Microsoft SCOM Compendium by NiCE 2023Q
Microsoft SCOM Compendium by NiCE 2023Q
CONTENT
3. Large Environments
4. Performance Monitoring
5. Alert Management
9. Third-Party Solutions
10. Best Practice for Handling Resource Constraints when Working with SCOM ................................ 38
Resources .................................................................................................................................................... 49
Page | 2
Introduction
As a Microsoft System Center Operations Manager (SCOM) administrator, several challenges
might be encountered in managing and maintaining this complex monitoring and management
tool. These challenges can vary depending on the organization's size, infrastructure, and specific
requirements. Here are some of the common challenges faced by SCOM administrators:
With the growing importance of security and compliance, SCOM administrators may
need to enhance their monitoring capabilities to address security threats and ensure
compliance with industry standards and regulations.
Click here to read more about enhancing security and compliance monitoring.
Page | 3
5. Alert Management and Noise Reduction
Dealing with alert fatigue remains a challenge. SCOM administrators need to fine-tune
monitoring rules and alerts to reduce noise and focus on critical issues, ensuring that the
team doesn't get overwhelmed by non-essential alerts.
Click here to read more on enhancing alert management and noise reduction.
Organizations have unique monitoring needs, and SCOM administrators may need to
create custom management packs, dashboards, and reports to address these
requirements effectively.
Click here to read more about enhancing customization and reporting.
Keeping up with the latest features and capabilities of SCOM, as well as staying informed
about best practices, can be challenging. Administrators may need to invest in training
and skill development to maximize the value of SCOM.
Click here to read more about enhancing SCOM knowledge and closing skill gaps.
9. Third-Party Integrations
Integrating SCOM with other third-party monitoring and management tools, such as
ServiceNow, ITSM platforms, and log analytics solutions, can be complex but is often
necessary to create a holistic monitoring and management ecosystem.
Click here to read more about best practices when working with third-party solutions.
Page | 4
10. Resource Constraints
Resource constraints, such as limited budgets and hardware limitations, can impact the
ability to scale SCOM and implement the desired monitoring solutions effectively.
Click here to read more about best practices when faced with limitations.
While SCOM is primarily designed for Windows environments, many organizations also
need to monitor non-Windows systems. Integrating SCOM with other monitoring tools or
extending its capabilities to cover non-Windows platforms can be challenging.
Click here to read more about monitoring non-windows platforms using Microsoft SCOM.
To address these challenges, SCOM administrators may need to stay updated with the latest
features and enhancements in newer versions of SCOM, leverage automation and scripting, and
collaborate closely with other IT teams to align monitoring efforts with organizational goals.
Additionally, seeking support from the Microsoft SCOM community and user groups can provide
valuable insights and solutions to common challenges.
Page | 5
1. Easing the Integration with Hybrid and Cloud
Environments
Integrating hybrid and multi-cloud infrastructures into System Center Operations Manager
(SCOM) can be a complex task, but there are several steps a SCOM admin can take to ensure a
smooth integration. Here are some best practices to consider:
Gain a deep understanding of your hybrid and multi-cloud infrastructure, including cloud
services, on-premises systems, and their interdependencies.
Click here to read the Operations Manager Planning Guide.
Ensure that SCOM is up to date with the latest patches and updates to support the latest
features and compatibility with cloud services.
Click here to read the System Center - Operations Manager build versions.
Install and configure the Azure Management Pack to monitor Azure resources. This allows
SCOM to collect data from Azure services and applications.
Click here to download the Microsoft System Center Operations Manager Management
Pack for Microsoft Azure.
Page | 6
1.5 Utilize Hybrid Runbook Automation
Integrate Azure Automation Runbooks with SCOM to automate responses to alerts. This
can be especially useful in hybrid scenarios where automation is crucial.
Click here to read the Automation Hybrid Runbook Worker overview.
Use SCOM to monitor the availability and performance of web applications hosted in the
cloud. This ensures end-to-end visibility for web services.
Click here to learn more about the Web Application Availability Monitoring template.
Create custom management packs to monitor specific applications or services that are
critical in your hybrid setup but are not covered by default management packs.
NiCE helps you build custom management packs. Click here to learn more about NiCE
Custom Management Pack services. For self-authoring management packs, you may want
to learn more about the Silect MP Studio.
Use synthetic transactions to simulate user interactions with applications. This helps in
proactively identifying issues before end-users are affected.
Click here to read more about the Synthetic Transactions Library at System Center Wiki.
Click here to learn how to Create and Configure Users for Synthetic Transactions at
Microsoft Tech Community.
Click here to learn How to configure watcher node test users and settings on Microsoft
Learn.
Define proper RBAC settings to ensure that the right personnel have appropriate access
to SCOM data and configuration settings.
Click here to learn more about implementing user roles.
Click here to learn more about Admin RBAC in SCOM 2022 written by Bob Cornelissen.
Page | 7
1.10 Utilize Performance Thresholds and Alert Tuning
Integrate SCOM with Azure Log Analytics to collect, correlate, and act on log and
performance data from various sources. This provides a centralized view of your hybrid
infrastructure.
Click here to learn how to setup and configure Log Analytics using SCOM.
Click here to learn how to Configure Log Analytics for Azure Monitor SCOM Managed
Instance.
Click here to learn how to establish connectivity to Azure Log Analytics.
Click here to learn how to connect the Operations Manager to Azure Monitor.
Cloud environments are dynamic. Regularly review and update your monitoring strategy
to adapt to changes in your infrastructure.
Click here to read the Operations Manager Planning Guide.
Implement monitoring for cloud costs and resource utilization. This helps in optimizing
resource usage and controlling costs in the cloud environment.
Click here to learn more about Azure Monitor SCOM Managed Instance.
