UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The vCenter Server for Windows Administrator role must be secured and assigned to specific users other than a Windows Administrator.


Overview

Finding ID Version Rule ID IA Controls Severity
V-216852 VCWN-65-000030 SV-216852r766916_rule Medium
Description
By default, vCenter Server grants full administrative rights to the local administrator's account, which can be accessed by domain administrators. Separation of duties dictates that full vCenter Administrative rights should be granted only to those administrators who are required to have it. This privilege should not be granted to any group whose membership is not strictly controlled. Therefore, administrative rights should be removed from the local Windows server to users who are not vCenter administrators.
STIG Date
VMW vSphere 6.5 vCenter Server for Windows Security Technical Implementation Guide 2021-06-23

Details

Check Text ( C-18083r766915_chk )
If enhanced linked mode is used then local windows authentication is not available to vCenter, this is not applicable.

Under the computer management console for Windows, view the local administrators group and verify only vCenter administrators have access to the vCenter server.

Other groups and users that are not vCenter administrators should be removed from the local administrators group, such as Domain Admins.

If there are any unauthorized groups or users present in the local administrators group of the vCenter server, this is a finding.
Fix Text (F-18081r366271_fix)
Under the computer management console for windows view the local administrators group and remove any users or groups that do not fit the criteria defined in the check content.