From 0f170fc9fc4f92d362123a2cf3f41c65ff8a5c2e Mon Sep 17 00:00:00 2001 From: John Bowdre Date: Fri, 17 Feb 2023 13:16:51 -0600 Subject: [PATCH 1/5] update post --- .../psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md b/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md index 0d62636..cf84e18 100644 --- a/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md +++ b/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md @@ -4,7 +4,7 @@ date: 2023-02-17T12:24:48-06:00 # Date of post creation. # lastmod: 2023-02-17T12:24:48-06:00 # Date when last modified description: "Quick warning about a problematic patch from Microsoft, and a PowerCLI script to expose the potential impact in your vSphere environment." # Description used for search engine. featured: false # Sets if post is a featured post, making appear on the home page side bar. -draft: # Sets whether to render this page. Draft of true will not be rendered. +draft: false # Sets whether to render this page. Draft of true will not be rendered. toc: true # Controls if a table of contents should be generated for first-level links automatically. usePageBundles: true # menu: main From ac1f90c8006f76830bbec6ea4410f3b79229ca10 Mon Sep 17 00:00:00 2001 From: John Bowdre Date: Fri, 17 Feb 2023 13:21:53 -0600 Subject: [PATCH 2/5] minor formatting tweak --- .../psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md b/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md index cf84e18..17654bd 100644 --- a/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md +++ b/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md @@ -38,7 +38,8 @@ $secureBoot2022VMs = foreach($datacenter in (Get-Datacenter)) { $datacenter | Get-VM | Where {$_.Guest.OsFullName -Match 'Microsoft Windows Server 2022' -And $_.ExtensionData.Config.BootOptions.EfiSecureBootEnabled} | Select @{N="Datacenter";E={$datacenter.Name}}, - Name, @{N="Running OS";E={$_.Guest.OsFullName}}, + Name, + @{N="Running OS";E={$_.Guest.OsFullName}}, @{N="Secure Boot";E={$_.ExtensionData.Config.BootOptions.EfiSecureBootEnabled}}, PowerState } From 30ca751deaa11885fcbdb6fd90988af5aac09ddd Mon Sep 17 00:00:00 2001 From: John Bowdre Date: Fri, 17 Feb 2023 13:30:03 -0600 Subject: [PATCH 3/5] sidebar: use embed for vExpert badge --- layouts/partials/sidebar.html | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/layouts/partials/sidebar.html b/layouts/partials/sidebar.html index cc775e9..f897008 100644 --- a/layouts/partials/sidebar.html +++ b/layouts/partials/sidebar.html @@ -28,7 +28,7 @@ {{ markdownify $introDescription }}
- VMware vExpert + vExpert Badge
{{- if ( ne $s.introURL false ) }} {{- $r := T "read_more" }} @@ -37,11 +37,11 @@ {{- end }} {{ if .Site.Params.sidebardisclaimer }} -
-

Disclaimer

+
+

Disclaimer

{{ .Site.Params.disclaimerText }} -
- {{ end }} +
+ {{ end }} {{- $relatedInSidebar := true }} {{- if eq $s.showRelatedInSidebar false }} From 08386267ab399f539ddee5dc8468f0361a685738 Mon Sep 17 00:00:00 2001 From: John Bowdre Date: Fri, 17 Feb 2023 13:35:46 -0600 Subject: [PATCH 4/5] add link to Secure Boot documentation --- .../psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md b/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md index 17654bd..c348ebc 100644 --- a/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md +++ b/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md @@ -30,7 +30,7 @@ Microsoft released [a patch](https://msrc.microsoft.com/update-guide/releaseNote So yeah. That's, uh, *not great.* -If you've got any **Windows Server 2022** VMs with **Secure Boot** enabled on **ESXi 6.7/7.x**, you'll want to make sure they *do not* get **KB5022842** until this problem is resolved. +If you've got any **Windows Server 2022** VMs with **[Secure Boot](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-898217D4-689D-4EB5-866C-888353FE241C.html)** enabled on **ESXi 6.7/7.x**, you'll want to make sure they *do not* get **KB5022842** until this problem is resolved. I put together a quick PowerCLI query to help identify impacted VMs in my environment: ```powershell From 6bc248acb8017d6cc6abf3e0f065050d49e2b2f6 Mon Sep 17 00:00:00 2001 From: John Bowdre Date: Fri, 17 Feb 2023 13:58:15 -0600 Subject: [PATCH 5/5] don't use alias in script --- .../index.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md b/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md index c348ebc..e5210fc 100644 --- a/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md +++ b/content/posts/psa-microsoft-kb5022842-breaks-ws2022-secure-boot/index.md @@ -36,8 +36,8 @@ I put together a quick PowerCLI query to help identify impacted VMs in my enviro ```powershell $secureBoot2022VMs = foreach($datacenter in (Get-Datacenter)) { $datacenter | Get-VM | - Where {$_.Guest.OsFullName -Match 'Microsoft Windows Server 2022' -And $_.ExtensionData.Config.BootOptions.EfiSecureBootEnabled} | - Select @{N="Datacenter";E={$datacenter.Name}}, + Where-Object {$_.Guest.OsFullName -Match 'Microsoft Windows Server 2022' -And $_.ExtensionData.Config.BootOptions.EfiSecureBootEnabled} | + Select-Object @{N="Datacenter";E={$datacenter.Name}}, Name, @{N="Running OS";E={$_.Guest.OsFullName}}, @{N="Secure Boot";E={$_.ExtensionData.Config.BootOptions.EfiSecureBootEnabled}},