VCWN-65-000030 - The vCenter Server for Windows Administrator role must be secured and assigned to specific users other than a Windows Administrator.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

By default, vCenter Server grants full administrative rights to the local administrator's account, which can be accessed by domain administrators. Separation of duties dictates that full vCenter Administrative rights should be granted only to those administrators who are required to have it. This privilege should not be granted to any group whose membership is not strictly controlled. Therefore, administrative rights should be removed from the local Windows server to users who are not vCenter administrators.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Under the computer management console for windows view the local administrators group and remove any users or groups that do not fit the criteria defined in the check content.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-216852r766916_rule, STIG-ID|VCWN-65-000030, STIG-Legacy|SV-104599, STIG-Legacy|V-94769, Vuln-ID|V-216852

Plugin: VMware

Control ID: eb7833174449e7d7a3207acbb52b9db281cbc35e6fb966870244f499eed1f9c2