III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-VMM-002000
Group -
The virtual machine (VM) guest operating system must be locked when the last console connection is closed.
When accessing the VM console, the guest operating system must be locked when the last console user disconnects, limiting the possibility of session hijacking. This setting only applies to Windows-...Rule Medium Severity -
SRG-OS-000480-VMM-002000
Group -
All 3D features on the virtual machine (VM) must be disabled when not required.
For performance reasons, it is recommended that 3D acceleration be disabled on virtual machines that do not require 3D functionality (e.g., most server workloads or desktops not using 3D applicatio...Rule Low Severity -
SRG-OS-000480-VMM-002000
Group -
Encryption must be enabled for vMotion on the virtual machine (VM).
vMotion migrations in vSphere 6.0 and earlier transferred working memory and CPU state information in clear text over the vMotion network. As of vSphere 6.5, this transfer can be transparently encr...Rule Medium Severity -
SRG-OS-000480-VMM-002000
Group -
Logging must be enabled on the virtual machine (VM).
The ESXi hypervisor maintains logs for each individual VM by default. These logs contain information including but not limited to power events, system failure information, tools status and activity...Rule Medium Severity -
SRG-OS-000480-VMM-002000
Group -
Log size must be configured properly on the virtual machine (VM).
The ESXi hypervisor maintains logs for each individual VM by default. These logs contain information including but not limited to power events, system failure information, tools status and activity...Rule Medium Severity -
SRG-OS-000480-VMM-002000
Group -
Log retention must be configured properly on the virtual machine (VM).
The ESXi hypervisor maintains logs for each individual VM by default. These logs contain information including but not limited to power events, system failure information, tools status and activity...Rule Medium Severity -
SRG-OS-000480-VMM-002000
Group -
DirectPath I/O must be disabled on the virtual machine (VM) when not required.
VMDirectPath I/O (PCI passthrough) enables direct assignment of hardware PCI functions to VMs. This gives the VM access to the PCI functions with minimal intervention from the ESXi host. This is a ...Rule Medium Severity -
SRG-OS-000480-VMM-002000
Group -
Encryption must be enabled for Fault Tolerance on the virtual machine (VM).
Fault Tolerance log traffic can be encrypted. This could contain sensitive data from the protected machine's memory or CPU instructions. vSphere Fault Tolerance performs frequent checks between a ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.