Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
System Center Universe Europe 2014 – Looking Back…
For the second time in a row, the community conference System Center Universe 2014 Europe was held on September 17-19 2014 in Basel-Switzerland. 370 people from 20 different countries attended the conference to learn, present, discuss, meet and have fun. Depending on the person the priority of these activities may changed during the 3 days […]
Azure Policy – Audit and Deploy CanNotDelete Lock on Resource Group Based on Tags
If you move your workloads to production or even preproduction it is highly recommended to protect them not only against data loss but also from accidential deletion. One feature in Azure which can help are Resource Locks. Depending how you configure the lock, you cannot delete the resource, but still read and modify (CanNotDelete lock) […]