List users Details Users (subjects) should only be present if Active Directory integration is used for authentication. This security hardening control applies...
List virtual disks Details The list of virtual disks should be reviewed. Maintaining unnecessary disks can deplete the resources of the host system....
List VLANs Details The list of VLANs should be reviewed. NOTE: Nessus has provided the target output to assist in reviewing the...
NTP client configured Details An accurate clock is essential for log analysis and correlation with other devices. A valid configuration file for the...
Only allow access to required network services Details Unrestricted access to services running on a XenServer host can expose a host to outside attacks and unauthorized access....
Passwords stored in ‘secrets’ are not visible Details The secrets list stores passwords that are required for remote storage connections or other purposes. These passwords may be...
Restrict allowed IPv4 addresses used by each VM guest Details Port locking prevents ARP and IP spoofing by VM guests. Without it, one guest could impersonate another on the...
Restrict allowed IPv6 addresses used by each VM guest Details Port locking prevents ARP and IP spoofing by VM guests. Without it, one guest could impersonate another on the...
Review accounts used to mount remote storage Details The list of accounts used to connect to remote storage should be reviewed. The account names are visible to...
Snapshots are not present Details Snapshots can consume system resources, cause performance issues, and may be reverted unintentionally causing data loss. If snapshots are...