STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide

V-240857

CAT II (Medium)

tc Server HORIZON must be configured with the appropriate ports.

Rule ID

SV-240857r879756_rule

STIG

VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-001762

Discussion

Web servers provide numerous processes, features, and functionalities that utilize TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The web server must provide the capability to disable or deactivate network-related services that are deemed to be non-essential to the server mission, are too unsecure, or are prohibited by the PPSM CAL and vulnerability assessments. An essential configuration file for tc Server is catalina.properties. The ports that tc Server listens to will be configured in that file.

Check Content

At the command prompt, execute the following command:

cat /opt/vmware/horizon/workspace/conf/catalina.properties | grep -E '\.port'

Review the listed ports. Verify that they match the list below of tc Server HORIZON ports.

base.shutdown.port=-1
base.jmx.port=6969
bio-ssl.https.port=6443

If the displayed ports do not match the above list of ports, this is a finding.

Fix Text

Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties.

Navigate to the ports specification section.

Set the tc Server HORIZON port specifications according to the list below:

base.shutdown.port=-1
base.jmx.port=6969
bio-ssl.https.port=6443