Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
Power BI – AAD Activity Logs App: The credentials provided for the AADData source are invalid
Power BI used to have Content Packs which were a way to package up your dashboards, reports, Excel workbooks and datasets for Power BI. Microsoft changed it now to so called Apps, probably to be consistent with their Azure terms. There is an interesting App for Azure Active Directory to analyze the Activity Logs. If […]
SCOM / OMS – MP University 2017 Recording
Yes, Silect did it again! Few days ago Silect Software provided MP University 2017, an online event packed with sessions from well known names like Kevin Holman, Brian Wren and Aditya Goda from Microsoft, Marnix Wolf from Didacticum and Mike Sargent from Silect. What I like about this event is, that it is not marketing […]