Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCOM – Agent in DMZ “Not Monitored” Event ID 20071
You want to monitor an agent in the DMZ and you are sure you implemented everything correctly but the agent just does not turn green. The agent just stays in a “Not Monitored” state. I checked EVERYTHING… Checked certificate template Checked certificates itself Compared the certificate serial number in the registry of the agent and […]
SCOM 2012 Monitoring Cisco UCS – Part 2 Install UCS MP 2.5
In part 1 we build the foundation for monitoring by setting up the UCS emulator. In this part 2 we are going to install the UCS management pack version 2.5. On my SCOM 2012 management server I started the and this will fire up a wizard which we will see now…