Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCOM 2012 Agent Discovery – The user does not have sufficient permission to perform the operation
In SCOM 2007 R2 during the installation process you were ask to enter a SCOM administrator group. This group was automatically added in the SCOM console to Administration/User Roles/Profile: Administrator/Operations Manager Administrators. In SCOM 2012 per default the server local BUILTIN\Administrators group will be added. So far so good. If you decide to remove this […]
Azure Functions – Azure Functions Using Hybrid Connections
I had an idea to access an on-premise source like a database or something else via Azure Functions. There other approaches where you could use Logic Apps and the corresponding gateway to access on-premises system data. But using Logic Apps we relay on connectors and actions and are not as free as using Azure Functions […]