ESXI-67-000031 - The ESXi host must enforce password complexity by requiring that at least one uppercase character be used.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid passwords using guessing or exhaustive search techniques. Complexity requirements increase the password search space by requiring users to construct passwords from a larger character set than they may otherwise use.

Satisfies: SRG-OS-000069-VMM-000360, SRG-OS-000070-VMM-000370, SRG-OS-000071-VMM-000380, SRG-OS-000078-VMM-000450, SRG-OS-000072-VMM-000390, SRG-OS-000266-VMM-000940

Solution

From the vSphere Client, select the ESXi host and go to Configure >> System >> Advanced System Settings.

Click 'Edit', select the 'Security.PasswordQualityControl' value, and configure it to 'similar=deny retry=3 min=disabled,disabled,disabled,disabled,15'.

or

From a PowerCLI command prompt while connected to the ESXi host, run the following commands:

Get-VMHost | Get-AdvancedSetting -Name Security.PasswordQualityControl | Set-AdvancedSetting -Value 'similar=deny retry=3 min=disabled,disabled,disabled,disabled,15'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000192, CCI|CCI-000193, CCI|CCI-000194, CCI|CCI-000195, CCI|CCI-000205, CCI|CCI-001619, Rule-ID|SV-239286r674787_rule, STIG-ID|ESXI-67-000031, Vuln-ID|V-239286

Plugin: VMware

Control ID: 1c6fb4c23e709afb85cf8a7014b9d615aa2a762a5fa4936ca94167e24726ca0c