Documente Academic
Documente Profesional
Documente Cultură
2012 (Part 1)
In this article, I will provide a revision to an article previously published on this site that was
an introduction to an early beta version of what was then known as System Center
Configuration Manager 2012.
Introduction
About a year ago, I published an article here that was an introduction to an early beta version
of what was then known as System Center Configuration Manager 2012# Much information
has changed in the past year, including the products name# In this article, I will provide a
revision to that original piece and in follow up parts, will expand on what can be done with
Configuration Manager#
Advertisement
Windows Server 2008 Standard, Enterprise & Data Center #Itanium systems are not
supported#
SCCM 2012 does have a few limitations you should understand if you decide to deploy it in
your environment:
Data Center editions of Windows are supported but are not certified for SCCM 2012#
If there is a Data Center-specific problem that arises in SCCM 2012, Microsoft may
not provide a fix#
Endpoint Protection is not supported with versions of Windows Embedded that are
based on Windows XP#
Hardware requirements
Other requirements
Before you install SCCM 2012, make sure that you also install the #NET Framework 4#0#
This will probably require a restart of your system# #NET Framework 4#0 is not included in
Windows Server yet, so youll need to download it from Microsoft#
In addition to the #NET Framework 4#0, youll need to install the following role services and
features from Server Manager:
You will most likely have to restart your computer after installing these components. In
Figure 1, youll see an example of what it takes to install these prerequisite components.
In addition, there are some other considerations to keep in mind with regard to SQL Server.
SCCM 2012 requires a dedicated SQL Server instance that doesnt also house other
application data. This doesnt mean that you need a separate, dedicated SQL Server
just for Configuration Manager; you can simply add an instance to an existing SQL
Server that you have running in your organization.
If you choose to use a named instance of SQL Server rather than a default SQL Server
instance, you must use the SQL Server Configuration Manager to configure the
selected named instance to listen on port 1433.
Whichever instance you choose to use for Configuration Manager must use caseinsensitive collation .SQL_Latin1_General_CP1_CI_AS.
Enable named pipes as a communications option on the SQL Server and the restart the
SQL Server service.
Add the computer account to the Local Administrators account in the intended SQL
Server.
Installation process
To get started with the main installation process, browse to the location to which you
downloaded SCCM 2012 and double-click the splash.hta file. Click the Install option to get
started.
For your initial installation, youre presented with a couple of options with regard to
installation. First, you can choose to install a Primary Site Server. Or, you can choose to
install a Central Administration site. If you choose to do a primary site server installation, you
can also fast-track the process by selecting the checkbox next to Use typical installation
options for a stand-alone primary site. In order to make sure you see all of the options, Im
not going to take this easy route. Figure 4 gives you a look at the setup options.
You have to agree to the license terms as they appear in Figures 6 & 7. Figure 6 is the license
agreement for SCCM 2012 while Figure 7 is a series of license agreements covering a
number of the prerequisite components necessary for SCCM to operate. You must agree to all
of the license terms in order to proceed.
Figure 17: Specify the mode by which SCCM clients will communicate
Figure 18: Do you want to install these two site system roles?
On the Settings Summary page .Figure 19., the installer follows up with a summary of all of
the selections youve made throughout the process. Review your selections and click the Next
button to continue.
Summary
At this point, your new SCCM 2012 installation is complete and youre able to start
investigating the new features and the console, which is exactly what well be doing in the
next part of this article series.
The console
Perhaps the most visible change to the SCCM 2012 administrative experience lies in the
complete overhaul of the administrative console. Whereas even SCCM 2007 still carried
remnants of the original SMS product, SCCM 2012 will never be mistaken for an older
version. In all of the System Center 2012 products, Microsoft has implemented a consistent
administrative experience, helping administrators more easily jump between the individual
products in the suite. After all, you shouldnt need to learn a different administrative model
for each part of a group of interrelated products.
Even the consoles foundation has changed and no longer relies on the Microsoft
Management Console framework. SCCM 2012 instead has its own model, which is based on
that of Outlook, as you can see in the figure below.
A security overhaul
Although its not as immediately obvious, the console has also undergone a complete security
makeover. Gone are the days when primary sites defined security boundaries. This is a good
thing! It allows administrators to drastically simplify their SCCM architecture. Now, rather
than deploying a bunch of primary sites just to enable granular administration, you can use
SCCM 2012s new Role Based Access Control function to achieve extremely granular
administrative segregation.
Role Based Access Control is found in many System Center 2012 products. In addition to
restricting what users can do, it limits what users can see when theyre in the console. RBAC
hides interface elements based on user profile so that the user is shown only what is relevant.
Security in SCCM is controlled through the application of roles and scopes. A role defines
what a user can do and a scope defines where a user can do it. When these two items are
overlapped, youre left with a look at a users abilities in the SCCM console.
SCCM ships with 14 predefined security roles, but administrators can create additional roles
to meet unique business needs. During the initial installation of SCCM, the administrative
account is added to the Full Administrators role. Heres a look at the list of roles available in
SCCM 2012.
Note:
This information was pulled directly from the SCCM console.
Role
Role description
Application
Administrator
Application
Author
Application
Deployment
Manager
Compliance
Settings
Manager
Endpoint
Protection
Manager
Full
Administrator
Infrastructure
Administrator
Operating
System
Deployment
Manager
Operations
Administrator
Read-only
Analyst
Remote Tools
Operator
Grants permissions to run and audit the remote administration tools that
help users resolve computer issues. Administrative users that are
associated with this role can run Remote Control, Remote Assistance
and Remote Desktop from the Configuration Manager console. In
addition, they can run the Out of Band Management console and AMT
power control options.
Security
Administrator
Software
Update
Manager
Table 1
As you can see from the table above, these roles all define what users that are members of the
role can do. So, how do you control there where aspect?
Thats where security scopes come into play. SCCM 2012 ships with two default security
scopes:
All. A built-in security scope that contains all securable objects. A Configuration
Manager administrator associated with the All security scope will have the
permissions of their role for every object in the Configuration Manager environment.
Default. A built-in security scope with which securable objects can be associated.
There are a number of different object types in SCCM 2012 that can be scoped in this way.
So, a security scope secures based on a sort of instance element. You can also use collection
limiting to further restrict what can be done.
Summary
Its clear that Microsoft has gone to great lengths to simplify the SCCM administrative
model. From redesigning the various System Center 2012 consoles to have a similar
experience to implementing granular security controls that negate the need to create complex
architectures in the name of security, SCCM 2012 is a major step in the right direction. In the
next part of this series, we will continue to investigate SCCM 2012s new features.
Discovery
Discovery is an incredibly important process in SCCM. It is through discovery that you
locate resources that can be brought into SCCM for management purposes. Further, some
discovery methods enable the automatic creation of boundaries, virtual boxes in SCCM
that help the system make sure that clients are managed appropriately.
When an object is discovered, SCCM creates what is called a Discovery Data Record (DDR)
that holds the details about the discovered object. This DDR will include information such as
the computer name for a discovered computer or the user name for a discovered user account
in Active Directory. These DDRs are processed by SCCM and entered into the SCCM
database as objects that can be manipulated.
In an out-of-the-box configuration, the only discovery method enabled by default is the
heartbeat discovery method. In order to discover any other resources, an administrator must
proactively decide which discovery methods to enable and then configure the selected
methods.
Beyond just using discovery to identify objects that can be managed with SCCM, you can
also use discovered objects in queries that group similar objects for management purposes,
thus further streamlining the desktop management process in your organization.
Discovery options
There are a number of discovery options available in SCCM 2012. If youre used to older
versions of SCCM, get used to some changes, too, as new methods have been introduced and
some removed.
Among the changes:
A new discovery method named Active Directory Forest Discovery has been added.
This new discovery method is described later in this article.
Discovery information in one site is replicated to other sites using SCCM 2012s new
database replication processes.
