Details
Some virtual machine advanced settings parameters do not apply on vSphere because VMware virtual machines work on both vSphere and hosted virtualization platforms such as Workstation and Fusion. Explicitly disabling these features reduces the potential for vulnerabilities because it reduces the number of ways in which a guest can affect the host.
Solution
From the vSphere Client select the Virtual Machine right click and go to Edit Settings >> VM Options Tab >> Advanced >> Configuration Parameters. Find the isolation.bios.bbs.disable value and set it to true. If the setting does not exist click ‘Add Row’ to add the setting to the virtual machine.
Note: The VM must be powered off to configure the advanced settings through the vSphere Client so it is recommended to configure these settings with PowerCLI as it can be done while the VM is powered on.
or
From a PowerCLI command prompt while connected to the ESXi host or vCenter server run the following command:
If the setting does not exist run:
Get-VM ‘VM Name’ | New-AdvancedSetting -Name isolation.bios.bbs.disable -Value true
If the setting exists run:
Get-VM ‘VM Name’ | Get-AdvancedSetting -Name isolation.bios.bbs.disable | Set-AdvancedSetting -Value true
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system VMware.
References
- 800-53|CM-6b.
- CAT|III
- CCI|CCI-000366
- Group-ID|V-64057
- Rule-ID|SV-78547r1_rule
- STIG-ID|VMCH-06-000010
- Vuln-ID|V-64057