Click here to learn more about the cloud monitoring strategy.
Click here to learn more about monitoring Microsoft Azure and hybrid cloud
environments.
Page | 8
1.14 Stay Informed and Engage with the Community
Join forums, user groups, and attend conferences to stay updated with the latest
developments and best practices in SCOM and cloud monitoring.
Click here to reach the Microsoft System Center Blog.
Click here to reach the Microsoft System Center Blog SCOM related finds.
Click here to reach the Microsoft System Center Blog OM related finds.
Click here to reach the Microsoft System Center Operations Manager feature suggestion
page.
Click here to reach the SCOMathon web page.
Click here to reach the Management Pack Catalog on GitHub.
Click here to reach the System Center discussion page.
Click here to reach the SCOM group on Reddit.
By following these best practices, a SCOM admin can ensure a seamless integration of hybrid
and multi-cloud infrastructures into their monitoring setup, enabling effective management and
proactive issue resolution.
Utilize SCOM to monitor security events and incidents across your network. Create
custom rules and monitors to detect unauthorized access attempts, suspicious activities,
and potential security breaches.
Click here to secure your infrastructure monitoring with SCOM.
Click here and here to read more about the Security Monitoring Management Pack.
Page | 9
Click here to watch the recording of SCOM Security – the best tips, tools, and MPs to
secure your SCOM environment.
Click here to read the Microsoft SCOM Security Technical Implementation Guide
by UCF.
Click here to watch the recording of Integrating the Security Monitoring MP into
Microsoft Sentinel.
Click here to read Nathan Gau’s blog post on SCOM Security Monitoring and
Sentinel Integration.
Deploy security management packs specific to the technologies you're using (such as
Active Directory, Windows Server, SQL Server, etc.). These packs provide specialized
knowledge and monitoring capabilities tailored for security-related events.
Click here to learn more about how to secure your Infrastructure Monitoring with SCOM.
Click here to download the Microsoft System Center Management Pack for Windows
Defender.
Click here to download the Microsoft System Center Operations Manager Management
Pack for Microsoft 365.
Click here for advanced Microsoft 365 monitoring using the NiCE Active 365
Management pack for SCOM and Azure Monitor SCOM Managed Instance.
Click here to learn more about Operations Manager Management Packs.
Click here to download the Microsoft System Center Management Pack for ADDS.
Click here to learn more about a Management Pack assessment.
Click here to reach the System Center Management Pack Catalog on System Center Wiki.
Establish security baselines for your systems and applications. Implement anomaly
detection rules in SCOM to identify deviations from the established baseline, which can
indicate security threats.
Click here to learn more about Monitoring strategy for cloud deployment models.
Click here to learn more about Monitoring Active Directory for Signs of Compromise
P a g e | 10
2.4 Monitor User Activity
Keep an eye on user activities, especially privileged accounts. Detect and alert on
suspicious user behavior, such as multiple login failures, unusual login times, or privilege
escalation attempts.
Click here to learn more about Service, User, and Security Accounts.
Click here to read more about implementing user roles.
Click here to read the blog post by Nathan Gau on Security Monitoring: Using SCOM to
capture Suspicious User Activity.
Click here to read the Microsoft Learn Q&A blog article on SCOM alert when particular
user tries to log on to targeted servers.
Click here to read a blog post by Sameer Mhaisekar “Wait, what? An activity log in
SCOM? Did I read that right?”
Click here to read about Monitoring Microsoft 365 with SCOM and the NiCE Active 365
Management Pack.
Click here to learn more about Operations Manager key concepts.
Click here to learn more about operations associated with user role profiles.
Click here to learn more about tracking changes in Operations Manager.
Use FIM to monitor critical system files and configuration settings for unauthorized
changes. This helps in detecting and responding to potential security breaches promptly.
Click here to learn more about File Integrity Monitoring using the Log Analytics agent.
Click here to learn more about File Integrity Monitoring in Microsoft Defender for Cloud
Click here to learn more Enabling File Integrity Monitoring when using the Azure Monitor
Agent.
Click here to learn more about Monitoring a file hash using SCOM written by Kevin
Holman.
Click here to learn more about advanced Log File monitoring using the free NiCE Log File
Management Pack.
P a g e | 11
2.6 Integrate with Security Information and Event Management (SIEM)
Systems
Integrate SCOM with SIEM solutions to centralize security event data. This enables
correlation of events and enhances the overall security posture by providing a
comprehensive view of security incidents.
Click here to learn how to connect Operations Manager with other management systems.
Click here to learn more about the SQL MCM Addendum pack by Kevin Justin.
Click here to learn more about connecting Microsoft SCOM with ITSM Ticketing Systems
Schedule and review security reports generated by SCOM. Analyze trends, identify
patterns, and proactively address potential security vulnerabilities based on the insights
gained from these reports.
Click here to learn more about the Operations Manager reports library.
Click here to learn how to create reports in Operations Manager.
Click here to read more about Scheduling reports by Bob Cornelissen.
P a g e | 12
2.9 Implement Compliance Monitoring
Use SCOM to monitor compliance with industry standards and regulatory requirements
(such as HIPAA, GDPR, PCI DSS). Implement compliance-specific management packs and
customize them to meet your organization's specific compliance needs.
Click here to read more about monitoring Auth0 using System Center Operations
Manager.
Click here to learn more about implementing TLS 1.2 enforcement with SCOM.
Click here to learn more about the HIPAA Compliance Pack by Silect.
Click here to learn more about the Compliance Manager by Silect.
Click here to learn more about the Sentinel Management Pack by Silect.
Click here to launch the course Monitor and Maintain a Software-Defined Datacenter with
SCOM by Steve Buchanan.
