Panel Discussion: Extending SCOM
25 mins
SCOM is great the way it comes, but we all know you can get so much more from it by extending it, from additional monitoring to platform iterations, our
Gerald started working with IT Monitoring solutions in 2001, initially with BMC products and moving to SCOM with the release of SCOM 2012. He has worked for consulting companies for about 15 years on a variety of projects, building expertise in pretty much all things SCOM and occasionally digressing into other technologies like SQL Server. He now spearheads a small team of monitoring specialists at Stater NV in Amersfoort, enjoying the variety involved in monitoring, as well as sharing his experiences – starting from a simple one-liner: Monitoring isn’t next-next-finish, it’s next-next-begin.
25 mins
SCOM is great the way it comes, but we all know you can get so much more from it by extending it, from additional monitoring to platform iterations, our
11 mins
Any system using impersonation has an inherent security issue: the accounts being impersonated can be used but also abused. When it comes to RunAs accounts in SCOM, that same risk exists – and even worse, these accounts usually need to perform system administration-like tasks, and that means they have considerable privileges. Gerald Versluis address the challenges with changing a RunAs Account password.