ESXI-65-000006 - The ESXi host must enforce the unlock timeout of 15 minutes after a user account is locked out.

Information

By limiting the number of failed login attempts, the risk of unauthorized access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

Solution

From the vSphere Web Client select the ESXi Host and go to Configure >> System >> Advanced System Settings. Click Edit and select the Security.AccountUnlockTime value and configure it to 900.

or

From a PowerCLI command prompt while connected to the ESXi host run the following commands:

Get-VMHost | Get-AdvancedSetting -Name Security.AccountUnlockTime | Set-AdvancedSetting -Value 900

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y23M07_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7b., CAT|II, CCI|CCI-002238, Rule-ID|SV-207607r854577_rule, STIG-ID|ESXI-65-000006, STIG-Legacy|SV-104045, STIG-Legacy|V-93959, Vuln-ID|V-207607

Plugin: VMware

Control ID: 157191aa64f3f7dd613d3216fdeb698fe473050bc9ddbd517e9f6620b9f70c9c