STIGQter STIGQter: STIG Summary: VMW vSphere 6.5 vCenter Server for Windows Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

The vCenter Server for Windows Administrator role must be secured and assigned to specific users other than a Windows Administrator.

DISA Rule

SV-216852r612237_rule

Vulnerability Number

V-216852

Group Title

SRG-APP-000516

Rule Version

VCWN-65-000030

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Under the computer management console for windows view the local administrators group and remove any users or groups that do not fit the criteria defined in the check content.

Check Contents

If enhanced linked mode is used then local windows authentication is not available to vCenter, this is not applicable.

Under the computer management console for windows view the local administrators group and verify only vCenter administrators have access to the vCenter server.

Other groups and users that are not vCenter administrators should be removed from the local administrators group such as Domain Admins.

If there are any groups or users present in the local administrators group of the vCenter server, this is a finding.

Vulnerability Number

V-216852

Documentable

False

Rule Version

VCWN-65-000030

Severity Override Guidance

If enhanced linked mode is used then local windows authentication is not available to vCenter, this is not applicable.

Under the computer management console for windows view the local administrators group and verify only vCenter administrators have access to the vCenter server.

Other groups and users that are not vCenter administrators should be removed from the local administrators group such as Domain Admins.

If there are any groups or users present in the local administrators group of the vCenter server, this is a finding.

Check Content Reference

M

Target Key

4030

Comments