Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCOM 2012 Monitoring Cisco UCS – Part 2 Install UCS MP 2.5
In part 1 we build the foundation for monitoring by setting up the UCS emulator. In this part 2 we are going to install the UCS management pack version 2.5. On my SCOM 2012 management server I started the and this will fire up a wizard which we will see now…
SCOM 2012 Agent Failover – An Event Log Check
Sometimes we need a sign to check that some things happen . For me I wanted to visualize and verify if a SCOM agent failed over properly or not. As you might know the Windows agents do not report to a SCOM 2012 resource pool. If you install an agent on a Windows server the […]