Information
All distributed switches and their port groups must be configured to reject guest promiscuous mode requests. Enabling promiscuous mode on a port group allows all connected virtual machines to read all network packets, posing a potential security risk. Although sometimes necessary for debugging or monitoring, the default setting - reject - is recommended. Exceptions can be made for specific port groups as required.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Get-VDSwitch -Name $VDS | Get-VDSecurityPolicy | Set-VDSecurityPolicy -AllowPromiscuous $false
Get-VDPortgroup -Name $VDPG | Get-VDSecurityPolicy | Set-VDSecurityPolicy -AllowPromiscuous $false