Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCU 2013 DACH – Session Video “Space Shuttle Launch Exploring other Galaxies with Operations Manager”
System Center Universe DACH ended last week and as you might have seen Marcel Zehner and Stefan Koell have posted some reviews about this event. These guys just bring it to the point. MVP Stefan Koell and I agree that SCU DACH was…
SCOM 2012 Linux Monitoring (Lab) – Part 1 Setup SUSE 11.1
This time I wanted to try LINUX monitoring using SCOM 2012. It has been a long time since I used to setup a LINUX system and it took me a short time to remember all the basic commands. Although you don’t need that much shell hacking but it always helps if you know at least […]