VMCH-65-000032 - Unauthorized USB devices must be disconnected on the virtual machine.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Ensure that no device is connected to a virtual machine if it is not required. For example, floppy, serial and parallel ports are rarely used for virtual machines in a datacenter environment, and CD/DVD drives are usually connected only temporarily during software installation.

Solution

From the vSphere Web Client right-click the Virtual Machine and go to Edit Settings. Select the USB controller and click the circle-x to remove then OK.

or

From a PowerCLI command prompt while connected to the ESXi host or vCenter server, run the following command:

Get-VM 'VM Name' | Get-USBDevice | Remove-USBDevice

Note: This will not remove the USB controller just any connected devices.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M10_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CAT|II, CCI|CCI-000366, Rule-ID|SV-237091r640110_rule, STIG-ID|VMCH-65-000032, STIG-Legacy|SV-104451, STIG-Legacy|V-94621, Vuln-ID|V-237091

Plugin: VMware

Control ID: b41a23f134ec665803cabbdf707e95996c6e8231749d741fd1d227d2382d903d