UCF STIG Viewer Logo

The GID assigned to a user must exist.


Overview

Finding ID Version Rule ID IA Controls Severity
GEN000380-ESXI5-000043 GEN000380-ESXI5-000043 GEN000380-ESXI5-000043_rule Low
Description
If a user is assigned the GID of a group not existing on the system, and a group with that GID is subsequently created, the user may have unintended rights to that group.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-GEN000380-ESXI5-000043_chk )
From the vSphere Client/vCenter, click on the "Local Users and Groups" tab, then select to view Groups. Select to view Users. Highlight the user, right click and select Edit. Click Cancel.

If any user's primary GID is not found in the Group list, this is a finding.
Fix Text (F-GEN000380-ESXI5-000043_fix)
From the vSphere Client/vCenter, click on the "Local Users and Groups" tab, then select Groups. Highlight the user, right click the user and select Edit. Select/highlight/assign the user's correct primary GID. Click OK.