the registry value to 1 and reboot.

Step 2: Update .NET machine.config for Cryptography

Backup and edit machine.config files for .NET Framework versions used by SCOM:

cd "C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG"
copy machine.config machine.config.backup
notepad .\machine.config

Add the following XML between

In Windows Notepad, see example below for empty line at the bottom of the screen shot, between </system.web> and </configuration>:

machine.config windows notepad example with an empty line at the bottom of the notepad, between /system.web and /configuration
machine.config windows notepad example with an empty line at the bottom of the notepad, between /system.web and /configuration

 

Add the following XML

Cryptography XML settings. Does not paste with XML wordpress blog.Proper addition of the cryptography section:

Opened PowerShell as admin > cd directory > then 'notepad machine.config' screenshot of updated XML
Opened PowerShell as admin > cd directory > then ‘notepad machine.config’ screenshot of updated XML

Save file

Repeat update on all relevant .NET Framework versions and architectures (x86/x64).

 

Step 3: Import FIPS DLL to SCOM Web Servers

Install Microsoft.EnterpriseManagement.Cryptography.dll using gacutil.exe:

gacutil.exe /i "D:\path\to\Microsoft.EnterpriseManagement.Cryptography.dll"

Ensure the DLL is present on all SCOM Management Servers with Web Console role, Reporting role, and SQL SSRS servers.

If DOTNET Windows SDK is installed on server, the default path for GACUTIL is: C:\Program Files\Microsoft SDKs\Windows\v6.0A\bin

Example PowerShell to determine path

Open PowerShell as admin

if ( test-path “C:\Program Files\Microsoft SDKs” ) { write-host “Windows SDK NOT installed” }

Example Output

PS C:\Program Files> if ( ( test-path “C:\Program Files\Microsoft SDKs\Windows\v6.0A\bin” ) ne “True” ) { write-host “Windows SDK NOT installed” } Windows SDK NOT installed PS C:\Program Files> cd gacutil.exe /i “D:\\Microsoft.EnterpriseManagement.Cryptography.dll”

 

Step 4: Edit Web Console web.config Files

Edit both WebHost\web.config and MonitoringView\web.config:

      1. Locate the <encryption> tag (not commented out) and add:
        <symmetricAlgorithm iv="SHA256" />
      2. Replace <connection> and <session> lines with:

        For MonitoringView\web.config, ensure the <session> tag is properly closed.

      3. Under <system.web>, add:

Step 5: Reboot and Validate

      • Reboot servers to apply changes.
      • Log in and check for Server Manager errors.
      • Verify SCOM Web Console (https://<SCOMMS>/OperationsManager) and Reporting (https://<SCOMMS>/ReportServer).
      • If issues arise, roll back changes and engage Microsoft support.

Warning – Watch for smart quotes and double quotes!

 Server Manager error seen when added after the </Configuration> element
Server Manager error seen when added after the element

Machine.config file missing Server manager error when added above the element

Machine.config file missing Server manager error when added above the </Configuration> element
Machine.config file missing Server manager error when added above the
element

 

 

🧑‍💻 Expert Commentary & Troubleshooting

FIPS compliance in SCOM is not just a checkbox—it’s a critical requirement for federal and DoD environments. The registry, .NET, and DLL steps ensure cryptographic operations meet FIPS 140-2 standards. Editing web.config files is nuanced; always avoid editing commented sections and ensure XML tags are properly closed to prevent server errors.

For automation, leverage scripts from the GitHub repository and review the SCOM core lessons learned.

💡 Pro Tips for SCOM FIPS STIG Compliance

      • Always backup configuration files before making changes.
      • Test changes in a non-production environment first.
      • Use PowerShell and automation scripts for registry and DLL deployment.
      • Monitor event logs and SCOM health after changes.
      • Engage with the SCOM community for support and updates.

🤝 Community Engagement

Have you implemented SCOM STIG V-237439 for FIPS compliance?

Please share your experience, tips, or challenges in the comments below.

Join the discussion on the SCOM core addendum blog and contribute scripts or feedback to the GitHub repository SCOMCoreAddendum for more deep dives.

Share this post with your team to ensure your SCOM environment is secure and compliant!

SystemCenter 2022 UR3 released

SystemCenter 2022 UR3 released! This image is from Microsoft blog for datacenter
SystemCenter 2022 UR3 released! This image is from Microsoft blog for datacenter

🚀 System Center 2022 UR3 Released: What You Need to Know

Microsoft has officially released System Center 2022 Update Rollup 3 (UR3), and it’s time to update your environments—especially if you’re focused on monitoring with SCOM (System Center Operations Manager).

📅 Support Lifecycle Highlights

    • SCOM 2019: Extended support until 2029
    • SCOM 2022: Extended support begins in 2027
    • SCOM 2025: Extended support starts in 2030, ending in 2035

🔧 SCOM 2022 UR3 Key Fixes

This update brings several important improvements:

    • Fixed Favorite Reports failure in Web Console due to HttpParseException
    • Resolved Teams notifications issues from UR2
    • Addressed random crashes in global search caused by NullReferenceException
    • You can now add Dashboards to Workspace (previously blocked in UR1)
    • Dashboard Performance widget now functions correctly
    • Fixed WMIProbe workflow failures
    • Unix/Linux computers view now opens properly in Web Console

📥 Download & Resources

Technical Deep Dive

UR3 resolves a critical issue where global search in the SCOM console would crash due to a NullReferenceException. This fix improves stability for large-scale deployments. Additionally, the WMIProbe workflow fix ensures smoother data collection from Windows endpoints.

💬 Community Engagement

What’s your favorite fix in UR3?

Share your thoughts in the comments below or join the discussion on Viva Engage ‘Have you applied UR3 yet?’

Pro Tip: Use PowerShell scripts to automate dashboard deployment post-update.

📣 Call to Action

Subscribe to the blog for monthly insights on monitoring, automation, and Microsoft ecosystem updates. Stay ahead with expert tips and community-driven solutions.

🧠 Final Thoughts

System Center 2022 is now on a yearly update cadence, unless urgent security patches are needed. If you’re running SCOM 2022, this UR3 release is a must-have to stabilize and enhance your monitoring capabilities.