1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere Virtual Machine 6.x V1R1
  4. VMCH-06-000034 – The system must disable console access through the VNC protocol.

VMCH-06-000034 – The system must disable console access through the VNC protocol.

Details

The VM console enables you to connect to the console of a virtual machine, in effect seeing what a monitor on a physical server would show. This console is also available via the Virtual Network Computing (VNC) protocol and should be disabled.

Solution

From the vSphere Client select the Virtual Machine right click and go to Edit Settings >> VM Options Tab >> Advanced >> Configuration Parameters. Find the RemoteDisplay.vnc.enabled value and set it to false. If the setting does not exist click ‘Add Row’ to add the setting to the virtual machine.

Note: The VM must be powered off to configure the advanced settings through the vSphere Client so it is recommended to configure these settings with PowerCLI as it can be done while the VM is powered on.

or

From a PowerCLI command prompt while connected to the ESXi host or vCenter server run the following command:

If the setting does not exist run:

Get-VM ‘VM Name’ | New-AdvancedSetting -Name RemoteDisplay.vnc.enabled -Value false

If the setting exists run:

Get-VM ‘VM Name’ | Get-AdvancedSetting -Name RemoteDisplay.vnc.enabled | Set-AdvancedSetting -Value false

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system VMware.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles