Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
SCOM 2012 / SCSM 2012 – CMP Tool V 1.0 (Compare Management Pack Tool)
This blog has been quiet for some time because I was quite busy with all kind of stuff. Anyway, this time I would like to share a tool I created to compare management packs in SCOM /SCOM or SCOM/SCSM, SCSM/SCSM management groups. In real life it is hard to compare the current management packs installed […]
Application Insights – Getting Started…
When System Center Operations Manager 2012 R2 was released, the SCOM agent name changed to Microsoft Monitoring Agent. Almost at the same time Microsoft released a standalone version of this agent called also Microsoft Monitoring Agent (MMA). Currently is a preview version of Microsoft Monitoring Agent UR1 available for download. But what does that mean […]