Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCOM 2012 SP1 – Part 1: Audit Collection Services (ACS) Setup
SCOM 2012 SP1 has been released and I was wondering how the setup behalves and how the look and feel is going to be. Therefore, I decided to play around with Audit Collection Services and write a 4 part blog series about it. Cool, huh? This 4 part series is going discusses in part 1 […]
SCOM 2012 – Get Rule / Monitor Details For Corresponding Workflow Name
Sometimes you receive alerts from SCOM which contain a lot of content in the description. For example in certain cases you receive alert like this… In this description you see the workflow name Microsoft.Windows.Server.2008.NetworkAdapter.PercentBandwidthUsedTotal.Collection. In some cases it is more difficult to figure out a bit more about a workflow and using the GUI search […]