The Active Directory Security Group Discovery method is now known as Active
Directory Group Discovery. Further, this discovery method has been improved and
can now discover the group memberships of discovered resources.
Some Active Directory discovery methods (User, System, Group) now support Delta
Discovery. Delta discovery itself is improved in SCCM 2012 and is a method by
which discovery can locate just objects that have been added or changed since the
previous discovery cycle.
Now, lets explore each of the discovery options that are available to you.
Group discovery is not enabled by default and you need to provide a scope in which SCCM
should look for new group resources.
Computer name
IP address
System discovery is one of the most common methods that you will use. As is the case for
most of the discovery methodswith the only exception being Heartbeat discoverythe
administrator must proactively enable the discovery option. With System discovery, the
administrator also needs to specify the Active Directory container that should be searched for
new system resources. In my example, Im searching at the root and have enabled recursion
so that SCCM will be able to look in subcontainers, too.
Network Discovery
Sometimes, you might have network objects that cant be discovered via Active Directory
discovery methods. The Network Discovery option allows you to go directly to the network
to find new objects, such as computers, printers and network devices. Network discovery
does have some downsides, though. Its quite noisy meaning that it generates a lot of
network traffic and can be extremely resource intensive. As such, you should use other
discovery methods before resorting this one.
That said, you sometimes have to use Network Discovery. You may have systems that arent
in Active Directory, such as workgroup computers, switches and other network devices.
In Figure 12, you can see the general options that are available, including the ability to enable
the discovery method. You will also see that there are three options available in the Type of
discovery area:
Topology, client and client operating system. Takes things a step further by attempting
to also determine the client operating system and version.
Heartbeat Discovery
Heartbeat discovery is different from all of the other discovery methods in that it doesnt
actually discovery any new resources at all. Instead, heartbeat discovery is a client-initiated
process that informs SCCM that the client is still alive and kicking.
You can see in Figure 18 that there are just two options for Heartbeat discovery. Do you want
to enable this discovery method and how often should clients check in?
Summary
Discovery is a foundation SCCM process. Its absolutely required in order for you to move
forward with your use of the product. In this article, you learned about the various discovery
options at your disposal. In the next part of this series, well continue implementing SCCM
2012.
Client Settings
Client settings are a crucial aspect of System Center Configuration Manager 2012. In older
versions of SCCM, these were called client agents, but they still serve the same purpose in
SCCM 2012. These settings control how the managed clients in SCCM 2012 will operate. In
this article series, well go through each and every client setting and explain in detail the
parameters that you can adjust.
Limit the maximum network bandwidth for BITS background transfers. Limits the
amount of bandwidth that BITS will use for background transfers. This can be useful
in slow link scenarios or when bandwidth is at a premium.
Throttling window start time. Provide the time of day at which throttling should start.
Throttling window end time. Provide the time of day at which throttling should cease.
Maximum transfer rate during throttling window (Kbps). Determine the maximum
transfer rate that is allowed during the throttling window. For example, 1 Mb would
be 1,000 Kb.
Allow BITS downloads outside the throttling window. Decide whether or not BITS
transfers are allowed outside the defined throttling window.
Maximum transfer rate outside the throttling window (Kbps). Determine how fast
transfers can take place outside the throttling window.
Client Policy
Think of the client policy as a meta policy. This is the policy that determines how clients will
handle receiving and updating their individual policies. The configuration for this client
setting is pretty important as other SCCM functions often require machines to retrieve an
updated client policy before they can work their own magic.
Client policy polling interval (minutes). This value indicates to SCCM the interval by
which clients should check in with the SCCM server to retrieve any policy updates
that may have been made since the last check in.
Enable user policy requests from Internet clients. For sites that support Internet
clients, when this parameter is set to True, endpoints on the Internet will receive both
machine and user policy updates.
Compliance Settings
Compliance Settings are an updated form of Desired Configuration Management, which was
included in older versions of SCCM. With Compliance Settings, administrators can determine
when a managed client has deviated from established baselines.
Enable compliance evaluation on clients. Decide whether or not clients will use their
compliance evaluation capabilities.
Computer Agent
The computer agent is another set of settings that are pretty core to how SCCM manages
clients. The items here define some general settings that dictate how a wide swath of SCCM
functionality will operate.
Deployment deadline greater than 24 hours, remind user every (hours). When a
software deployment action is pending and is more than 24 hours out, choose the
interval by which users will be reminded about the deployment.
Deployment deadline less than 24 hours, remind user every (hours). For deployments
that have a deadline that takes place within the next 24 hours, notify users about the
deployment every X number of hours.
Deployment deadline less than 1 hour, remind user every (minutes). Likewise, for
deadlines in the next hour, choose the interval (in minutes) by which users should be
notified of the deployment.
Default Application Catalog website point. Define the address at which the client can
find the Application Catalog. By default SCCM clients are configured to
automatically detect the Application Catalog. Administrators can choose instead to
force clients to use an automatically created intranet fully qualified domain name or
the NetBIOS name for the server holding the Application Catalog. Administrators
may choose instead to specify a custom URL.
Add default Application Catalog website to Internet Explorer trusted sites zone. By
setting this option to True, an administrator can direct clients to ensure that IE
protected mode doesnt interfere with a client attempting to browse to the Application
Catalog.
Install permissions. Specifies the users that are allowed to start the installation of
deployed software.
o All Users. Any user logged in to a managed client can initiate a deployed
software installation.
o Only Administrators. Only users that are members of the local administrators
group can initiate a software installation.
o Only Administrators and primary users. This is the same as the previous
option with one exception. If the device has been associated with a user
through user/device affinity, the primary computer user can also initiate a
software installation.
o No Users. Users can never initiate software installations. Only software
marked as required will be installed.
Agent extensions manage the deployment of applications and software updates. This
setting should never be enabled unless you are using a third party software
deployment solution that requires it. Enabling this setting can break SCCM 2012s
ability to deploy software.
Show notifications for new deployments. Enables or disables the display of new
deployment notifications to a user.
Computer Restart
If SCCM initiates an action that requires a computer restart, the settings here help to define
what will happen when that restart takes place. After all, you dont want users to just have
their PC all of a sudden restart with no warning whatsoever. That would result in lost work
and a frustrated user base!
Display a temporary notification to the user that indicates the interval before the user
is logged off or the computer restarts (minutes). The user is able to close this window
and continue working, but the countdown to restart continues for the interval shown.
Display a dialog box that the user cannot close, which displays the countdown interval
before the user is logged off or the computer restarts (minutes). This is where SCCM
means business. The user cannot close the display window and the countdown
continues.
Summary
As you can probably see, there are a number of options associated with each client setting.
Administrators can adjust these options to control client behavior in the environment. In the
next part of this series, well continue our look at client settings.
Client Settings
Client settings are a crucial aspect of System Center Configuration Manager 2012. In older
versions of SCCM, these were called client agents, but they still serve the same purpose in
SCCM 2012. These settings control how the managed clients in SCCM 2012 will operate. In
this article series, well go through each and every client setting and explain in detail the
parameters that you can adjust.
Endpoint Protection
In previous versions of SCCM, adding support for what used to be called Forefront Endpoint
Protection involved a series of steps that extended SCCM to be able to act as the central
monitoring host for the Forefront Endpoint Protection antimalware tool. In SCCM 2012,
support for the renamed System Center Endpoint Protection antimalware tool is built right
into the product and there is a client setting providing administrators with a means to control
how the Endpoint Protection installation will take place.
Manage Endpoint Protection on client computers. Selecting this option indicates that
you wish to centrally manage Endpoint Protection from within the SCCM console.
Suppress any required computer restarts after the installed Endpoint Protection client
is installed. The Endpoint Protection installation does not respect maintenance
windows established for clients. Therefore, if the Endpoint Protection installation
requires a system restart, the system will restart at any time of day. To prevent this,
enable this option.
