Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
OMS – Log Search Cheat Sheet
A bit more than 2 years ago I created a cheat sheet for Azure Operational Insights Search Data Explorer, today known as Operations Management Suite (OMS) Log Search. Over the years this technology has evolved and grown to one of THE most exciting products from Microsoft. The log search syntax has also grown and got […]
SCOM 2012 SP1 – Upgrading Linux Agent From SCOM 2007 R2
This week I was working for an international customer. The customer had a SCOM 2007 R2 CU5 infrastructure installed on Windows 2008 R2 SP1 servers with ~800 Windows agents and ~250 Unix based agents which they were going to migrate to SCOM 2012 SP1 UR2 installed on Windows Server 2012 in a side-by-side scenario. Because […]