Solved

disconnect drives vmware compliance checker

Posted on 2013-12-03
12
276 Views
Last Modified: 2013-12-04
can I ask if the vsphere compliance checker gives you a big red cross against "disconnect devices", does that mean there is an actual USB drive plugged into the USB port, or just that the USB port is "live"? same for floppy, cd, etc, does it just mean the drives are live, and could be used, or that there is some actual media sat in the ports/drives.?

What does the prevent unauthorised removal, modifacation and connection of devices actually "do" ?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 6
  • 6
12 Comments
 
LVL 121

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 39692729
It means, there could be devices currently connected, or the VM is configured to ALLOW devices to be connected.
0
 
LVL 3

Author Comment

by:pma111
ID: 39692753
Say for example though you got access to the host and plugged in your USB, what other safeguards can be enforced to stop you copyng to data off one of the guests on the host onto that USB? I assume its not that straight forward as if you can plug in your USB then you have free reign to copy any and all data off?
0
 
LVL 121
ID: 39692773
It's not that straight forward, if you are concerned about USB access, you would have to physically remove/disable the USB on the server.
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 3

Author Comment

by:pma111
ID: 39695072
My question is more , if you can break into the server room, plug in a USB drive into a hosts USB port, so what? How can you get data off that host if you dont have any sort of logical/login access on the host.
0
 
LVL 121
ID: 39695074
1. You can power off and on the server.
2. Boot the server using a Linux CDROM or Linux Live USB flash drive
3. Mount the USB storage disk, and copy off the virtual machine disk.

simple, if you have physical access to a server, you can do a lot.....

easy, 5 mins.

Therefore physical security is very important.
0
 
LVL 3

Author Comment

by:pma111
ID: 39695127
is there any risk though if the VM is on the SAN not local drive on that host?
0
 
LVL 121
ID: 39695133
If the ESXi Host server has access to the SAN, the datastore could be accessed via ESXi and the VM copied to USB.
0
 
LVL 3

Author Comment

by:pma111
ID: 39695141
But then surely you need some sort of logon to access esxi - i.e. plug in the USB, power off the server, power it back on again - I assume you cant just have free access to the VM's on the SAN used by that host at this stage, without logging into esxi?. Or once you power up your server can you access the VM's without any sort of authentication.
0
 
LVL 3

Author Comment

by:pma111
ID: 39695145
At what stage can the hosts communicate to the VM's on the SAN? I.e. I assume the boot CD trick wont get you access to the VM's on the SAN until the esxi has loaded?
0
 
LVL 121
ID: 39695183
You can easily change the password for an ESXi installation. Once the password has been changed, you can boot the server, login to the console, and access the datastore.

If ESXi is connected to a SAN at this time, you can copy the virtual machine disks.
0
 
LVL 3

Author Comment

by:pma111
ID: 39695191
>You can easily change the password for an ESXi installation -

As in with physical access to the host you can change the password? Can you elaborate on this?
0
 
LVL 121
ID: 39695202
Yes, BOOT from CDROM/USB and change the password.

it's documented here:-

http://www.vm-help.com/esx/esx3i/Reset_root_password.php
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I will show you HOW TO: Install VMware Tools for Windows on a VMware Windows virtual machine on a VMware vSphere Hypervisor 6.5 (ESXi 6.5) Host Server, using the VMware Host Client. The virtual machine has Windows Server 2016 instal…
Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root …
Advanced tutorial on how to run the esxtop command to capture a batch file in csv format in order to export the file and use it for performance analysis. He demonstrates how to download the file using a vSphere web client (or vSphere client) and exp…
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question