5.1 Disable DCUI to prevent local administrative control | CONFIGURATION MANAGEMENT |
5.6 Remove keys from SSH authorized_keys file | SYSTEM AND INFORMATION INTEGRITY |
5.10 Verify contents of exposed configuration files | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
6.4 Zero out VMDK files prior to deletion | CONFIGURATION MANAGEMENT |
8.1.2 Limit sharing of console connections | ACCESS CONTROL |
8.2.1 Disconnect unauthorized devices - Floppy Devices | MEDIA PROTECTION |
8.2.2 Disconnect unauthorized devices - CD/DVD Devices | |
8.2.3 Disconnect unauthorized devices - Parallel Devices | CONFIGURATION MANAGEMENT |
8.2.4 Disconnect unauthorized devices - Serial Devices | CONFIGURATION MANAGEMENT |
8.2.5 Disconnect unauthorized devices - USB Devices | MEDIA PROTECTION |
8.4.5 Disable Autologon | ACCESS CONTROL |
8.4.6 Disable BIOS BBS | CONFIGURATION MANAGEMENT |
8.4.7 Disable Guest Host Interaction Protocol Handler | CONFIGURATION MANAGEMENT |
8.4.8 Disable Unity Taskbar | CONFIGURATION MANAGEMENT |
8.4.9 Disable Unity Active | CONFIGURATION MANAGEMENT |
8.4.10 Disable Unity Window Contents | CONFIGURATION MANAGEMENT |
8.4.11 Disable Unity Push Update | CONFIGURATION MANAGEMENT |
8.4.12 Disable Drag and Drop Version Get | CONFIGURATION MANAGEMENT |
8.4.13 Disable Drag and Drop Version Set | CONFIGURATION MANAGEMENT |
8.4.14 Disable Shell Action | CONFIGURATION MANAGEMENT |
8.4.15 Disable Request Disk Topology | CONFIGURATION MANAGEMENT |
8.4.16 Disable Trash Folder State | CONFIGURATION MANAGEMENT |
8.4.17 Disable Guest Host Interaction Tray Icon | CONFIGURATION MANAGEMENT |
8.4.18 Disable Unity | CONFIGURATION MANAGEMENT |
8.4.19 Disable Unity Interlock | CONFIGURATION MANAGEMENT |
8.4.20 Disable GetCreds | CONFIGURATION MANAGEMENT |
8.4.21 Disable Host Guest File System Server | CONFIGURATION MANAGEMENT |
8.4.22 Disable Guest Host Interaction Launch Menu | CONFIGURATION MANAGEMENT |
8.4.23 Disable memSchedFakeSampleStats | CONFIGURATION MANAGEMENT |
8.4.29 Disable all but VGA mode on virtual machines. | SYSTEM AND COMMUNICATIONS PROTECTION |
8.5.1 Prevent virtual machines from taking over resources - CPU Share Level | SYSTEM AND COMMUNICATIONS PROTECTION |
8.5.1 Prevent virtual machines from taking over resources - Mem Share Level | SYSTEM AND COMMUNICATIONS PROTECTION |
8.5.1 Prevent virtual machines from taking over resources - Num Mem Shares | SYSTEM AND COMMUNICATIONS PROTECTION |
8.6.1 Avoid using nonpersistent disks | AUDIT AND ACCOUNTABILITY |
8.7.1 Disable VIX messages from the VM | CONFIGURATION MANAGEMENT |
8.7.3 Do not send host information to guests | SYSTEM AND COMMUNICATIONS PROTECTION |
CIS VMware ESXi 5.5 v1.2.0 Level 2 | CONFIGURATION MANAGEMENT |