Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCOM 2012 – Comparing Deployed Agents vs. Active Directory Computer Objects (PowerShell)
It has been a moment since my last post, but I assume you know how everything goes crazy before Christmas. This time I would like to share a script which is very useful while implementing SCOM. When you deploy agents you will be guided by the SCOM wizard and at the server selection appear only […]
Good-by SCOMfaq – Welcome stefanroth.net
I have been blogging about 2.5 years now mostly about System Center Operations Manager. I also blogged about Orchestrator and useful PowerShell scripts. My goal is always to provide a solution to a problem. There are many blogs out there which blog about WHAT is new but not HOW to use the technology or HOW […]