Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
Microsoft Azure Operational Insights – Connecting Without SCOM
I previously blogged about Microsoft Azure Operational Insights (MAOI). There are two ways you are able to connect to MAOI, first and best way đŸ™‚ is using SCOM to connect using it’s built-in connector. Another and very easy way is to just install the Microsoft Monitoring Agent and connect this agent directly to MAOI. How […]
SCOM 2012 Linux Monitoring (Lab) – Part 3 Agent Deployment
In part 2 we prepared SCOM to get ready for monitoring LINUX. Now we need to deploy the agent. So let’s get started… Here an overview of the steps we need to take: Create monitoring account Modify sudoers file Discovery wizard Redeploy certificate