If you have the pleasure or meeting certain audits or security compliance then having a login banner message on your systems is a pretty common requirement. Sometime ago I detailed how to add a login banner message to ESXi hosts, below I’ll show how easy it is to do the same with your VMware vSphere web client or HTML5 client using vSphere 6.0 Update 2 or better.
With the release of VMware vCenter 6.5 Update 1 also comes VMware ESXi 6.5 Update 1 and just like vCenter there are a number of changes, updates, and fixes for ESXi as well in 6.5 Update 1 – you can see the release notes here.
Yesterday I made a post on how to upgrade VMware VCSA 6.5 to 6.5 Update 1. Below I’ll show you three ways to upgrade your ESXi hosts to 6.5 Update 1.
VMware just released VMware vCenter 6.5 Update 1 just last month, in case you’ve missed it check out the release notes as there are a lot of fixes, improvements and additions.
In this post we’ll see just how easy it is to update the VMware VCSA. Before you do any VMware update I’d highly recommend checking out the VMware Interoperability Matrices to check compatibility of other VMware products. Once you’ve done that, lets begin!
With the release of vSphere 6.5, the VCSA has had a built-in and convenient way easily backup the configuration, inventory and even historical data right from the VAMI and directly into a TAR bundle. VMware has also made restoring the VCSA from a backup just as easy as well.
Below are quick and dirty steps to backing up and restoring your VMware VCSA!
Just the other day we had a Windows Server 2008 R2 Standard physical server that needed to be P2V’ed, and after trying to use VMware Converter Standalone 6.1.1 we ran into the error message “Permission to perform this operation was denied” after entering the source machine details.
Even after trying to start VMware Converter as “Run as administrator” the error persisted. Below is the workaround we performed to quickly allow us to P2V the physical server.
VMware has just released Workstation 12.5.5 which includes bug fixes as well as fixes for several vulnerabilities found in this years Pwn2Own contest, which two hacking teams, 360 Security (@mj011sec) and Team Sniper was able to successfully complete a virtual machine escape.
While these are serious exploits, VMware has said they are not aware of any active exploitation of the vulnerabilities that has now been fixed in 12.5.5.