ESXI-65-000053 - SNMP must be configured properly on the ESXi host.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If SNMP is not being used, it must remain disabled. If it is being used, the proper trap destination must be configured. If SNMP is not properly configured, monitoring information can be sent to a malicious host that can then use this information to plan an attack.

Solution

To disable SNMP run the following command from a PowerCLI command prompt while connected to the ESXi Host:

Get-VMHostSnmp | Set-VMHostSnmp -Enabled $false

or

From a console or ssh session run the follow command:

esxcli system snmp set -e no

To configure SNMP for v3 targets use the 'esxcli system snmp set' command set.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M10_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CCI|CCI-000366, Rule-ID|SV-207652r388482_rule, STIG-ID|ESXI-65-000053, STIG-Legacy|SV-104139, STIG-Legacy|V-94053, Vuln-ID|V-207652

Plugin: VMware

Control ID: 861be5000367371d48a819e0f671bb5f0b5c06ac80424c262c1dce26f1eb3261