Summary SharePoint monitoring in SCOM has a unique configuration that is often overlooked or implemented incorrectly. This post contains a pair of...
Fixing Web Recording in SCOM 2012 R2
Hello fellow monitoring aficionados, Today we’re going to be talking about Web Transaction Monitoring. Specifically, the issues with getting...
Have SCOM? Test OMS with Ease!
Summary This post shows how to leverage your existing SCOM investment to rapidly onboard and test OMS, Microsoft's Operations Management...
SCOM: Access Performance Data with PowerShell
Summary This post describes how to access performance data from SCOM via PowerShell. Introduction One of the most useful...
SCOM: How to Change the Data Warehouse Write Account Credentials
Summary Microsoft's official documentation on managing SCOM's service accounts lacks any instructions on updating the Data Warehouse Write...
All Recent Posts
The Invisible Threat: How Non-Technical Attacks Lead to Data Breaches and How to Prevent Them
When we think of cybersecurity breaches, we often picture elite hackers launching advanced attacks...
Third-Party Cybersecurity Exposure: Top 5 Actions to Safeguard Your Enterprise Risk Management Strategy
In today’s interconnected business environment, third-party relationships are critical to...
The Hidden Dangers of Unauthorized Access: Why Ignoring These 98 Security Measures Puts Your Business at Risk
In the modern enterprise, unauthorized access is one of the most significant...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.