Skip to content

VMware vSphere 7.0 ESXi Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480-VMM-002000

    Group
  • All port groups on standard switches must be configured to reject forged transmits.

    If the virtual machine (VM) operating system changes the Media Access Control (MAC) address, the operating system can send frames with an impersonated source MAC address at any time. This allows an...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • All port groups on standard switches must be configured to reject guest Media Access Control (MAC) address changes.

    If the virtual machine (VM) operating system changes the MAC address, it can send frames with an impersonated source MAC address at any time. This allows it to stage malicious attacks on the device...
    Rule High Severity
  • SRG-OS-000480-VMM-002000

    Group
  • All port groups on standard switches must be configured to reject guest promiscuous mode requests.

    When promiscuous mode is enabled for a virtual switch, all virtual machines (VMs) connected to the Portgroup have the potential to read all packets across that network (only the virtual machines co...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • Use of the dvFilter network application programming interfaces (APIs) must be restricted.

    If the organization is not using products that use the dvfilter network API, the host should not be configured to send network information to a virtual machine (VM). If the API is enabled, an atta...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • SRG-OS-000480-VMM-002000

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules