Create Azure monitor Alert based on Custom metrics
Azure Diagnostics Extension provides the basic monitoring and diagnostics capabilities on a Azure resources. Diagnostics agent enable monitoring Azure guest VM, with capabilities to use standard...
View ArticleUnderstanding Volume Activation Services – Part 3 (Microsoft Office...
Part 1 and 2 of the series were dealing with KMS, MAK, and ADBA. In part 3 we will focus on how to activate Microsoft Office using each of the three activation methods, and explain the limitation and...
View ArticleAzure MFA over NPS MFA Extension
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension The MFA extension for NPS is the new way of integration if you dont want to host the MFA self-service...
View ArticleQuerying Azure Resource Graph
In this blog post, we’ll discuss the purpose and usage of the Azure Resource Graph. This is the first part in a series of posts, so it will updated with links to the following posts in the series as...
View ArticleMonitoring Database Query Result
For monitoring a result from DB, you must use either a script or a PS or VB type, when the script makes a query to the database analyze the information and alert according to the condition detection....
View ArticleField Notes: Azure Active Directory Connect – Federation with AD FS
I started off this Azure AD Connect series by going through the express installation path, where the password hash synchronization sign-in option is selected by default. This was followed by the...
View ArticleStep by Step: Enforce Require LDAP Signing on domain controllers. Part 1
Introduction: One of the security settings that Microsoft recommend applying on domain controllers is to Require LDAP Signing. Requiring LDAP signing is one policy setting that can be applied on a few...
View ArticleStep by Step: Enforce Require LDAP Signing on domain controllers. Part 2
Introduction On Part 2 of this post, I will show how to request a certificate for a domain controller to use LDAPS, we will see also why we should never use simple bind on clear text. This post is...
View ArticleField Notes: Azure Active Directory Connect – Verifying Federated Login
I started off this Azure AD Connect series by going through the express installation path, where the password hash synchronization sign-in option is selected by default. This was followed by the...
View ArticleDisable SCOM management pack on a group of agents
One of the advantages of the SCOM system is the accompanying Management Packs, these packages give us the ability to easily monitor all the system components automatically, but the monitoring by...
View ArticleSCOM DB Fragmentation Issue
Sometimes SCOM environments slowness is occurring because of SQL fragmented indexes. Fragmentation happens when the logical order of pages in an index does not match the physical order in the data...
View ArticleAudit Access to C$
Hi Guys, a customer asked me for a visibility about who is accessing C$ on his environment, users were claiming about admins that are using domain admins privileges to access c$ on client computers....
View ArticleUse Azure Automation to install and configure the Log Analytics extension
In this post, I’ll show how you can use an Azure Automation runbook to deploy and configure the Log Analytics extension to a group of virtual machines running either Windows or Linux. In case you’re...
View ArticleSCOM Effective Monitoring Configuration – Decoded
Since the advent of SCOM, one question that lingers among the admins and the end consumers is What is the effective monitoring configuration for a server or an object or an alert? Microsoft answered...
View ArticleInstalling SCOM 2019 fails with “Error: :PopulateUserRoles: failed”
Background I recently came across a scenario where installing SCOM 2019 fails shortly after the Operational database configuration step, specifically during the Populating User Roles sequence. The...
View ArticleAzure Application Insight – Create Dashboard from several resources
Introduction: Azure Application insight its solution to keeps track of Application performance and failures, user’s behavior and more. For an introduction, here is a few words about the service:...
View ArticleSecurity – Transport Layer Security(TLS) 1.2 Calculation
Enabling TLS and SSL on Windows machines requires you to set registry keys. https://support.microsoft.com/en-us/help/3140245/update-to-enable-tls-1-1-and-tls-1-2-as-default-secure-protocols-in-wi 2....
View ArticleUsing SCCM DCM Feature to monitor GPO application in the environment
The Issue A Common issue that keeps being experienced across customer sites, is the application of Group Policies on machines By default when a GPO is created and linked, it should apply to all the...
View ArticleField Notes: Azure Active Directory Connect – Troubleshooting Task Overview
This is a continuation of a series on Azure AD Connect. Previous parts have mostly been focusing on the installation and configuring different user sign-in options for Azure AD. Links to these are...
View Article