Information
Virtual machines must remove unnecessary virtual hardware. Eliminate unnecessary virtual hardware from VMs to reduce potential attack surfaces. Rarely-used ports, temporary CD/DVD drives, and hardware introduced via migrations could be vulnerable. Removing these decreases risk of software introduction or data exfiltration from a protected environment.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.