Click here to learn more about the TLS Compliance Pack.
Enforce strict RBAC policies to ensure that only authorized personnel have access to
sensitive security and compliance data within SCOM.
Click here to learn more on implementing user roles.
Click here to learn more about SCOM 2019 role based access and delegation.
Click here to learn more about modifying access in SCOM user roles – without the
console.
Click here to read more about Admin RBAC in SCOM 2022.
Keep the management packs up to date. New versions often include improvements in
security monitoring and compliance checks based on the latest security threats and
regulatory changes.
Click here to read more on How to Update SCOM Management Packs by Prajwal Desai.
Click here to more about the Management Pack Lifecycle.
Click here to reach the Community Catalog Management Pack.
P a g e | 13
2.12 Stay Informed and Engage with Security Communities
Stay updated with the latest security threats, vulnerabilities, and best practices by
engaging with security communities, attending security conferences, and participating in
webinars and workshops.
Click here to learn more about the NCSC.
Click here to reach the Information Security Stack Exchange.
Click here to reach the DefCon web page.
Click here to reach the black hat web page.
Click here to reach the Cybersecurity & Infrastructure Security Agency (CISA) web page.
Click here to reach the Open Worldwide Application Security Project (OWASP).
By implementing these strategies, a SCOM admin can significantly enhance security and
compliance monitoring, ensuring a robust and proactive approach to safeguarding the
organization's IT environment.
Begin with a well-thought-out architecture that accounts for the size and complexity of
your environment. Consider the number of management servers, databases, and gateway
servers required. Distribute the load strategically.
Click here to learn more about the Operations Manager Planning Guide.
Click here to learn more about Planning a Management Group Design.
Click here to learn more about High Availability and Disaster Recovery.
P a g e | 14
Click here to learn more about Making changes to an Operations Manager Management
Group.
Click here to read more about Resource pool design considerations.
Click here to learn more about System requirements for System Center Operations
Manager.
Click here to watch the recording “SCOM Management Group and database tuning”
by Stoyan Chalakov.
Deploy multiple management servers to distribute the monitoring load. Use load
balancing mechanisms to evenly distribute the agents across these servers.
Click here to learn more about the distributed deployment of Operations Manager
Consider using dedicated database servers for the SCOM databases, including the
Operations Manager and Data Warehouse databases. This helps optimize database
performance.
Click here to learn more about SQL Server Design Considerations
Carefully plan the placement of agents across servers and devices. Distribute agents
evenly across management servers to prevent overloading any one server.
Click here to learn more about Operations Manager Agents.
Click here to read how to upgrade an Operations Manager agent.
Monitor the resource utilization (CPU, memory, and disk space) of your management
servers and databases. Add more resources or additional servers as needed to maintain
optimal performance.
Click here to learn how to manage resource pools.
P a g e | 15
3.6 Tune Alerting and Monitoring Rules
Fine-tune alerting and monitoring rules to reduce noise and eliminate redundant or non-
critical alerts. Customize management packs to focus on essential metrics.
Click here to learn how an alert is produced.
Click here to learn how to close an alert generated by a monitor.
Click here to understand data driven alert management.
Click here to read Nathan Gau’s blog post Monitors vs. Rules and how they Affect
Alert Management.
Click here to watch the recording of SCOM alerting basics explained.
Click here to read an article by Neha Garg on Alert Tuning.
Click here to learn more about Easy Tune by Cookdown.
Click here to watch the recording of “SCOM alert tuning tips from the masters”.
Use overrides to modify thresholds and settings for specific objects, if necessary, to tailor
monitoring to the unique requirements of different components in your environment.
Click here to learn how to override a rule or monitor.
Click here to learn how to create a management pack for overrides.
Click here to learn more about using classes and groups for overrides.
Click here to read more about best practices for configuring overrides in Operations
Manager.
Agentless monitoring can be resource intensive. Limit its use to cases where it's essential,
and consider using agents for most monitoring tasks.
Click here to learn more about agentless monitoring in Operations Manager.
P a g e | 16
3.9 High Availability (HA)
Implement load balancing for management servers and gateways to distribute incoming
traffic evenly. Optimize network configurations to minimize latency and maximize
communication efficiency.
Click here to learn more about load balancing the Service Manager.
Click here to download the System Center Management Pack for Windows Server
Network Load Balancing.
Click here to read the article by Kevin Holman “Automating Agent Load Balancing for
Management Servers and Gateways”.
Click here to read more about the Windows Server Network Load Balancing (NLB)
Management Pack.
Ensure that the storage subsystems for SCOM databases are optimized for performance.
This includes using fast and reliable storage solutions.
Click here to read more about SQL Server Design Considerations.
Click here to learn more about the monitoring configuration in Management Pack for
SQL Server.
Perform routine maintenance tasks, such as database grooming, to keep the database
size in check and maintain SCOM's performance.
P a g e | 17
Click here to learn more about the grooming process in the SCOM Database, written by
Kevin Holman.
Click here to learn more about how to configure grooming settings for the Operations
Manager database.
Click here to learn more about Data Warehouse Grooming Tool, written by Blake Drumm.
Click here to download the Data Warehouse Grooming Tool
Utilize SCOM's reporting and dashboard capabilities to gain insights into the health and
performance of your monitoring infrastructure. These tools can help you identify
bottlenecks and areas that need optimization.
Click here to learn more about dashboards by SquaredUp.
Click here to learn how to create SCOM reports on Power BI.
Continuously monitor the growth of your environment and plan for future scalability
needs. Be prepared to scale up or out as your infrastructure expands.
Click here to read the Operations Manager Planning Guide
Stay current with SCOM updates, patches, and new releases. Microsoft often releases
performance improvements and feature enhancements in newer versions.
Click here to learn more about the System Center - Operations Manager build versions.
P a g e | 18
3.17 Monitoring as Code (MaC)
By following these strategies and best practices, SCOM administrators can effectively scale SCOM
in large environments while maintaining optimal performance and ensuring that critical IT
resources are continuously monitored.
Begin by identifying the critical applications and their components that need monitoring.
Understand the architecture of these applications to determine what to monitor.
Install and configure management packs that are specific to the applications and
technologies you want to monitor. Microsoft and third-party management packs can
provide pre-defined monitoring templates and rules.
P a g e | 19
4.4 Configure Distributed Application Models
Create Distributed Application Models (DAs) in SCOM to represent the structure of your
applications. DAs provide a high-level view of application health and relationships
between components.
Implement synthetic transactions or real user monitoring (RUM) to measure and report
on end-user experience. This can include monitoring response times, transaction success
rates, and user interactions.
Use SCOM to collect and monitor performance counters and metrics relevant to your
applications. Configure thresholds and alerts for critical performance indicators.
Integrate log monitoring into SCOM by utilizing log management solutions like SCOM
Log Analytics or third-party log aggregators. Collect and analyze application logs for
errors and anomalies.
Create custom monitors and rules to monitor specific components of your applications,
such as web servers, application servers, databases, and middleware.
P a g e | 20
4.10 Custom Scripting and Script Monitors
Develop custom scripts and script monitors to collect application-specific data or perform
custom checks. PowerShell and other scripting languages can be used for this purpose.
Configure alerting rules to notify IT teams when application performance thresholds are
breached. Ensure that alerts are sent to the right personnel through email, SMS, or
integration with incident management systems.
Use SCOM's capacity planning features to forecast resource needs for your applications.
This helps prevent performance issues due to resource constraints.
P a g e | 21
4.17 Regular Maintenance and Updates
Keep SCOM and its management packs up to date to ensure that you have access to the
latest features and performance improvements.
Review and adjust alert thresholds to align with the specific needs of your environment.
Fine-tune thresholds to reduce false positives and ensure that alerts are triggered only
when actual issues occur.
P a g e | 22
5.3 Suppress Noise
Use SCOM's built-in alert suppression mechanisms to prevent redundant or less critical
alerts from flooding the console. Configure maintenance mode for planned downtime to
suppress alerts during maintenance windows.
Create overrides for management pack rules and monitors to adjust their behavior for
specific objects or components. This allows you to tailor monitoring to match the unique
characteristics of each system.
Configure SCOM to group related alerts or deduplicate alerts that are essentially
reporting the same issue. This reduces the number of alerts generated for a single
problem.
Regularly review alerts and analyze their relevance. Disable or adjust rules and monitors
that consistently generate false or non-actionable alerts. Implement feedback loops to
improve alert accuracy.
Ensure that alerts are sent to the right personnel or teams. Configure notification
channels (e.g., email, SMS, ticketing systems) and subscribe individuals or groups to
specific alerts based on their responsibilities.
P a g e | 23
5.9 Script-Based Remediation
Use performance baselines and anomaly detection to identify deviations from normal
behavior. Alerts triggered by anomalies are often more indicative of genuine issues.
Create custom dashboards in SCOM to provide a real-time overview of alert status and
the health of your monitored environment. Dashboards help administrators quickly
identify critical issues.
Plan and schedule regular maintenance windows to coincide with low-impact periods.
This helps minimize alerts generated during maintenance activities.
P a g e | 24
5.15 Collaboration and Documentation
Regularly review the effectiveness of your alert management strategy. Analyze historical
data to identify patterns and trends in alerts, and adjust as needed.
Integrate SCOM with automation tools like Azure Automation Runbooks or System
Center Orchestrator. Create runbooks to automate common tasks and remediation
processes based on SCOM alerts.
6.2 Leverage SCOM Tasks and Diagnostic and Recover y Tasks (DRTs)
Utilize SCOM tasks and DRTs to automate common troubleshooting and remediation
procedures directly from SCOM alerts. These can be used to execute scripts, restart
services, or initiate other corrective actions.
P a g e | 25
6.3 Implement Self-Healing Automation
Set up automation rules to enable self-healing capabilities. Create rules that trigger
automatic remediation actions for common issues, reducing manual intervention and
downtime.
Integrate SCOM with external systems and services using webhooks. Webhooks enable
SCOM to communicate with third-party applications and trigger automated responses
based on alert notifications.
Customize alert notifications to include detailed information and resolution steps. This
helps automation scripts understand the context and take appropriate actions without
human intervention.
Use automation to correlate related alerts and incidents. Create automation scripts that
analyze multiple alerts and initiate remediation actions based on the aggregated
information, preventing alert storms.
P a g e | 26
6.9 Implement Role-Based Access Control (RBAC) for Automation
Define RBAC roles specifically for automation tasks. Limit access to automation scripts
and tools to authorized personnel only, ensuring security and compliance.
Include robust error handling mechanisms in automation scripts. Implement logging and
reporting to capture errors and exceptions, allowing for effective troubleshooting and
script improvement.
Stay informed about the latest automation tools, scripting languages, and techniques.
Continuously enhance your automation skills to leverage new capabilities and improve
existing workflows.
By implementing these strategies, a SCOM admin can enhance automation and remediation
capabilities, leading to improved efficiency, reduced downtime, and a more responsive IT
environment.
P a g e | 27
7. Enhancing Customization and Reporting
Enhancing customization and reporting within System Center Operations Manager (SCOM) is
crucial for tailoring monitoring solutions to specific organizational needs and gaining valuable
insights into system performance and health. Here are some strategies for a SCOM admin to
enhance customization and reporting capabilities:
7.1 Customization
Customize default management pack rules and thresholds based on your organization's
performance and availability requirements. Overrides allow you to adjust monitoring
settings without modifying the original management pack.
Design custom dashboards using SCOM's built-in tools or third-party solutions. Tailor
dashboards to display key performance indicators (KPIs) and metrics relevant to your
organization. Include visual representations for quick insights.
Customize performance collection rules to gather specific performance data from servers
and applications. Adjust collection intervals and counters based on your organization's
performance analysis requirements.
P a g e | 28
7.1.6 Web Application Availability Monitoring
Implement custom web application availability tests. Configure tests to monitor critical
transactions and user journeys within web applications. Customize thresholds and
response times for accurate availability measurements.
7.2 Reporting
Create custom reports using SQL Server Reporting Services (SSRS) or other reporting
tools. Tailor reports to display specific data points, trends, and historical performance
data. Custom reports can provide in-depth insights into system performance.
Schedule regular report generation and distribution. Automate report delivery to key
stakeholders via email or other communication channels. Ensure reports are delivered in a
format (PDF, Excel, etc.) that is easily understandable by recipients.
Leverage SCOM's Data Warehouse feature to store historical monitoring data. Utilize the
Data Warehouse for in-depth analysis and long-term reporting. Design custom queries
and reports to extract valuable insights from the stored data.
Implement custom performance analysis reports. Use trend analysis and forecasting to
predict potential performance issues. Customize reports to highlight peak usage periods
and resource bottlenecks.
Integrate SCOM data with Power BI for advanced data visualization and interactive
reporting. Power BI provides a wide range of visualization options and interactive features
to create compelling, customized reports.
P a g e | 29
7.2.6 Custom SQL Queries
Write custom SQL queries to extract specific data from the SCOM database. Use these
queries to create highly tailored reports that cater to unique organizational requirements.
Provide training sessions and documentation to end-users and IT staff on how to create
custom reports and dashboards. Encourage users to utilize the available customization
features effectively.
Regularly review customizations and reports to ensure they remain relevant and accurate.
Update customizations based on changing organizational needs, technology updates,
and user feedback.
By implementing these strategies, a SCOM admin can enhance customization and reporting
capabilities, enabling the organization to monitor systems effectively, make informed decisions,
and respond promptly to emerging issues.
P a g e | 30
Click here to read the Getting Started article by Microsoft.
Click here to read more about the SCOM Certification Path Overview by TopQore.
Click here to read more about Learn, Train & Troubleshoot SCOM on SCOMathon.
Click here to learn more about “ SCOM: Mastering Microsoft Operations Manager 2022”,
a 5-days training offered on Glasspaper.
Click here to learn more about smart System Center Operations Manager, a 5-day
training offered by ETC Austria.
Click here to learn more about the training “Mastering System Center Operations
Manager 2022”, by Kåre Rude Andersen.
P a g e | 31
Click here to find SCOM trainings on Udemy.
Click here to find SCOM trainings on Pluralsight.
Click here to find SCOM trainings on YouTube.
P a g e | 32
Click here to reach the Microsoft Management Pack page on Technet / Wiki.
Click here to reach the blog by Tao Yang.
Click here to reach the blog by Warren Kahn.
Click here to reach the blog by the Microsoft Tech Community.
Click here to reach the blog by Bob Cornelissen.
Click here to reach the blog by The Monitoring Guys.
Click here to reach the blog by Mountainss.
Click here to reach the blog by Jonathan Almquist.
Click here to reach the blog by Cookdown.
Click here to reach the blog by Blake Drumm.
Click here to reach the blog by Marnix Wolf.
Click here to reach the blog by Nathan Gau.
Click here to reach the blog by Michael Kamp.
Click here to reach the blog by Kevine Greene.
Click here to reach the blog by Kevin Justin.
Click here to reach the blog by D. Walsham.
Participate in Forums
Engage in forums like TechNet and Stack Overflow. Answering questions and discussing
issues with others can deepen your understanding of SCOM concepts.
Click here to reach the SCOM channel on reddit.
Click here to reach the SCOM community on the SCOMathon Slack Channel.
Attend Webinars
Participate in webinars hosted by SCOM experts and organizations. Webinars often cover
advanced topics and provide insights into industry best practices.
Attend Conferences
If possible, attend IT conferences where SCOM is a topic of discussion. Networking with
professionals and attending sessions can broaden your perspective.
P a g e | 33
Click here to reach the Midwest Management Summit event page.
Click here to reach the SCOMathon event page.
Click here to reach the Twin Cities System Center User Group event page.
Click here to reach the Experts Live event page.
Click here to reach the CollabDays event page.
Click here to reach the Microsoft Ignite event page.
Click here to reach the Microsoft Build event page.
Find a Mentor
If possible, find a mentor who is experienced in SCOM. Learning from someone with
practical experience can accelerate your learning process.
P a g e | 34
8.9 Continuous Learning and Experimentation
Stay Updated
IT is a rapidly changing field. Follow updates and new releases related to SCOM.
Subscribe to newsletters, blogs, and podcasts to stay informed.
Closing skill gaps and enhancing SCOM knowledge is a continuous journey. By combining formal
education, practical experience, online resources, and networking, you can keep your skills up-to-
date and stay competitive in the rapidly evolving IT landscape.
Thorough Research
Understand the features, limitations, and integration methods of the third-party solution.
Vendor Support
Establish a communication channel with the third-party vendor for technical support and
updates.
P a g e | 35
9.2 Infrastructure and Configuration
Optimized Infrastructure
Ensure that your SCOM infrastructure (servers, databases, network) is optimized for
handling additional workloads from third-party solutions.
Proper Configuration
Configure SCOM and the third-party solution according to best practices and vendor
recommendations.
