VMware Horizon 7.13 Agent Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000001
- Vuln IDs
-
- V-246860
- Rule IDs
-
- SV-246860r768540_rule
Checks: C-50292r768538_chk
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Security. Double-click the "Accept SSL encrypted framework channel" setting. If "Accept SSL encrypted framework channel" is not "Enabled" and set to "Enforce", this is a finding.
Fix: F-50246r768539_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Security. Double-click the "Accept SSL encrypted framework channel" policy. Make sure the policy is "Enabled". Choose "Enforce" from the drop-down. Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000002
- Vuln IDs
-
- V-246861
- Rule IDs
-
- SV-246861r768543_rule
Checks: C-50293r768541_chk
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Configuration. Double-click the "CommandsToRunOnConnect" setting. If "CommandsToRunOnConnect" is "Not Configured" or "Disabled", this is not a finding. Click the "Show..." button next to "Commands". If any of the listed commands are not expected, approved, and required, this is a finding.
Fix: F-50247r768542_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Configuration. Double-click the "CommandsToRunOnConnect" setting. Option 1: Click the radio button next to "Disabled". Click "OK". Option 2: Make sure the setting is "Enabled". Click the "Show..." button next to "Commands". Highlight the unneeded command and press the "delete" key. Click "OK". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000003
- Vuln IDs
-
- V-246862
- Rule IDs
-
- SV-246862r768546_rule
Checks: C-50294r768544_chk
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Configuration. Double-click the "CommandsToRunOnDisconnect" setting. If "CommandsToRunOnDisconnect" is "Not Configured" or "Disabled", this is not a finding. Click the "Show..." button next to "Commands". If any of the listed commands are not expected, approved, and required, this is a finding.
Fix: F-50248r768545_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Configuration. Double-click the "CommandsToRunOnDisconnect" setting. Option 1: Click the radio button next to "Disabled". Click "OK". Option 2: Click the "Show..." button next to "Commands". Highlight the unneeded command and press the "delete" key. Click "OK". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000004
- Vuln IDs
-
- V-246863
- Rule IDs
-
- SV-246863r768549_rule
Checks: C-50295r768547_chk
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Configuration. Double-click the "CommandsToRunOnReconnect" setting. If "CommandsToRunOnReconnect" is "Not Configured" or "Disabled", this is not a finding. Click the "Show..." button next to "Commands". If any of the listed commands are not expected, approved, and required, this is a finding.
Fix: F-50249r768548_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Configuration. Double-click the "CommandsToRunOnReconnect" setting. Option 1: Click the radio button next to "Disabled". Click "OK". Option 2: Click the "Show..." button next to "Commands". Highlight the unneeded command and press the "delete" key. Click "OK". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000005
- Vuln IDs
-
- V-246864
- Rule IDs
-
- SV-246864r768552_rule
Checks: C-50296r768550_chk
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Common Configuration >> Security Configuration. Double-click the "Type of certificate revocation check" setting. If "Type of certificate revocation check" is "Not Configured" or "Disabled", this is a finding. In the drop-down under "Type of certificate revocation check", if "WholeChain" is not selected, this is a finding.
Fix: F-50250r768551_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Common Configuration >> Security Configuration. Double-click the "Type of certificate revocation check" setting. Make sure the setting is "Enabled". In the drop-down under "Type of certificate revocation check", select "WholeChain". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000006
- Vuln IDs
-
- V-246865
- Rule IDs
-
- SV-246865r768555_rule
Checks: C-50297r768553_chk
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Configuration. Double-click the "Idle Time Until Disconnect (VDI)" setting. If "Idle Time Until Disconnect (VDI)" is "Not Configured" or "Disabled", this is a finding. In the drop-down next to "Idle Timeout", if "Never" is selected, this is a finding.
Fix: F-50251r768554_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> Agent Configuration. Double-click the "Idle Time Until Disconnect (VDI)" setting. Click the radio button next to "Enabled". In the drop-down next to "Idle Timeout", select an appropriate, site-specific timeout that is not "Never". This is typically two hours but your configuration may vary. Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000007
- Vuln IDs
-
- V-246866
- Rule IDs
-
- SV-246866r768558_rule
Checks: C-50298r768556_chk
Ensure the vdm_blast.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware Blast. Double-click the "Configure clipboard redirection" setting. If "Configure clipboard redirection" is "Not Configured" or "Disabled", this is not a finding. In the drop-down under "Configure clipboard redirection", if "Enabled server to client only" or "Enabled in both directions" is selected, this is a finding.
Fix: F-50252r768557_fix
Ensure the vdm_blast.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> VMware Blast. Double-click the "Configure clipboard redirection" setting. Click the radio button next to "Disabled". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000008
- Vuln IDs
-
- V-246867
- Rule IDs
-
- SV-246867r768561_rule
Checks: C-50299r768559_chk
Ensure the pcoip.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> PCoIP Session Variables >> Not Overridable Administrator Settings. Double-click the "Configure clipboard redirection" setting. If "Configure clipboard redirection" is "Not Configured" or "Disabled", this is not a finding. In the drop-down under "Configure clipboard redirection", if "Enabled server to client only" or "Enabled in both directions" is selected, this is a finding.
Fix: F-50253r768560_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> PCoIP Session Variables >> Not Overridable Administrator Settings. Double-click the "Configure clipboard redirection" setting. Click the radio button next to "Disabled". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000009
- Vuln IDs
-
- V-246868
- Rule IDs
-
- SV-246868r768564_rule
Checks: C-50300r768562_chk
Ensure the vdm_blast.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware Blast. Double-click the "Configure file transfer" setting. If "Configure file transfer" is not "Enabled", this is a finding. In the drop-down under "Configure file transfer", if "Disabled both upload and download" is not selected, this is a finding.
