Month: November 2016

Saying Farewell to Snapins!

Saying Farewell to Snapins!

This post was originally published on this site —One of the key improvements to the VMware PowerCLI 6.5 R1 release is the absence of PowerShell snapins. All of the remaining snapins have been converted to modules! Snapin History If you don’t know why this is such a big deal, let me take a second to cover some history on snapins. Going back to the days of PowerShell version 1, snapins were the only way to extend the shell, or add additional features and functionalities. The issue with snapins begin due to how they can only be written in a Read more […]

vCenter Server 6.5 High Availability Performance and Best Practices

vCenter Server 6.5 High Availability Performance and Best Practices

This post was originally published on this site —High availability (aka HA) services are important in any platform, and VMware vCenter Server® is no exception. As the main administrative and management tool of vSphere, it is a critical element that requires HA. vCenter Server HA (aka VCHA) delivers protection against software and hardware failures with excellent performance for common customer scenarios, as shown in this paper. Much work has gone into the high availability feature of VMware vCenter Server® 6.5 to ensure that this service Read more […]

vSphere 6.5 Update Manager Performance and Best Practices

vSphere 6.5 Update Manager Performance and Best Practices

This post was originally published on this site —vSphere Update Manager (VUM) is the patch management tool for VMware vSphere 6.5. IT administrators can use VUM to patch and upgrade ESXi hosts, VMware Tools, virtual hardware, and virtual appliances. In the vSphere 6.5 release, VUM has been integrated into the vCenter Server appliance (VCSA) for the Linux platform. The integration eliminates remote data transfers between VUM and VCSA, and greatly simplifies the VUM deployment process. As a result, certain data-driven tasks achieve a considerable Read more […]

VMSA-2016-0021 and VMSA-2016-0022

VMSA-2016-0021 and VMSA-2016-0022

This post was originally published on this site —— This is a critical security advisory from VMware (VMSA) — Greetings from the VMware Security Response Center! Today we released VMSA-2016-0021 which documents a Moderate severity issue in Vmware Identity Manager (vIDM) tracked by CVE-2016-5334. This issue is similar to a directory traversal (def: OWASP) but based on our analysis the only data you can access are files in the /SAAS/WEB-INF and /SAAS/META-INF directories. While these directories have not been found to contain sensitive data, reading them directly is unintended and warranted a fix. In addition, Read more […]

Paper: VMware vSphere Virtual Machine Encryption Performance

Paper: VMware vSphere Virtual Machine Encryption Performance

This post was originally published on this site —Encryption of virtual machines is something that has been requested for years by the security community. VMware continued to postpone its implementation due to the negative operational impact that many solutions proved to have, until now. With vSphere 6.5 VMware introduced an agnostic, policy driven VM Encryption feature claiming that the impact on I/O performance is very minimal. To prove that VMware published a 16 pages Performance Study which presents the results of several I/O experiments aimed Read more […]

Whitepaper on vSphere Virtual Machine Encryption Performance

Whitepaper on vSphere Virtual Machine Encryption Performance

This post was originally published on this site —vSphere 6.5 introduces a feature called vSphere VM encryption.  When this feature is enabled for a VM, vSphere protects the VM data by encrypting all its contents.  Encryption is done both for already existing data and for newly written data. Whenever the VM data is read, it is decrypted within ESXi before being served to the VM.  Because of this, vSphere VM encryption can have a performance impact on application I/O and the ESXi host CPU usage. We have published a whitepaper, VMware Read more […]

New Release: PowerCLI 6.5 R1

New Release: PowerCLI 6.5 R1

This post was originally published on this site —There’s been a lot of buzz around PowerCLI lately, and we’re keeping it going! It gives me great pleasure to announce the general availability of VMware PowerCLI 6.5 Release 1! Before diving in on all the new features, it’s worth noting that these features are all created based on feedback taken directly from the users. Please help us make the product better by letting us know what would make PowerCLI easier to use and what would make your automation tasks less painful! The PowerCLI Read more […]

New VMware Security Advisory VMSA-2016-0020 and Updated Advisories

New VMware Security Advisory VMSA-2016-0020 and Updated Advisories

This post was originally published on this site —— This is a critical security advisory from VMware (VMSA) — Today VMware has released the following new and updated security advisories:New
VMSA-2016-0020UpdatedVMSA-2016-0016.1VMSA-2016-0018.1 The new advisory documents a deserialization vulnerability in the vRealize Operation REST API, CVE-2016-7462. Please sign up to the Security-Announce mailing list to receive new and updated VMware Security Advisories. Customers should review the security advisories and direct any questions to VMware Support. The post New VMware Security Advisory VMSA-2016-0020 Read more […]

vSphere 6.5 DRS Performance – A new white-paper

vSphere 6.5 DRS Performance – A new white-paper

This post was originally published on this site —VMware recently announced the general availability of vSphere 6.5. Among the many new features in this release are some DRS specific ones like predictive DRS, and network-aware DRS. In vSphere 6.5, DRS also comes with a host of performance improvements like the all-new VM initial placement and the faster and more effective maintenance mode operation. If you want to learn more about them, we published a new white-paper on the new features and performance improvements of DRS in vSphere Read more […]

VMware Workstation target at the PwnFest hacking competition

VMware Workstation target at the PwnFest hacking competition

This post was originally published on this site —— This is a critical security advisory from VMware (VMSA) — VMware Workstation is among the targets of the PwnFest hacking competition. At this event, which is organized along the Power of Community security conference in Seoul, security researchers are demonstrating their attack capabilities. The event is modeled after the well-known Pwn2Own competition. Earlier today at the event, the 360 Marvel Team and security researcher Lokihardt (JungHoon Lee) used the same issue to demonstrate that they could execute code on the VMware Workstation host from the guest. Read more […]