ESXI-67-000035 - The ESXi host must be configured to disable nonessential capabilities by disabling SSH.


The ESXi Shell is an interactive command line interface (CLI) available at the ESXi server console. The ESXi shell provides temporary access to commands essential for server maintenance. Intended primarily for use in break-fix scenarios, the ESXi shell is well suited for checking and modifying configuration details, not always generally accessible, using the vSphere Client.

The ESXi shell is accessible remotely using SSH by users with the Administrator role. Under normal operating conditions, SSH access to the host must be disabled as is the default. As with the ESXi shell, SSH is also intended only for temporary use during break-fix scenarios. SSH must therefore be disabled under normal operating conditions and must only be enabled for diagnostics or troubleshooting. Remote access to the host must therefore be limited to the vSphere Client or Host Client at all other times.

Satisfies: SRG-OS-000095-VMM-000480, SRG-OS-000297-VMM-001040, SRG-OS-000298-VMM-001050


From the vSphere Client, select the ESXi host and go to Configure >> System >> Services.

Under 'Services', select 'SSH' service and click the 'Stop' button to stop the service. Use Edit Startup policy to 'Start and stop manually' and click 'OK'.


From a PowerCLI command prompt while connected to the ESXi host, run the following commands:

Get-VMHost | Get-VMHostService | Where {$_.Label -eq 'SSH'} | Set-VMHostService -Policy Off
Get-VMHost | Get-VMHostService | Where {$_.Label -eq 'SSH'} | Stop-VMHostService

See Also

Item Details


References: 800-53|AC-17(1), 800-53|AC-17(9), 800-53|CM-7a., CAT|II, CCI|CCI-000381, CCI|CCI-002314, CCI|CCI-002322, Rule-ID|SV-239290r854588_rule, STIG-ID|ESXI-67-000035, Vuln-ID|V-239290

Plugin: VMware

Control ID: de3de5b0508f72a83a5fedb1eb7d170fe65dff9779fd2de665b11a6c785cc1bd