ESXI-06-000037 - The system must use Active Directory for local user authentication.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Join ESXi hosts to an Active Directory (AD) domain to eliminate the need to create and maintain multiple local user accounts. Using AD for user authentication simplifies the ESXi host configuration, ensures password complexity and reuse policies are enforced and reduces the risk of security breaches and unauthorized access. Note: If the AD group 'ESX Admins' (default) exists then all users and groups that are assigned as members to this group will have full administrative access to all ESXi hosts the domain.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client select the ESXi Host and go to Configuration >> Authentication Services. Click Properties and change the 'Directory Service Type' to Active Directory, enter the domain to join, check 'Use vSphere Authentication Proxy' and enter the proxy server address then click 'Join Domain'.

or

From a PowerCLI command prompt while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostAuthentication | Set-VMHostAuthentication -JoinDomain -Domain 'domain name' -User 'username' -Password 'password'

See Also

http://iasecontent.disa.mil/stigs/zip/U_VMware_vSphere_6-0_ESXi_V1R4_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000764, Group-ID|V-63243, Rule-ID|SV-77733r1_rule, STIG-ID|ESXI-06-000037

Plugin: VMware

Control ID: 6cf5239299750c043898dabca56fefa4d0d6b9cf8aa2bb7ed96ec849d39bd76f