GEN002260-ESXI5-000047 - The system must be checked for extraneous device files at least weekly

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If an unauthorized device is allowed to exist on the system, there is the possibility the system may perform unauthorized operations.

Solution

Configure the system to check for extraneous device files on a weekly basis. Refer to the Check Content section above for the basic command structure to search the file system. Additionally, ensure persistence of the command output by storing results to a target located on persistent storage.

See Also

http://iasecontent.disa.mil/stigs/zip/U_ESXi5_Server_V1R10_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000366, Group-ID|V-39424, Rule-ID|SV-51282r3_rule, STIG-ID|GEN002260-ESXI5-000047, Vuln-ID|V-39424

Plugin: VMware

Control ID: 22539039aef485921e5b60f5145fa98cce94263cc0fae77a66ddfcf3b7d61670