Allowed period of time users can postpone a required restart to complete the Endpoint
Protection installation (hours). If the previous option is set to False, administrators can
allow users to postpone a restart for a number of hours configured here.
Hardware Inventory
The hardware inventory client setting controls how clients perform local hardware
inventories and submit the information back to SCCM. Before discussing the hardware
inventory, make sure you understand what is meant by the term MIF file.
Management Information Files (MIF) are used by SCCM and clients to exchange hardware
information. Administrators can extend SCCMs hardware collection capabilities by using
MIF files to supplement what SCCM captures by default. However, you can also use the
SCCM client settings configuration area to extend the information that SCCM captures by
default.
To learn more about MIF, visit this page.
Hardware inventory schedule. How often should a client perform a hardware scan and
return information to an SCCM server?
Maximum custom MIF file size (KB). A range of 1 KN to 5,000 KB is required here.
This field indicates the maximum MIF file size that SCCM will process. If a file is
returned from a client and its larger than this setting, the file will be ignored.
Enable Network Access Protection on clients. When enabled, client software updates
are scanned and the results sent to a System Health Validator Point (SHVP).
Use UTC (Coordinated Universal Time) for evaluation time. Indicate whether local
time and UTC time should be used for evaluation.
Require a new scan for each evaluation. A False setting allows a client to return to the
SHVP the cached result from the most recent scan while a True setting requires a new
and current full scan.
NAP re-evaluation schedule. Determines how often the clients status should be reevaluated.
Power Management
Power management capabilities were added to SCCM in a recent edition of a previous
version, but theyre included in full force in SCCM 2012. Power management can be used to
create policies, which, once applied to clients, can begin to save the company money.
Allow users to exclude their device from power management. SCCM is a userfocused product. As such, administrators can choose to allow users to opt out of
centrally-enforced power management by changing this setting to True.
Summary
As you are continuing to see, there are a number of options associated with each client
setting. Administrators can adjust these options to control client behavior in the environment.
In the next part of this series, well continue our look at client settings.
Client Settings
Client settings are a crucial aspect of System Center Configuration Manager 2012. In older
versions of SCCM, these were called client agents, but they still serve the same purpose in
SCCM 2012. These settings control how the managed clients in SCCM 2012 will operate. In
this article series, well go through each and every client setting and explain in detail the
parameters that you can adjust.
Endpoint Protection
In previous versions of SCCM, adding support for what used to be called Forefront Endpoint
Protection involved a series of steps that extended SCCM to be able to act as the central
monitoring host for the Forefront Endpoint Protection antimalware tool. In SCCM 2012,
support for the renamed System Center Endpoint Protection antimalware tool is built right
into the product and there is a client setting providing administrators with a means to control
how the Endpoint Protection installation will take place.
Manage Endpoint Protection on client computers. Selecting this option indicates that
you wish to centrally manage Endpoint Protection from within the SCCM console.
Suppress any required computer restarts after the installed Endpoint Protection client
is installed. The Endpoint Protection installation does not respect maintenance
windows established for clients. Therefore, if the Endpoint Protection installation
requires a system restart, the system will restart at any time of day. To prevent this,
enable this option.
Allowed period of time users can postpone a required restart to complete the Endpoint
Protection installation (hours). If the previous option is set to False, administrators can
allow users to postpone a restart for a number of hours configured here.
Hardware Inventory
The hardware inventory client setting controls how clients perform local hardware
inventories and submit the information back to SCCM. Before discussing the hardware
inventory, make sure you understand what is meant by the term MIF file.
Management Information Files (MIF) are used by SCCM and clients to exchange hardware
information. Administrators can extend SCCMs hardware collection capabilities by using
MIF files to supplement what SCCM captures by default. However, you can also use the
SCCM client settings configuration area to extend the information that SCCM captures by
default.
To learn more about MIF, visit this page.
Hardware inventory schedule. How often should a client perform a hardware scan and
return information to an SCCM server?
