STIGQter STIGQter: STIG Summary: VMW vSphere 6.5 vCenter Server for Windows Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

The vCenter Server for Windows must set the interval for counting failed login attempts to at least 15 minutes.

DISA Rule

SV-216865r612237_rule

Vulnerability Number

V-216865

Group Title

SRG-APP-000345

Rule Version

VCWN-65-000046

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy. Click "Edit". Set the Time interval between failures to "900" and click "OK".

Check Contents

From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy.

View the values for the lockout policies.

The following lockout policy should be set at follows:
Time interval between failures: 900 seconds

If this lockout policy is not configured as stated, this is a finding.

Vulnerability Number

V-216865

Documentable

False

Rule Version

VCWN-65-000046

Severity Override Guidance

From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy.

View the values for the lockout policies.

The following lockout policy should be set at follows:
Time interval between failures: 900 seconds

If this lockout policy is not configured as stated, this is a finding.

Check Content Reference

M

Target Key

4030

Comments