SCOM Advanced Authoring: TCP Port Monitoring

It’s been long time since I blogged about SCOM Authoring. Following the Blog Post on PowerShell Discovery from CSV File I got numerous feedbacks from fellow techies to complete the TCP Port Monitoring MP with monitors and rules. One of our friend even has created an MP which he has blogged out here. Anyways, I…


Field Notes: The case of Active Directory Diagnostics – Data Collector Set Fails to Start

Performance Monitor is a great tool for collecting and analyzing performance data in Windows and Windows Server.  There are many counters available that one can look at to help understand how the system is performing.  Unfortunately analysis of performance data may not always be straightforward for some system administrators.  Luckily, there is the built-in Data…

0

Windows Admin Center–Part 1 of Optimization Series

This is going to be the first in a series of posts on how to optimize your environment, with the tools provided by Microsoft at no cost to you.   Windows Admin Center which can be downloaded here is the Natural evolution and ultimate replacement for Server Manager.   It is a Free, single lightweight…


Going Serverless with Azure Functions & Powershell: SendGrid

In this post, we will discuss the process of creating that solution using Azure Function Apps and SendGrid to send emails based on your Powershell Functions which runs in your local machine. We will see that how can we build a serverless email solution that reports your disk usage with Azure Functions, SendGrid and Powershell….

1

Field Notes: The case of buried Active Directory Account Management Security Audit Policy events

Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system.  As part of your overall security strategy, you should determine the level of auditing that is appropriate for your environment.  Auditing should identify attacks (successful or not) that pose a threat to your network, and…

0

Time zone issues when copying SCOM alerts

Background When trying to copy-paste (ctrl+c, ctrl+v) alerts from the SCOM console to an Excel worksheet or just a text file, we noticed that the Created field values where different from the ones displayed in the console. There was a two-hour difference. As it turns out, the server was configured in a GMT+2 time zone,…


Most Common Mistakes in Active Directory and Domain Services – Part 3

This blog post is the third (and last) part in the ‘Most Common Mistakes in Active Directory In Domain Services” series. In the previous parts, we covered some major mistake like configuring multiple password policies using GPO and keeping FFL/DFL at a lower version. The 3’rd part of the series is no exception. we’ll go…


Step by step MIM PAM setup and evaluation Guide – Part 3

This is third part of the series. In the previous posts we have prepared test environment for PAM deployment, created and configured all needed service accounts, installed SQL Server and prepared PIM server for further installation. Now we have two forests – prod.contoso.com and priv.contoso.com. In PROD we have set up Certificate services, Exchange server,…


Field Notes: The case of the failed SQL Server Failover Cluster Instance – Binaries Disks Added to Cluster

I paid a customer a visit a while ago and was requested to assist with a SQL Server Failover Cluster issue they were experiencing.  They had internally transferred the case from the SQL team to folks who look after the Windows Server platform as they could not pick up anything relating to SQL during initial…

0

Understanding Volume Activation Services – Part 2 (Active Directory-Based Activation)

In the previous part of the series, we talked about KMS, MAK, and how to choose between the two when looking for the right activation method in your environment. Today, we are going to talk about Active Directory-based activation or ADBA in short. Series: Part 1 – KMS and MAK Part 2 – Active Directory-Based…