Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCOM – New “Friday Rules” Series…Let’s Rule!
Today I would like to announce “Friday Rules”. Yes, of course Friday rules, but in my context I am going to publish short videos about the monitoring rules in SCOM always on a Friday. My goal is to show a short example (10-15 minutes) how you can create rules and what those can do for […]
SCOM 2012 – Server Boot Check and Availability HTML Report (PowerShell Script)
As there are many good ideas out there and so many bright minds, you just have to pull all this energy together mix it with your own ideas and you will create wonderful things. A practical example would be the following story. A customer who likes simple things came up with an idea. Imagine you […]