Since the advent of SCOM, one question that lingers among the admins and the end consumers is What is the effective monitoring configuration for a server or an object or an alert? Microsoft answered with Export-SCOMEffectiveMonitoringConfiguration PS Cmdlet which you can use to get effective config for an Instance (Object). This will export the data … Continue reading SCOM Effective Monitoring Configuration – Decoded
Author: GK
SCOM Advanced Authoring: TCP Port Monitoring
It's been long time since I blogged about SCOM Authoring. Following the Blog Post on PowerShell Discovery from CSV File I got numerous feedbacks from fellow techies to complete the TCP Port Monitoring MP with monitors and rules. One of our friend even has created an MP which he has blogged out here. Anyways, I … Continue reading SCOM Advanced Authoring: TCP Port Monitoring
Intune Device Management – Removing Local Admins in Windows 10 Devices
Following up to the post on renaming windows 10 devices that are managed by Intune, another frequent requirement is remove the local user accounts from Administrators group. The AAD user account will be provisioned as Standard User and hence removing the local user accounts from Admin group is critical to secure the device from unauthorized … Continue reading Intune Device Management – Removing Local Admins in Windows 10 Devices
Intune Device Management – Renaming Windows 10 Devices
I have come across customers who auto enroll Azure AD domain joined Windows 10 devices in Intune and use the device management capabilities like enforcing compliance polices, configuring certificates, Wi-Fi, VPN, Endpoint and other profiles. These devices are remotely used, and IT team does not have much control. Most frequent ask is to rename the … Continue reading Intune Device Management – Renaming Windows 10 Devices
Windows Automatic Services Monitoring using SCOM
Monitoring services in windows computers is available out of box in SCOM through Service Monitoring Template. But in a large enterprise with over 1000s of windows computers and 100s of applications, it is difficult to list out all services that needs to be monitored in each computer and create monitoring using template. Consider monitoring on … Continue reading Windows Automatic Services Monitoring using SCOM
SCOM Advanced Authoring : Powershell Discovery from CSV file – Explained using “TCP Port Monitoring” Scenario
SCOM is exceptional tool which allows IT Administrators to customize the monitoring scenario to any extent. To have a customized monitoring solution, one must understand the authoring capabilities in SCOM, so that the solution can be easily implemented, highly optimized and has less overhead on SCOM Management servers and agents. In this post we will … Continue reading SCOM Advanced Authoring : Powershell Discovery from CSV file – Explained using “TCP Port Monitoring” Scenario
PowerShell: Retrieve Group Policy details for Remote Computer
There are multiple scenarios as a part of AD management where we need to retrieve Group Policy information for managed computers. There are generally two methods to get the information. Method 1: Most common method is to use gpresult.exe command which is detailed in this technet article. This works well only if that User … Continue reading PowerShell: Retrieve Group Policy details for Remote Computer
SCOM: Unix/Linux Shell Command Monitoring – Unique Requirement
When I was working with a customer recently, I came across an requirement, to execute a Shell Command and based on the results, the monitor state needs to be set for Target Server. One of the best example solution available in web is this. THE PROBLEM: But the uniqueness however in this requirement is that … Continue reading SCOM: Unix/Linux Shell Command Monitoring – Unique Requirement
PowerShell Script to Simulate Outlook Web Access URL User Logon
Recently I came across with a requirement to do user logon synthetic transaction on Outlook Web Access URL and capture its performance. This can be accomplished using Invoke-WebRequest PowerShell command let. The command let returns form elements which needs to be filled with username and password and the login page is invoked with the post data. … Continue reading PowerShell Script to Simulate Outlook Web Access URL User Logon
You must be logged in to post a comment.