GEN002260-ESXI5-000047 - The system must be checked for extraneous device files at least weekly.

Information

If an unauthorized device is allowed to exist on the system, there is the possibility the system may perform unauthorized operations.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the system to check for extraneous device files on a weekly basis. Refer to the Check Content section above for the basic command structure to search the file system. Additionally, ensure persistence of the command output by storing results to a target located on persistent storage.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_ESXi5_Server_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Group-ID|V-39424, Rule-ID|SV-250581r798742_rule, STIG-ID|GEN002260-ESXI5-000047, STIG-Legacy|SV-51282, STIG-Legacy|V-39424, Vuln-ID|V-250581

Plugin: VMware

Control ID: fbd764ba3cd465ade194afe0da4b5910e2602ee50b8a37ffaefa3fc934e08354