In this article you will learn some best-practice suggestions for using service applications according to the IT security rule of least privilege.
In this article you will learn the fundamentals of Windows service accounts. Specifically, we discover the options and best practices concerning the selection of a service account for a particular service application.
In this final part of the eight part technical review of SCOM 2012 we’ll look at the new dashboard functionality and how they can be displayed in different environments, including SharePoint 2010 and we’ll add some final remarks around SCOM 2012.
In this article you will learn how the Shutdown Event Tracker works in Windows Server 2008 R2. You will also understand how to disable this functionality if your business needs dictate this action.
In this seventh part of the eight part technical review of SCOM 2012 we’ll look at cross platform monitoring of Unix and Linux and some welcome improvements there as well as how the new Java Enterprise Edition (JEE) application server monitoring fits in.