UCF STIG Viewer Logo

The GID assigned to a user must exist.


Overview

Finding ID Version Rule ID IA Controls Severity
V-39274 GEN000380-ESXI5-000043 SV-51090r1_rule Low
Description
If a user is assigned the GID of a group not existing on the system, and a group with that GID is subsequently created, the user may have unintended rights to that group.
STIG Date
VMware ESXi Server 5.0 Security Technical Implementation Guide 2017-01-06

Details

Check Text ( C-46538r1_chk )
From the vSphere Client/vCenter, click on the "Local Users and Groups" tab, then select to view Groups. Select to view Users. Highlight the user, right click and select Edit. Click Cancel.

If any user's primary GID is not found in the Group list, this is a finding.
Fix Text (F-44253r1_fix)
From the vSphere Client/vCenter, click on the "Local Users and Groups" tab, then select Groups. Highlight the user, right click the user and select Edit. Select/highlight/assign the user's correct primary GID. Click OK.