Customize Monitoring
Tailor monitoring templates and alerts to suit your organization's specific needs and
objectives.
Integration
Integrate third-party alerts seamlessly into SCOM to have a unified alerting system.
Documentation
Maintain detailed documentation about the third-party solution's configuration,
integration methods, and issue resolution procedures.
Knowledge Sharing
Share knowledge within your team about the third-party solution, ensuring everyone is
on the same page regarding its capabilities and limitations.
Stay Updated
Keep both SCOM and the third-party solution up to date with the latest patches and
updates to ensure compatibility and security.
Regular Maintenance
Schedule regular maintenance tasks, including database cleanup, to keep the system
running smoothly.
P a g e | 36
6. Performance Optimization
Performance Monitoring
Monitor the performance of both SCOM and the third-party solution to identify
bottlenecks and areas for optimization.
Tuning
Fine-tune performance settings based on the monitoring data to optimize resource
usage.
9.7 Security
Access Control
Implement proper access controls to ensure that only authorized personnel can modify
configurations and settings related to the third-party solution.
Data Encryption
Enable encryption for data transmitted between SCOM and the third-party solution to
maintain security standards.
Proactive Monitoring
Implement proactive monitoring techniques to identify potential issues before they
impact the system.
Troubleshooting Skills
Develop strong troubleshooting skills to diagnose and resolve issues related to both
SCOM and the third-party solution promptly.
Provide Feedback
Offer feedback to the third-party vendor about your experiences, including suggestions
for improvements and feature requests.
P a g e | 37
9.10 Training and Certification
Continuous Learning
Stay updated with the latest technologies and best practices through training and
certifications related to SCOM and third-party solutions.
Enhancing your experience with third-party SCOM solutions is a continuous process that
involves a combination of technical expertise, effective communication, and proactive
management strategies. Regularly assess your systems, stay informed about updates and
best practices, and adapt your approach as technology evolves.
Focus on monitoring critical systems and services first. Identify the most important
applications and infrastructure components and allocate resources accordingly.
Fine-tune SCOM settings to reduce resource usage. This includes adjusting data retention
policies, lowering sampling intervals, and optimizing alert thresholds.
Use hardware wisely. Consider virtualization and cloud options to optimize hardware
resources. Utilize existing hardware to its fullest potential before investing in new
equipment.
P a g e | 38
10.4 Use Management Packs Wisely
Be selective about the management packs you use. Disable unnecessary or redundant
monitors and rules to reduce overhead. Regularly review and update management packs
to ensure they are optimized for performance.
Use synthetic transactions to simulate user interactions with critical applications. These
transactions can help identify performance issues without putting additional strain on the
monitored systems.
Conduct thorough capacity planning to anticipate future resource needs. This proactive
approach can help in allocating resources effectively and avoid sudden spikes in resource
demands.
10.7 Automation
Automate routine tasks such as maintenance and clean-up. Automation can significantly
reduce the workload on the SCOM infrastructure, allowing it to focus on essential
monitoring tasks.
Engage with the SCOM community and forums. Often, solutions to specific problems or
optimizations come from shared experiences within the community.
Continuously monitor the performance of SCOM itself. Identify bottlenecks and tune the
configuration as necessary. Regularly review SCOM reports to understand trends and plan
resources accordingly.
Monitoring the performance of System Center Operations Manager (SCOM) itself is
crucial to ensure that the monitoring system is running optimally and efficiently. Here are
several key aspects you should consider when monitoring the performance of SCOM:
P a g e | 39
10.9.1 Monitoring the performance of SCOM
CPU Usage
Monitor the CPU usage of the SCOM server(s). High CPU usage could indicate
performance bottlenecks.
Memory Usage
Keep an eye on memory consumption. Insufficient RAM can lead to slow performance.
Disk I/O
Monitor disk read/write speeds and ensure that the disk subsystem can handle the I/O
operations.
Network Usage
Check network utilization, especially if SCOM management servers and agents are
distributed across multiple locations.
Database Size
Monitor the size of the SCOM databases. Large databases can impact performance.
Database Latency
Measure the database query execution time. High latency might indicate issues with the
database server.
Index Fragmentation
Regularly check for index fragmentation on SCOM databases and rebuild/reorganize
indexes as needed.
P a g e | 40
10.9.1.4 Alerts and Notifications
Alerts Queue
Monitor the queue length of alerts waiting to be processed. A backlog could indicate
processing issues.
Notification Delays
Track notification delivery times to ensure timely alert notifications.
Use SCOM management packs or custom scripts to collect and analyze performance
counters related to SCOM components. Important counters include those related to the
Health Service, SDK Service, and Data Access.
Regularly check SCOM event logs and SCOM operational logs for any errors or warnings.
Unusual log entries can provide early indications of problems.
Create custom reports and dashboards in SCOM to visualize performance trends over
time. This can help in proactive monitoring and capacity planning.
Perform regular maintenance tasks, such as database grooming, purging old data, and
optimizing the SCOM databases.
Integrate SCOM with other monitoring tools to cross-verify alerts and performance data.
This can provide a more comprehensive view of your infrastructure.
Fine-tune alert thresholds to reduce noise. Customize alerting based on your specific
environment to focus on critical issues.
P a g e | 41
10.9.1.11 Regular Upgrades and Updates
Keep SCOM up to date with the latest updates and patches. Newer versions often come
with performance improvements and bug fixes.
By monitoring these aspects, you can ensure that SCOM is running smoothly, allowing
you to effectively monitor your entire infrastructure without any hiccups in the
monitoring system itself.
Evaluate the possibility of moving some monitoring tasks to cloud-based solutions. Cloud
monitoring services often handle scalability and resource management, allowing you to
focus on specific, critical tasks.
