Related Articles
Summary of Permission needed – Security in SCOM
Kevin Holman has postet a valuable summary of permissions needed in SCOM. It is about accounts needed and customizing the SCOM console! Great article! You will find it here.
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SMA – ISE Add-On Editing Runbooks
A couple of month ago Microsoft released the latest (updated) version of PowerShell 5.0 . Why is this worth writing about? Well, with every new release there are some fantastic goodies included, you just need to discover them :). One of these goodies is (my) long awaited runbook editing capability for ISE. In this post […]