Related Articles
SCOM / SCSM – Retrieve Decrypted RunAs Account Credentials
I am not sure if you have seen it, but Richard Warren from nccgroup has figured out, how to decrypt the RunAs account credentials in SCOM. The problem up to now was, that there was no official way to retrieve the encrypted credentials from SCOM. There is just one DLL to use, which offers the […]
SCOM 2012 Linux Monitoring (Lab) – Part 4 Monitoring Application Server
In Part 3 we deployed the agent to LINUX and started to monitor SUSE LINUX. But just want to give you some impression how and what it is going to look like. The diagram shows you disk, network card and the operating system in a nice view. There is a lot of data you get […]
SCOM – New “Friday Rules” Series…Let’s Rule!
Today I would like to announce “Friday Rules”. Yes, of course Friday rules, but in my context I am going to publish short videos about the monitoring rules in SCOM always on a Friday. My goal is to show a short example (10-15 minutes) how you can create rules and what those can do for […]