In Part 3 we deployed the agent to LINUX and started to monitor SUSE LINUX. But just want to give you some impression how and what it is going to look like. The diagram shows you disk, network card and the operating system in a nice view. There is a lot of data you get […]
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
In part 1 we installed the ACS collector, ACS reporting and enabled one Windows server to forward the events to the collector server ACS01. In this part we will install the cross platform part of ACS to collect the events from Linux systems.