ESXI-67-000002 - The ESXi host must verify the DCUI.Access list.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Lockdown mode disables direct host access, requiring that administrators manage hosts from vCenter Server. However, if a host becomes isolated from vCenter Server, the administrator is locked out and can no longer manage the host. If using normal Lockdown Mode, avoid becoming locked out of an ESXi host that is running in Lockdown Mode by setting DCUI.Access to a list of highly trusted users who can override Lockdown Mode and access the DCUI. The DCUI is not running in strict Lockdown Mode.

Solution

From the vSphere Client, select the ESXi host and go to Configure >> System >> Advanced System Settings.

Click 'Edit', select the 'DCUI.Access' value, and configure it to root.

or

From a PowerCLI command prompt while connected to the ESXi host, run the following command:

Get-VMHost | Get-AdvancedSetting -Name DCUI.Access | Set-AdvancedSetting -Value 'root'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3, CAT|III, CCI|CCI-000366, Rule-ID|SV-239259r674706_rule, STIG-ID|ESXI-67-000002, STIG-Legacy|SV-104037, STIG-Legacy|V-93951, Vuln-ID|V-239259

Plugin: VMware

Control ID: 1e29115128277cf9c186417c874632b10a649b33a192662eacbc9361a7084003