Related Articles
Advanced Threat Analytics – Silent Installation “Adventure”
Well I love to automate things a lot using PowerShell – really I do! The success of automation depends on two major things. First there are the detailed requirements and secondly technical documentation of your stuff you want to automate. In reality, most projects do not cover both parameters in a satisfying way at all. […]
SCOM 2012 Linux Monitoring (Lab) – Part 3 Agent Deployment
In part 2 we prepared SCOM to get ready for monitoring LINUX. Now we need to deploy the agent. So let’s get started… Here an overview of the steps we need to take: Create monitoring account Modify sudoers file Discovery wizard Redeploy certificate
System Center Universe Europe 2015 – Speaker
I am very happy to speak at the annual conference System Center Universe Europe (SCU Europe). I will have 2 sessions together with Stefan Johner and the second session with my MVP buddy Stefan Koell. Business Process Automation – A Real Real World Scenario, No Fakes Just Facts Level:300 Track:Track “Systems & Cloud Management” Time:25.08.2015 […]