Click here to reach the Microsoft Azure Monitor web page.
Click here to reach the Microsoft Azure Sentinel web page.
Click here to reach the Microsoft Azure Monitor SCOM Managed Instance web page.
Click here and here to learn more on Azure Monitor SCOM Managed Instance published
by NiCE.
Invest in training for SCOM administrators. A well-trained team can make better use of
available resources and find innovative solutions to challenges.
Regularly review the SCOM setup and adjust based on changing requirements and
available resources. A flexible approach is essential when dealing with constraints.
By adopting a combination of these strategies and staying proactive, SCOM administrators can
effectively manage resource constraints while ensuring critical systems are monitored efficiently.
P a g e | 42
11. Optimize the SCOM Performance
Optimizing the performance of System Center Operations Manager (SCOM) is crucial to ensure
that it effectively monitors your IT environment without causing undue strain on resources. Here
are several steps a SCOM administrator can take to optimize SCOM performance:
Ensure that the hardware resources (CPU, memory, disk) allocated to the SCOM
management servers and databases are adequate for the size and workload of your
environment. Monitor resource usage and scale as needed.
Regularly perform maintenance tasks on the SCOM databases, including the Operations
Manager and Data Warehouse databases. This includes tasks like index optimization,
defragmentation, and database grooming.
Optimize the SQL Server instance hosting the SCOM databases. Set appropriate memory,
disk, and CPU configurations for SQL Server based on best practices.
Ensure that the SCOM databases are placed on fast and reliable storage to minimize
latency and maximize database performance. Consider using SQL Server AlwaysOn
Availability Groups for high availability.
Distribute the SCOM workload across multiple management servers if your environment
is large. Use load balancing to evenly distribute agent traffic.
P a g e | 43
11.6 Agent Management
Use overrides to adjust monitoring settings and thresholds for specific objects or groups
of objects. This helps tailor monitoring to your environment's specific needs.
Fine-tune alert thresholds and rules to reduce false positives and noise. Disable or adjust
rules that consistently generate non-actionable alerts.
Create and monitor performance baselines for your environment to understand normal
behavior and detect deviations more accurately.
Ensure that network communication between SCOM management servers, agents, and
databases is optimized to minimize latency and bottlenecks.
Integrate SCOM with log management solutions to offload long-term storage and
analysis of log data. This reduces the load on SCOM databases.
P a g e | 44
11.13 Reporting Optimization
Configure SCOM reporting services for optimal performance. Ensure that reporting
databases are maintained efficiently.
Keep SCOM and its management packs up to date. Microsoft often releases updates and
performance improvements in newer versions.
Document your SCOM configurations and best practices. Share knowledge among the
SCOM team to ensure that everyone follows performance optimization guidelines.
By implementing these strategies and regularly monitoring the performance of your SCOM
environment, you can ensure that SCOM operates efficiently and effectively, providing valuable
insights into the health and performance of your IT infrastructure.
P a g e | 45
12. Monitoring Non-Windows Platforms using
Microsoft SCOM
Expanding System Center Operations Manager (SCOM) to monitor non-Windows environments
is crucial for organizations with diverse IT infrastructures. SCOM primarily focuses on Windows-
based systems, but it can also be extended to monitor non-Windows environments using various
methods. Here’s what a SCOM admin can do to include monitoring of non-Windows
environments:
Write custom scripts or use existing ones to collect performance data from non-Windows
systems. SCOM supports scripting languages like PowerShell and VBScript.
Utilize SNMP (Simple Network Management Protocol) to monitor network devices, Unix-
based systems, and other SNMP-enabled devices. SCOM has built-in SNMP monitoring
capabilities.
P a g e | 46
12.4 Linux/Unix Monitoring
For Java-based applications and servers, use JMX management packs to monitor Java
applications and virtual machines.
Click here to learn more about how to configure monitoring for Java applications.
Click here to learn more about the Management Packs for JEE Application Servers on System
Center Wiki.
Click here to learn more about the Center Monitoring Pack for Java EE.
Utilize REST APIs and web services provided by applications and devices. SCOM can
consume data from APIs to monitor non-Windows environments.
Use SCOM to monitor log files on non-Windows systems. Configure rules to parse log
files for specific events or errors, allowing proactive issue detection.
Click here to learn more about the NiCE Log File Management Pack.
P a g e | 47
12.8 Database Monitoring
Employ management packs tailored for specific databases like MySQL, Oracle, or
PostgreSQL. These management packs enable monitoring of database performance,
availability, and health.
Click here to reach the DB2 Management Pack web page.
Click here to reach the MongoDB Management Pack web page.
Click here to reach the Oracle Management Pack web page.
Develop custom data collection methods using scripts or APIs to gather performance
metrics from non-Windows systems. Process this data in SCOM for monitoring and
alerting.
Engage with the SCOM community and explore third-party resources. Often, community-
developed management packs and scripts are available for monitoring non-Windows
environments.
Regularly test and update management packs and custom scripts to ensure compatibility
with the latest versions of SCOM and the non-Windows platforms being monitored.
By adopting these strategies, a SCOM admin can effectively extend the monitoring capabilities of
SCOM to include non-Windows environments, ensuring a comprehensive view of the entire IT
infrastructure.
