UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The NSX-T Manager must disable unused local accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251797 TNDM-3X-000100 SV-251797r879588_rule Medium
Description
Prior to NSX-T 3.1 and earlier, there are three local accounts: root, admin, and audit. These local accounts could not be disabled and no additional accounts could be created. Starting in NSX-T 3.1.1, there are two additional guest user accounts: guestuser1 and guestuser2. The local accounts for audit and guest users are disabled by default, but can be deactivated once active; however, admin and root accounts cannot be disabled. These accounts should remain disabled and unique non-local user accounts should be used instead.
STIG Date
VMware NSX-T Manager NDM Security Technical Implementation Guide 2023-06-22

Details

Check Text ( C-55257r810392_chk )
If NSX-T is not at least version 3.1.1, this is not applicable.

From the NSX-T Manager web interface, go to the System >> Users and Roles >> Local Users and view the status column.

If the audit, guestuser1, or guestuser2 local accounts are active, this is a finding.
Fix Text (F-55211r810393_fix)
From the NSX-T Manager web interface, go to the System >> Users and Roles >> Local Users.

Select the menu drop down next to the user to modify and click "Deactivate User".