Fix: F-50254r768563_fix
Ensure the vdm_blast.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware Blast. Double-click the "Configure file transfer" setting. Click the radio button next to "Enabled". In the drop-down under "Configure file transfer", select "Disabled both upload and download". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000010
- Vuln IDs
-
- V-246869
- Rule IDs
-
- SV-246869r768567_rule
Checks: C-50301r768565_chk
Ensure the vdm_blast.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware Blast. Double-click the "Configure drag and drop direction" setting. If "Configure drag and drop direction" is not "Enabled", this is a finding. In the drop-down under "Configure drag and drop", if "Disabled in both directions" is not selected, this is a finding.
Fix: F-50255r768566_fix
Ensure the vdm_blast.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware Blast. Double-click the "Configure drag and drop" setting. Click the radio button next to "Enabled". In the drop-down under "Configure drag and drop", select "Disabled in both directions". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000011
- Vuln IDs
-
- V-246870
- Rule IDs
-
- SV-246870r768570_rule
Checks: C-50302r768568_chk
Ensure the pcoip.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> PCoIP Session Variables >> Overridable Administrator Settings. Double-click the "Configure drag and drop direction" setting. If "Configure drag and drop direction" is not "Enabled", this is a finding. In the drop-down under "Configure drag and drop direction", if "Disabled in both directions" is not selected, this is a finding.
Fix: F-50256r768569_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> PCoIP Session Variables >> Overridable Administrator Settings. Double-click the "Configure drag and drop direction" setting. Click the radio button next to "Enabled". In the drop-down under "Configure drag and drop", select "Disabled in both directions". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000012
- Vuln IDs
-
- V-246871
- Rule IDs
-
- SV-246871r768573_rule
Checks: C-50303r768571_chk
Ensure the vdm_blast.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware Blast. Double-click the "Configure clipboard audit" setting. If "Configure clipboard audit" is "Not Configured" or "Disabled", this is a finding. In the drop-down under "Configure clipboard audit", if "Enabled in both directions" is not selected, this is a finding.
Fix: F-50257r768572_fix
Ensure the vdm_blast.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> VMware Blast. Double-click the "Configure clipboard audit" setting. Click the radio button next to "Enabled". In the drop-down under "Configure clipboard audit", select "Enabled in both directions". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000013
- Vuln IDs
-
- V-246872
- Rule IDs
-
- SV-246872r768576_rule
Checks: C-50304r768574_chk
Ensure the pcoip.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> PCoIP Session Variables >> Overridable Administrator Settings. Double-click the "Configure clipboard audit" setting. If "Configure clipboard audit" is "Not Configured" or "Disabled", this is a finding. In the drop-down under "Configure clipboard audit", if "Enabled in both directions" is not selected, this is a finding.
Fix: F-50258r768575_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> PCoIP Session Variables >> Overridable Administrator Settings. Double-click the "Configure clipboard audit" setting. Click the radio button next to "Enabled". In the drop-down under "Configure clipboard audit", select "Enabled in both directions". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000014
- Vuln IDs
-
- V-246873
- Rule IDs
-
- SV-246873r768579_rule
Checks: C-50305r768577_chk
Ensure the vdm_rdsh_server.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Device and Resource Redirection. Double-click the "Do not allow drive redirection" setting. If "Do not allow drive redirection" is not "Enabled", this is a finding.
Fix: F-50259r768578_fix
Ensure the vdm_rdsh_server.admx template is added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Device and Resource Redirection. Double-click the "Do not allow drive redirection" setting. Click the radio button next to "Enabled". Click "OK".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HRZA-7X-000015
- Vuln IDs
-
- V-246874
- Rule IDs
-
- SV-246874r768582_rule
Checks: C-50306r790570_chk
Interview the SA. USB mass storage devices can be blocked in a number of ways: 1. The desktop OS 2. A third party DLP solution 3. The "USB Redirection" optional agent feature not being installed on any VDI image 4. On the Connection Server via individual pool policies or global policies If any of these methods are already employed, the risk is already addressed and this control is not applicable. If USB devices are not otherwise blocked, the Horizon agent must be configured to block storage devices via allowlist or denylist. Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> View USB Configuration. 1. Check for denylisting: Double-click the "Exclude Device Family" setting. If "Exclude Device Family" is not "Enabled", denylisting is Not Configured. If "Exclude Device Family" does not include at least "o:storage", denylisting is Not Configured. If denylisting is Not Configured, continue to check for allowlisting. If denylisting is configured, this is not a finding. 2. Check for allowlisting: Double-click the "Exclude All Devices" setting. If "Exclude All Devices" is not "Enabled", allowlisting is Not Configured. Click "Cancel". Double-click the "Include Device Family" setting. If "Include Device Family" is "Enabled" and includes "storage", allowlisting is Not Configured. If neither denylisting nor allowlisting is properly configured, this is a finding.
Fix: F-50260r790571_fix
Ensure the vdm_agent*.admx templates are added. Open the "Group Policy Management" MMC snap-in. Open the site-specific GPO applying Horizon settings to the VDI desktops or RDS hosts. Navigate to Computer Configuration >> Policies >> Administrative Templates >> VMware View Agent Configuration >> View USB Configuration. Option 1, denylist: Double-click the "Exclude Device Family" setting. If the setting is "Disabled" or "Not Configured", click the radio button next to "Enabled". In the field below "Exclude Device Family", add the following: o:storage Click "OK". Option 2, allowlist: Double-click the "Exclude All Devices" setting. If the setting is "Disabled" or "Not Configured", click the radio button next to "Enabled". Click "OK". (Optional) Double-click the "Include Device Family" setting. Make sure the setting is "Enabled". In the field below "Include Device Family", add the site-specific allowlisted device family strings, making sure to not include any "storage". Click "OK".