Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
Azure Policy – Audit and Deploy CanNotDelete Lock on Resource Group Based on Tags
If you move your workloads to production or even preproduction it is highly recommended to protect them not only against data loss but also from accidential deletion. One feature in Azure which can help are Resource Locks. Depending how you configure the lock, you cannot delete the resource, but still read and modify (CanNotDelete lock) […]
Microsoft Azure Operational Insights – Search Data Explorer Cheat Sheet
At TechEd Europe Microsoft officially announced Microsoft Azure Operational Insights. If you are not familiar with it check my previous posts about this new “tool”. Behind all these sexy dashboards there is also a very powerful search engine called “Search Data Explorer”. It uses a search window where you can enter a query to get […]