Configure Multiple Security Settings on the ESXi Hosts by Using PowerCLI
You perform the procedure on all ESXi hosts in all your workload domains to configure firewall settings, password policy, inactivity timeouts, failed login attempts, start up policies, join ESXi hosts to Active Directory domain, and remove ESX Admin group membership. Also, configure login banners for the Direct Console User Interface (DCUI) and SSH connections, deactivate warnings, configure persistent log location, remote logging, implement secure boot enforcement, enable TPM-based configuration encryption, enable audit logging, alocate storage record capacity, and activate bidirectional CHAP authentication by using PowerCLI commands.
To perform the procedure on the ESXi hosts for a workload domain, you connect to the vCenter Server for the respective workload domain. To run a task on all hosts for the domain, when you run commands, on the prompts to specify the object of a command, enter
[A] Yes to all
.- Log in to the vCenter Server for the workload domain you want to reconfigure by using a PowerCLI console.SettingValueCommandConnect-VIServer -Servermanagement-domain-vcenter-server-fqdn -Protocol httpsUser nameadministrator@vsphere.local
- VMW-ESXI-00022Configure the password complexity policy for the ESXi host.The requirement is a length of minimum 15 characters (maximum of 64 characters) from 4 character classes that include lowercase letters, uppercase letters, numbers, special characters. Password difference is also mandatory.Get-VMHost | Get-AdvancedSetting -Name Security.PasswordQualityControl | Set-AdvancedSetting -Value "similar=deny retry=3 min=disabled,disabled,disabled,disabled,15 max=64"
- VMW-ESXI-00028Configure the ESXi hosts firewall to only allow traffic from the authorized management networks.$esxiHosts = Get-VMHost foreach($esxiHost in $esxiHosts){ $esxcli = Get-EsxCli -v2 -VMHost $esxiHost.Name #This disables the allow all rule for the target service.The sshServer service is the target in this example. $arguments = $esxcli.network.firewall.ruleset.set.CreateArgs() $arguments.rulesetid = "sshServer" $arguments.allowedall = $false $esxcli.network.firewall.ruleset.set.Invoke($arguments) #Next add the allowed IPs for the service. Note that executing the "vSphere Web Client" service this way may disable access but may be done through vCenter or through the console. $arguments = $esxcli.network.firewall.ruleset.allowedip.add.CreateArgs() $arguments.rulesetid = "sshServer" $arguments.ipaddress = "Site-specific networks" $esxcli.network.firewall.ruleset.allowedip.add.Invoke($arguments)}This must be done for each user-configurable enabled service.
- VMW-ESXI-00034Set the maximum number of failed login attempts before an account is locked to 3.Get-VMHost | Get-AdvancedSetting -Name Security.AccountLockFailures | Set-AdvancedSetting -Value 3
- VMW-ESXI-00038Configure the inactivity timeout to automatically close idle shell sessions to 600 seconds.Get-VMHost | Get-AdvancedSetting -Name UserVars.ESXiShellInteractiveTimeOut | Set-AdvancedSetting -Value 600
- VMW-ESXI-00039Configure the timeout to automatically stop ESXi shell and SSH services to 600 seconds.Get-VMHost | Get-AdvancedSetting -Name UserVars.ESXiShellTimeOut | Set-AdvancedSetting -Value 600
- VMW-ESXI-00114To eliminate the need to create and maintain multiple local user accounts, join ESXi hosts to an Active Directory (AD) domain.Get-VMHost | Get-VMHostAuthentication | Set-VMHostAuthentication -JoinDomain -Domain "domain name" -User "username" -Password "password"If any local user accounts exist, apart fromrootand local service accounts, you can delete the local user accounts by going to the ESXi host UI .
- VMW-ESXI-00122Configure the login banner for the DCUI of the ESXi host.Get-VMHost | Get-AdvancedSetting -Name Annotations.WelcomeMessage | Set-AdvancedSetting -Value "Site-Specific banner text"
- VMW-ESXI-00123Configure the login banner for the SSH connections.Get-VMHost | Get-AdvancedSetting -Name Config.Etc.issue | Set-AdvancedSetting -Value "Site-Specific banner text"
- VMW-ESXI-00136Configure a persistent log location for all locally stored logs.Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logDir | Set-AdvancedSetting -Value “New Log Location”Specify the log location as[datastorename] path_to_file, where the path is relative to the root of the volume, backing the datastore. For example, the path[storage1] /systemlogsmaps to the path/vmfs/volumes/storage1/systemlogs.The new location should not include a subfolder as enabling audit logging will create a folder and will fail if a subfolder is specified.
- VMW-ESXI-00137For a host added to Active Directory, use an Active Directory group instead of the defaultESX Adminsgroup for theesxAdminsGroupproperty on the ESXi hosts.Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.plugins.hostsvc.esxAdminsGroup | Set-AdvancedSetting -Valuesite specifc AD_GroupChanging the group name does not remove the permissions of the previous group.
