Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
Azure Monitor – Application Insights Status Monitor v2 (Part 1)
Do you have a .NET application running somewhere in your datacenter or in the cloud and you have the need to monitor it properly? Maybe you need some APM tool or you just want to diagnose, if there are any failure or issues and what it might be causing these problems? In addition, you might […]
SCOM / SCSM – Retrieve Decrypted RunAs Account Credentials
I am not sure if you have seen it, but Richard Warren from nccgroup has figured out, how to decrypt the RunAs account credentials in SCOM. The problem up to now was, that there was no official way to retrieve the encrypted credentials from SCOM. There is just one DLL to use, which offers the […]