UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation Guide


Overview

Date Finding Count (33)
2023-06-15 CAT I (High): 0 CAT II (Med): 33 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-256688 Medium ESX Agent Manager must not have any symbolic links in the web content directory tree.
V-256689 Medium ESX Agent Manager directory tree must have permissions in an out-of-the-box state.
V-256684 Medium ESX Agent Manager must have Multipurpose Internet Mail Extensions (MIMEs) that invoke operating system shell programs disabled.
V-256685 Medium ESX Agent Manager must have mappings set for Java servlet pages.
V-256686 Medium ESX Agent Manager must not have the Web Distributed Authoring (WebDAV) servlet installed.
V-256687 Medium ESX Agent Manager must be configured with memory leak protection.
V-256680 Medium ESX Agent Manager application files must be verified for their integrity.
V-256681 Medium ESX Agent Manager must only run one webapp.
V-256682 Medium ESX Agent Manager must not be configured with unsupported realms.
V-256683 Medium ESX Agent Manager must be configured to limit access to internal packages.
V-256705 Medium ESX Agent Manager default servlet must be set to "readonly".
V-256704 Medium ESX Agent Manager must disable the shutdown port.
V-256701 Medium Rsyslog must be configured to monitor and ship ESX Agent Manager log files.
V-256700 Medium ESX Agent Manager must have the debug option disabled.
V-256703 Medium ESX Agent Manager must be configured with the appropriate ports.
V-256702 Medium ESX Agent Manager must set the secure flag for cookies.
V-256699 Medium ESX Agent Manager must not enable support for TRACE requests.
V-256698 Medium ESX Agent Manager must hide the server version.
V-256697 Medium ESX Agent Manager must be configured to not show error reports.
V-256696 Medium ESX Agent Manager must be configured to show error pages with minimal information.
V-256695 Medium ESX Agent Manager must not show directory listings.
V-256694 Medium ESX Agent Manager must set the welcome-file node to a default web page.
V-256693 Medium ESX Agent Manager must use the "setCharacterEncodingFilter" filter.
V-256692 Medium ESX Agent Manager must set URIEncoding to UTF-8.
V-256691 Medium ESX Agent Manager must limit the number of allowed connections.
V-256690 Medium ESX Agent Manager must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
V-256673 Medium ESX Agent Manager must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.
V-256675 Medium ESX Agent Manager must limit the maximum size of a POST request.
V-256674 Medium ESX Agent Manager must limit the number of concurrent connections permitted.
V-256677 Medium ESX Agent Manager must record user access in a format that enables monitoring of remote access.
V-256676 Medium ESX Agent Manager must protect cookies from cross-site scripting (XSS).
V-256679 Medium ESX Agent Manager log files must only be modifiable by privileged users.
V-256678 Medium ESX Agent Manager must generate log records for system startup and shutdown.