- VMW-ESXI-00164Configure a remote log server for the ESXi hosts.Use the following format when adding the remote log server. You can enter multiple, comma-separated values.udp://<IP/FQDN>:514tcp://<IP/FQDN>:514ssl://<IP/FQDN>:1514Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost | Set-AdvancedSetting -Value "<site-specific syslog server hostname>"
- VMW-ESXI-00564Configure idle session timeout for the ESXi host client to 600 seconds.Get-VMHost | Get-AdvancedSetting -Name UserVars.HostClientSessionTimeout | Set-AdvancedSetting -Value "600"
- VMW-ESXI-01102Activate bidirectional CHAP authentication for iSCSI traffic.Get-VMHost | Get-VMHostHba | Where {$_.Type -eq "iscsi"} | Set-VMHostHba -ChapType Required -ChapNamechap_name-ChapPasswordpassword-MutualChapEnabled $true -MutualChapNamemutual_chap_name-MutualChapPasswordmutual_password
- VMW-ESXI-01121Activate strict x509 verification for SSL syslog endpoints.Get-VMHost | Get-AdvancedSetting -Name Syslog.global.certificate.strictX509Compliance | Set-AdvancedSetting -Value "true"
- VMW-ESXI-01122Activate volatile key destruction on the host.Get-VMHost | Get-AdvancedSetting -Name Mem.MemEagerZero | Set-AdvancedSetting -Value "1"
- VMW-ESXI-01123Configure the host with an appropriate maximum password age.Get-VMHost | Get-AdvancedSetting -Name Security.PasswordMaxDays | Set-AdvancedSetting -Value "90"
- VMW-ESXI-01124Enable TPM-based configuration encryption.
- Ensure the TPM 2.0 chip is enabled in the BIOS and the ESX UI does not show any errors.
- This setting cannot be configured until the TPM is properly enabled in firmware.
- Configuration encryption uses the physical TPM at install or upgrade time. If the TPM is added or enabled later, you must reconfigure the ESXi host to use the newly available TPM. After you enable TPM configuration encryption is enabled, you cannot disable it.
$esxiHosts = Get-VMHost foreach($esxiHost in $esxiHosts){ $esxcli = Get-EsxCli -v2 -VMHost $esxiHost.Name $arguments = $esxcli.system.settings.encryption.set.CreateArgs() $arguments.mode="TPM" $esxcli.system.settings.encryption.set.Invoke($arguments) }You must evacuate the host and gracefully reboot for changes to take effect. - VMW-ESXI-01125The ESXi host must implement Secure Boot enforcement.$esxiHosts = Get-VMHost foreach($esxiHost in $esxiHosts){ $esxcli = Get-EsxCli -v2 -VMHost $esxiHost.Name $arguments = $esxcli.system.settings.encryption.set.CreateArgs() $arguments.requiresecureboot =$true $esxcli.system.settings.encryption.set.Invoke($arguments) }You must evacuate the host and gracefully reboot for changes to take effect.
- VMW-ESXI-01126Configure the startup policy for the CIM service on the host to "off".Get-VMHost | Get-VMHostService | Where {$_.Label -eq "CIM Server"} | Set-VMHostService -Policy Off
- VMW-ESXI-01128Deactivate the startup policy for the SNMP service on the host.Get-VMHost | Get-VMHostService | Where {$_.Label -eq "SNMP Server"} | Set-VMHostService -Policy Off
- VMW-ESXI-01152The ESXi host must disable virtual hardware management network interfaces.Get-VMHost | Get-AdvancedSetting -Name Net.BMCNetworkEnable | Set-AdvancedSetting -Value 0
- VMW-ESXI-01141The ESXi host must allocate audit record storage capacity to store audit records.Get-VMHost | Get-AdvancedSetting -Name Syslog.global.auditRecord.storageCapacity | Set-AdvancedSetting -Value 100
- VMW-ESXI-01142ESXi host must enable audit logging.Get-VMHost | Get-AdvancedSetting -Name Syslog.global.auditRecord.storageEnable | Set-AdvancedSetting -Value "true"VMW-ESXI-00136andVMW-ESXI-01141must be configured and validated before enabling audit logging.
- VMW-ESXI-01143ESXi host must off-load audit records via syslog.Get-VMHost | Get-AdvancedSetting -Name Syslog.global.auditRecord.remoteEnable | Set-AdvancedSetting -Value "true"
- VMW-ESXI-01145ESXi host must forward audit records containing information to establish what type of events occurred.Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logLevel | Set-AdvancedSetting -Value "info"
- VMW-ESXI-01150The ESXi host must deny shell access for the dcui account.$esxiHosts = Get-VMHost foreach($esxiHost in $esxiHosts){ $esxcli = Get-EsxCli -v2 -VMHost $esxiHost.Name $arguments = $esxcli.system.account.set.CreateArgs() $arguments.id = "dcui" $arguments.shellaccess = "false" $esxcli.system.account.set.invoke($arguments) }
- VMW-ESXI-01153ESXi host must enforce the exclusive running of executables from approved VIBs.Get-VMHost | Get-AdvancedSetting -Name VMkernel.Boot.execInstalledOnly | Set-AdvancedSetting -Value True
- VMW-ESXI-01154Configure ESXi host to use approved encryption to protect the confidentiality of network sessions.$esxiHosts = Get-VMHost foreach($esxiHost in $esxiHosts){ $esxcli = Get-EsxCli -v2 -VMHost $esxiHost.Name $arguments = $esxcli.system.tls.server.set.CreateArgs() $arguments.profile = "NIST_2024" $esxcli.system.tls.server.set.invoke($arguments) }A reboot is required to complete the process of changing profiles.