Related Articles
SCOM 2012 SP1 – Part 3: Audit Collection Services (ACS) Testing Cross Platform Logging
In part 1 and part 2 we installed ACS for collection Windows and Linux events. In part 3 I am going to show how the cross platform ACS works in an easy example. In part 2 we had a close look at a specific rule called Delete User. I think this is a perfect example […]
Jalasoft – Xian SNMP Device Simulator V5
At some point in your SCOM career you need to have quick access to a network device because you either need to show the SCOM network monitoring capabilities, develop a SNMP management pack or you might need to build some custom SNMP monitors or rules. I think it is always a pain to carry a […]
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]