Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
Azure Functions – Setting Tags on Subscriptions Using C#
It has been a couple of month ago, Microsoft announced that it is possible to set tags on subscriptions. This makes totally sense and was a long awaited feature. Good practice is to use Azure Policy to set tags on resources, but there are cases where it is not possible to use Azure Policy. Well, […]
SCOM 2016 – What’s New UNIX/Linux Series: Discovery Wizard Provide RunAs Account
I just want to start a short series “SCOM 2016 – What’s New Unix/Linux” where I show you what’s new in SCOM 2016 from a UNIX/Linux perspective. We start of with the discovery wizard. In SCOM 2012 R2 when you discovered the UNIX/Linux systems you always had to provide the credentials for deploying the agent. […]