VMCH-06-000004 - The system must explicitly disable paste operations.


Copy and paste operations are disabled by default; however, by explicitly disabling this feature it will enable audit controls to check that this setting is correct. Copy, paste, drag and drop, or GUI copy/paste operations between the guest OS and the remote console could provide the means for an attacker to compromise the VM.


From the vSphere Client select the Virtual Machine right click and go to Edit Settings >> VM Options Tab >> Advanced >> Configuration Parameters. Find the isolation.tools.paste.disable value and set it to true. If the setting does not exist click 'Add Row' to add the setting to the virtual machine.

Note: The VM must be powered off to configure the advanced settings through the vSphere Client so it is recommended to configure these settings with PowerCLI as it can be done while the VM is powered on.


From a PowerCLI command prompt while connected to the ESXi host or vCenter server run the following command:

If the setting does not exist run:

Get-VM 'VM Name' | New-AdvancedSetting -Name isolation.tools.paste.disable -Value true

If the setting exists run:

Get-VM 'VM Name' | Get-AdvancedSetting -Name isolation.tools.paste.disable | Set-AdvancedSetting -Value true

See Also


Item Details


References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Group-ID|V-64045, Rule-ID|SV-78535r1_rule, STIG-ID|VMCH-06-000004, Vuln-ID|V-64045

Plugin: VMware

Control ID: 5a9fbb648874189b4badb8138e6e1a3013a11ece3e67513803637bbe0b22f69d