Maximum custom MIF file size (KB). A range of 1 KN to 5,000 KB is required here.
This field indicates the maximum MIF file size that SCCM will process. If a file is
returned from a client and its larger than this setting, the file will be ignored.
Enable Network Access Protection on clients. When enabled, client software updates
are scanned and the results sent to a System Health Validator Point (SHVP).
Use UTC (Coordinated Universal Time) for evaluation time. Indicate whether local
time and UTC time should be used for evaluation.
Require a new scan for each evaluation. A False setting allows a client to return to the
SHVP the cached result from the most recent scan while a True setting requires a new
and current full scan.
NAP re-evaluation schedule. Determines how often the clients status should be reevaluated.
Power Management
Power management capabilities were added to SCCM in a recent edition of a previous
version, but theyre included in full force in SCCM 2012. Power management can be used to
create policies, which, once applied to clients, can begin to save the company money.
Allow users to exclude their device from power management. SCCM is a userfocused product. As such, administrators can choose to allow users to opt out of
centrally-enforced power management by changing this setting to True.
Summary
As you are continuing to see, there are a number of options associated with each client
setting. Administrators can adjust these options to control client behavior in the environment.
In the next part of this series, well continue our look at client settings.
Adding the management pack
One great feature of Operations Manager is its extensibility. Through the addition of
management packs, which are often free, you can massively extend the breadth and depth of
the product and add to it the ability to monitor just about everything in your environment.
To get started, we need to add management packs that enable the discovery of Active
Directory domain controllers. Navigate to the Administration workspace. Expand
Administration > Device Management and choose Management Packs. Right-click
Management Packs and from the shortcut menu, choose Import Management Packs.
This is the point at which patience is a virtue as it can take Operations Manager a little while
to discover the domain controller role that might exist on managed systems. However, you
will immediately notice that some new items are added to the Monitoring workspace.
Bearing in mind that the alerts that youre seeing are from a test lab, the DC Active Alerts
section displays any Operations Manager alerts that are raised by monitoring rules in the
newly installed management pack. In Figure 9, you can see these alerts shown on the screen.
One of the critical alerts is selected and you can see some additional details about the alert.
The alerts that were shown in the previous section are the ones raised by virtue of rules in the
management pack that was installed. However, theyre only a part of the bigger picture when
it comes to troubleshooting Active Directory domain controllers. The old standbythe
Windows Event Logstill contains a lot of information. The management pack that we just
installed pulls AD-related events for your perusal and, when combined with the other data
sources, provides you with a bigger picture view of the environment.
The newly installed management pack adds to the monitored system a number of
performance gathering features that you will see in action. In Figure 13 below, you can see a
graph that shows a single statistic on display for a particular time period. This information is
constantly gathered so you can gain some insight into how a particular aspect of the
monitored item is performing. If you want to see information about something else, simply
select the checkbox in the Show column for the statistic youd like to see.
Perhaps the most important piece of information you need to know is whether or not your
domain controllers are operational or if theyre experiencing serious issues. The DC State
area gives you a look at the domain controllers in your environment and identifies their state.
This is shown in Figure 14.
These are pretty much repeats of what we just saw, but will show just Windows Server 2008
domain controller information.
AD DIT/Log Free Space
Active Directory servers need to have enough disk space to store log files. This graph
displays how much space is available on the file on the drive on which the log files are
stored, which is generally the system drive. The value shown on the Y axis is in bytes.
Figure 16: The amount of free space on the log file drive
All Performance Data
If youre looking for something a bit more granular, you can choose whatever performance
statistics youd like to see graphed by selecting that graph from the All Performance Data
section.
Not every option here displays a single graph. The Database and Log Overview section
displays information pertinent to the database and log files themselves. There is less clutter
here, making it easier for the administrator to get necessary details for corrective purposes.
This graph displays the current size of the AD database. Note that only one domain controller
is available for selection because only one DC in my lab domain currently has the SCOM
client installed on it. If I add the second DC, it will become available as a selection.
