Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SQL Server – Gain Easy Sysadmin Access (!)
Today I had a very cool idea, which I like to share. A customer of mine had trouble with his SQL Server 2008 R2. Because of that, he needed to open SQL Server Management Studio for troubleshooting and then he realized that he was not able to login into SQL server neither with his domain […]
Orchestrator – Another Useful Runbook for SCOM 2012 SP 1
There are certain situations respectively alerts where you can not decide to override or not to override. You would like to see the alert for a certain time but then it should disappear after a short time. I think you know what I mean. I am talking about the informational alerts. Those alerts are somehow […]