<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: unauthorized kernel modules loaded in memory in VMware PowerCLI Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811346#M98265</link>
    <description>&lt;P&gt;Unsigned means there is no digital signature on the module.&lt;/P&gt;</description>
    <pubDate>Fri, 20 Nov 2020 14:13:24 GMT</pubDate>
    <dc:creator>LucD</dc:creator>
    <dc:date>2020-11-20T14:13:24Z</dc:date>
    <item>
      <title>unauthorized kernel modules loaded in memory</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811281#M98259</link>
      <description>&lt;P&gt;I'm trying to get&amp;nbsp;unauthorized kernel modules loaded in memory, I'm using the script below, unfortunately it's not working &lt;img class="lia-deferred-image lia-image-emoji" src="https://communities.vmware.com/html/@5FC79C0032E597F6EC0C3A71500D7708/emoticons/1f61e.png" alt=":disappointed_face:" title=":disappointed_face:" /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Foreach ($VMHost in Get-VMHost ) {&lt;BR /&gt;&lt;BR /&gt;$ESXCli = Get-EsxCli -VMHost $VMHost -V2&lt;BR /&gt;$ESXCli.system.module.list.invoke() | ForEach-Object {&lt;BR /&gt;$ESXCli.system.module.get.invoke($_.Name) | Select-Object @{N="VMHost";E={$VMHost}}, Module, License, Modulefile, Version, SignedStatus, SignatureDigest, SignatureFingerPrint } }&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 09:48:25 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811281#M98259</guid>
      <dc:creator>SCharchouf</dc:creator>
      <dc:date>2020-11-20T09:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: unauthorized kernel modules loaded in memory</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811293#M98261</link>
      <description>&lt;P&gt;I read that incorrectly.&lt;BR /&gt;You are trying to list unauthorized modules. Correct?&lt;BR /&gt;&lt;BR /&gt;And what specifically is not working?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 10:57:58 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811293#M98261</guid>
      <dc:creator>LucD</dc:creator>
      <dc:date>2020-11-20T10:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: unauthorized kernel modules loaded in memory</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811313#M98263</link>
      <description>&lt;P&gt;Ok, just looked closer at your script.&lt;BR /&gt;You have to provide the parameter to the get command in a hash table.&lt;BR /&gt;Like this&lt;/P&gt;&lt;LI-CODE lang="csharp"&gt;Foreach ($VMHost in Get-VMHost ) {

    $ESXCli = Get-EsxCli -VMHost $VMHost -V2
    $ESXCli.system.module.list.Invoke() | ForEach-Object {
        $ESXCli.system.module.get.Invoke(@{module=$_.Name}) | 
        Select-Object @{N="VMHost";E={$VMHost}}, 
            Module, License, Modulefile, Version, SignedStatus, SignatureDigest, SignatureFingerPrint
    }
}&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 20 Nov 2020 11:36:39 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811313#M98263</guid>
      <dc:creator>LucD</dc:creator>
      <dc:date>2020-11-20T11:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: unauthorized kernel modules loaded in memory</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811331#M98264</link>
      <description>&lt;P&gt;Thank LucD it's OK &lt;img class="lia-deferred-image lia-image-emoji" src="https://communities.vmware.com/html/@7651DD0E8772B3B5D93ADA9ABA2E067C/emoticons/1f642.png" alt=":slightly_smiling_face:" title=":slightly_smiling_face:" /&gt;&lt;/P&gt;&lt;P&gt;by the way do you know what mean if the Module is unsigned despite that the image used is the one from HPE: a Customized Image?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 13:33:00 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811331#M98264</guid>
      <dc:creator>SCharchouf</dc:creator>
      <dc:date>2020-11-20T13:33:00Z</dc:date>
    </item>
    <item>
      <title>Re: unauthorized kernel modules loaded in memory</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811346#M98265</link>
      <description>&lt;P&gt;Unsigned means there is no digital signature on the module.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 14:13:24 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/unauthorized-kernel-modules-loaded-in-memory/m-p/2811346#M98265</guid>
      <dc:creator>LucD</dc:creator>
      <dc:date>2020-11-20T14:13:24Z</dc:date>
    </item>
  </channel>
</rss>

