VCWN-06-000047 - The system must require an administrator to unlock an account locked due to excessive login failures.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

By limiting the number of failed login attempts, the risk of unauthorized access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

NOTE: Nessus has not evaluted this check. It is included for informational purposes.

Solution

From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy. Click Edit. Set the Unlock time to 0 and click OK.

See Also

http://iasecontent.disa.mil/stigs/zip/U_VMware_vSphere_6-0_vCenter_Server_for_Windows_V1R3_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002238, Group-ID|V-64029, Rule-ID|SV-78519r1_rule, STIG-ID|VCWN-06-000047

Plugin: VMware

Control ID: ee63e58f27a66b155cd06e616359cc0d42c4a6eccb5479e67506f1055772a9b1