As was the case with the database and log file section before, this section allows you to see
information about the status of some key metrics important in managing Active Directory. In
Figure 20, you can see how much RAM is available and how much is committed and you
also get information about the Local Security Authority Subsystem Service (LSASS).
A domain controller that isnt responsive will result in users calling the help desk
complaining about poor performance. You can see how quickly your domain controllers are
responding to user requests using the graph below.
That single graph showing DC response time may not be enough. You may also want to see
how quickly your global catalog servers are responding. You can see both stats on this page.
And, if you want to see just global catalog information, you can do so on the GC Response
Time page, shown in Figure 23.
You saw log file size information earlier, but this is a page with just that information
displayed.
The Local Security Authority Subsystem Service is responsible for enforcing the security
policy on the system and it can eat up a lot of processor capacity. If it does, it can result in
poor performance. In Figure 25, you can see granular information for how much processor
time is being used by this service.
You saw memory information displayed earlier on one of the aggregate graphs. Here, you can
see just memory statistics related to your domain controller.
Finally, you can get some information about the performance of your domains operations
master, shown below in Figure 27.
And that, folks, is the Active Directory management pack for SCOM 2012. As you can see, it
adds a ton of information to the SCOM framework and allows administrators to delve deeply
into systems to see what is happening under the hood.
the primary health of the entity, only unhealthy child items are displayed. So, since there is
nothing wrong with this server at present, you see a green circle with checkmark indicating
that the entity is health. Immediately above that, you will see a yellowish bar that reads
Scope is only unhealthy child monitors.
Basically, this means that SCOM is going to display only those metrics that are not in
alignment with their established parameters. To show everything click the X in the yellow
bar.
Figure 2: You are first presented with (hopefully) very little information abut the selected
entity
Once you click the X, youre shown everything there is to see with regard to this entity
(Figures 3 and 4). You can see that I have expanded the Entity Health nodes until Logical
Disk Free Space (C:) was visible. By clicking on that metric, Operations Manager now
displays a whole lot of information about the selected metric. In this case, youre shown
knowledge about Drive C: on the selected server. Knowledge is information that is
included in the management pack to help administrators identify and correct issues that may
arise in the environment.
What you will notice immediately is that the Knowledge pane also provides you with the
point at which Operations Manager determines that the selected disk drive is too low on disk
space. Further, you will see that there are two different criticality levels:
Warning. A warning will be raised on the C: drive when it gets below either 500 MB
of free space or when it goes below 10% of available space.
Error. An error will be raised on the C: drive when it gets below either 300 MB of free
space or when it goes below 5% of available space.
Warning. A warning will be raised on the C: drive when it gets below either 2 GB of
free space or when it goes below 10% of available space.
Error. An error will be raised on the C: drive when it gets below either 1 GB of free
space or when it goes below 5% of available space.
Figure 8: The health status that will be set on a per monitoring condition basis
When the monitored item enters a state that requires a warning or error to be issued, an alert
is raised in the Operations Manager console. The Alerting tab is the place to go to see what
the text of this message will look like. Further, on this tab, you can see the default priority
level for the alert.
Figure 9: The text of the alert that will be raised for this item
When used properly, the Diagnostics and Recovery tab can be used to automate the resolution
to a problem. For disk space, issue, however, you dont want the system to automatically
delete files, so no actions are listed.
Figure 10: Actions that will be taken to attempt diagnostics and recovery related to the
monitor
Once you close the Properties windows. Click OK to go back to the view of the monitor and
choose the State Change Events tab. You will see a screen like the one shown in Figure 11.
This screen lets you know the date and time at which an alert condition is raised. This can aid
response and help you more quickly understand when something went wrong and streamline
your support efforts.
Summary
Thats a look at how you can manage monitors in SCOM 2012. The Health Explorer
powerful insights about the health of your system. You may be wondering how you can
change these metrics since they were all grayed out. That is the topic for the next part of this
series.