Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCOM – Extensible Network Monitoring Management Pack Generator Tool
Microsoft just released the Extensible Network Monitoring Management Pack Generator tool which allows you to build custom SNMP management packs. In my previous post SCOM 2016 TP5 I have written a post about the prototype of this tool which was command line driven. I addressed some missing parts like a GUI, custom SNMP components and […]
Azure Log Analytics – Testing JOINs Part 2
In part 1 we got a pretty good understanding how joins work and what the results are. To make this a complete series we will now work on the remaining join types. Full Outer The fullouter join is a join that shows in addition to the inner matches, there’s a row for every row on […]