STIGQter STIGQter: STIG Summary: VMware vCenter Server Version 5 Security Technical Implementation Guide Version: 1 Release: 7 Benchmark Date: 22 Apr 2016: The vCenter Server must be installed using a service account instead of a built-in Windows account.

DISA Rule

SV-51406r1_rule

Vulnerability Number

V-39548

Group Title

ESXi5-407

Rule Version

VCENTER-000008

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Re-install the vCenter Server with a special-purpose, local-only administrator role with the "Act as part of the operating system" privilege.

Check Contents

Verify vCenter Server was installed using a special-purpose user account on the Windows host with a local-only administrator role. This account should have the "Act as part of the operating system" privilege, and write access to the local file system with a local-only administrator role.

If the vCenter Server was not installed with a special-purpose, local-only administrator role with the "Act as part of the operating system" privilege, this is a finding.

Vulnerability Number

V-39548

Documentable

False

Rule Version

VCENTER-000008

Severity Override Guidance

Verify vCenter Server was installed using a special-purpose user account on the Windows host with a local-only administrator role. This account should have the "Act as part of the operating system" privilege, and write access to the local file system with a local-only administrator role.

If the vCenter Server was not installed with a special-purpose, local-only administrator role with the "Act as part of the operating system" privilege, this is a finding.

Check Content Reference

M

Target Key

2435

Comments