There are sometimes alerts which might contain some strange id’s which are not as informational as you might would like have. One way to find out what is hiding behind this id is to use a SCOM Powershell command. As an example, today I received an alert that looked like this…
As promised here another short video from my “Friday Rules” series on creating SCOM monitoring rules. This time I will show you, how you can monitor the creation of local groups on your server using the WMI Event (Alert) rule. Have fun!
A few month ago at MMS in Las Vegas, Veeam announced their management pack for VMware for free for up to 10 sockets! I was very surprised to read that because I had seen it before and it is amazing how much information you get out of this management pack. In my opinion the best […]