![]() ![]() This step assumes that root access to the system is available via the vSphere Client/vCenter Server, local availability via the DCUI, or that remote systems are accessible at the remote site via touch labor by an authorized (root) user.ĭisable lock down mode. If "PermitRootLogin" is set to "yes", this is a finding. ![]() # grep PermitRootLogin /etc/ssh/sshd_config VMware ESXi Server 5.0 Security Technical Implementation Guideįor ESXi hosts that are not managed by a vCenter Server, this check is not applicable.ĭisable lock down mode. In addition, logging in with a user-specific account preserves the audit trail. Please mark my comment as the Correct Answer/Kudos if this solution resolved your problem Thank you. Even though communications are encrypted, an additional layer of security may be gained by extending the policy of not logging directly on as root. VMware VSP-SV 2018, VTSP-SV 2018 VMware Technical Solutions Professional Hyper-Converged Infrastructure (VTSP-HCI 2018) VMware Technical Solutions Professional (VTSP) 4 / 5. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |