STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to VMware NSX-T Manager NDM Security Technical Implementation Guide

V-251797

CAT II (Medium)

The NSX-T Manager must disable unused local accounts.

Rule ID

SV-251797r879588_rule

STIG

VMware NSX-T Manager NDM Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-000382

Discussion

Prior to NSX-T 3.1 and earlier, there are three local accounts: root, admin, and audit. These local accounts could not be disabled and no additional accounts could be created. Starting in NSX-T 3.1.1, there are two additional guest user accounts: guestuser1 and guestuser2. The local accounts for audit and guest users are disabled by default, but can be deactivated once active; however, admin and root accounts cannot be disabled. These accounts should remain disabled and unique non-local user accounts should be used instead.

Check Content

If NSX-T is not at least version 3.1.1, this is not applicable.

From the NSX-T Manager web interface, go to the System >> Users and Roles >> Local Users and view the status column.

If the audit, guestuser1, or guestuser2 local accounts are active, this is a finding.

Fix Text

From the NSX-T Manager web interface, go to the System >> Users and Roles >> Local Users.

Select the menu drop down next to the user to modify and click "Deactivate User".