VCTR-67-000026 - The vCenter Server must check the privilege reassignment after restarts.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Check for privilege reassignment when restarting vCenter Server. If the user or user group that is assigned the Administrator role on the root folder cannot be verified as a valid user or group during a restart, the role is removed from that user or group. In its place, vCenter Server grants the Administrator role to the vCenter Single Sign-On account [email protected]. This account can then act as the Administrator.

Reestablish a named Administrator account and assign the Administrator role to that account to avoid using the anonymous [email protected] account.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

As the SSO Administrator, log in to the vCenter Server and restore a legitimate Administrator account per site-specific user/group/role requirements.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-243092r719519_rule, STIG-ID|VCTR-67-000026, Vuln-ID|V-243092

Plugin: VMware

Control ID: eb24d186f8617fe21e9865c9d1a1b98f5ca3861d46820f8eca326b1f87f8fdd0