P a g e | 48
Resources
https://auth0.com/docs/deploy-monitor/monitor/monitor-using-scom
https://blakedrumm.com/blog/scom-dw-grooming-tool/
https://blog.topqore.com/new-in-scom-2022-admin-rbac/
https://blog.topqore.com/scom-reporting-series-scheduling-reports/
https://ds.squaredup.com/blog/monitoring-microsoft-azure-and-hybrid-cloud/
https://ds.squaredup.com/blog/scom-activity-log/
https://kevinholman.com/2008/02/12/grooming-process-in-the-scom-database/
https://kevinholman.com/2014/03/12/modifying-access-in-scom-user-roles-without-the-console/
https://kevinholman.com/2016/05/26/monitoring-a-file-hash-using-scom/
https://kevinholman.com/2016/11/21/understanding-scom-resource-pools/
https://kevinholman.com/2018/05/06/implementing-tls-1-2-enforcement-with-scom/
https://kevinholman.com/2021/09/07/automating-agent-load-balancing-for-management-servers-and-gateways/
https://kevinholman.com/2022/05/01/scom-2022-quickstart-deployment-guide/
https://kevinjustin.com/blog/category/sql/
https://nathangau.wordpress.com/2020/04/21/security-monitoring-using-scom-to-capture-suspicious-user-activity/
https://nathangau.wordpress.com/2021/10/20/scom-security-monitoring-and-sentinel-integration/
https://nathangau.wordpress.com/tag/rule/
https://www.cookdown.com/blog/10-useful-scom-powershell-scripts
https://www.cookdown.com/blog/introducing-easy-tune-the-new-way-to-tune-scom
https://www.cookdown.com/blog/scom-alert-basics
https://www.nice.de/2023/04/19/azure-scom-mi-nice-management-packs/
https://www.nice.de/2023/09/11/microsoft-scom-itsm-ticketing-connectors/
https://www.souravmahato.com/how-to-make-reporting-console-part-of-high-availability-in-scom/
https://scomathon.com/blog/coffee-break-integrating-the-security-monitoring-mp-into-microsoft-sentinel/
https://scomathon.com/blog/coffee-break-scom-alerting-basics-explained/
https://scomathon.com/webinars/coffee-break/scom-security/
https://scomathon.com/webinars/workshop-week-2020/scom-management-group-and-database-tuning/
https://www.youtube.com/watch?v=jm7qTFrH-9A
Blogs
http://blog.scomskills.com/
P a g e | 49
http://thoughtsonopsmgr.blogspot.com/
https://blakedrumm.com/
https://blog.rjz.de/category/scom/
https://blog.topqore.com/
https://blog.tyang.org/categories/
https://kevingreeneitblog.blogspot.com/search/label/SCOM
https://kevinholman.com/
https://kevinjustin.com/blog/tag/scom/
https://maxcoreblog.com/
https://michelkamp.wordpress.com/
https://monitoringguys.com/
https://mountainss.wordpress.com/tag/scom/
https://nathangau.wordpress.com/
https://www.anoopcnair.com/sccm-scom-alerts-fine-tune-alerts/
https://www.cookdown.com/blog
https://www.opsman.co.za/tag/scom/
https://www.walshamsolutions.com/technical-blog
Documentation
https://learn.microsoft.com/en-us/azure/automation/automation-hybrid-runbook-worker
https://learn.microsoft.com/en-us/azure/azure-monitor/agents/om-agents
https://learn.microsoft.com/en-us/azure/azure-monitor/vm/scom-managed-instance-overview
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/manage/monitor/cloud-models-monitor-overview
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/strategy/monitoring-strategy
https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-enable-ama
https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-enable-log-analytics
https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-overview
https://learn.microsoft.com/en-us/azure/sentinel/automation
https://feedback.azure.com/d365community/forum/2a49c9ee-4436-ec11-b6e6-00224824730c
https://learn.microsoft.com/en-us/services-hub/unified/health/establish-connectivity-to-azure
https://learn.microsoft.com/en-us/services-hub/unified/health/setup-config-log-analytics-scom
https://learn.microsoft.com/en-us/skypeforbusiness/management-tools/use-scom-management-pack/test-users-and-settings
https://learn.microsoft.com/en-us/system-center/orchestrator/integration-pack-for-operations-manager?view=sc-orch-2022
https://learn.microsoft.com/en-us/system-center/scom/configure-log-analytics-for-scom-managed-instance?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/deploy-distributed-deployment?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/deploy-install-gateway-server?view=sc-om-2022&tabs=InstallGatewayServer
https://learn.microsoft.com/en-us/system-center/scom/deploy-upgrade-agents?view=sc-om-2022
P a g e | 50
https://learn.microsoft.com/en-us/system-center/scom/get-started?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/key-concepts?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/making-changes-to-operations-manager-management-group?view=sc-om-
2022
https://learn.microsoft.com/en-us/system-center/scom/manage-agent-heartbeat-overview?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-agentless-monitoring?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-alert-created-by-monitor?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-alert-data-driven-management?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-alert-generation-overview?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-configure-monitoring-java-applications?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-integration-thirdparty-overview?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/management-pack-change-tracking?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-mp-create-unsealed-mp?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-mp-lifecycle?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-mp-mpassessment?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-mp-override-rule-monitor?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-mp-overview-override-targets?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-omdb-grooming-settings?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-overview-management-pack?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-reports-create-reports?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-reports-installed-during-setup?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-resource-pools-manage?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-security-create-runas-account?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-security-overview?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/manage-using-omcmdlets?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/operations-manager-managed-instance-create-reports-on-power-
bi?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/operations-manager-managed-instance-overview?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/plan-hadr-design?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/plan-mgmt-group-design?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/plan-planning-agent-deployment?view=sc-om-2022&tabs=Windows
https://learn.microsoft.com/en-us/system-center/scom/plan-resource-pool-design?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/plan-security-accounts?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/plan-security-runas-accounts-profiles?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/plan-security-tls12-config?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/plan-sqlserver-design?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/release-build-versions?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/sql-server-management-pack-monitoring-configuration?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/system-requirements?view=sc-om-2022
P a g e | 51
https://learn.microsoft.com/en-us/system-center/scom/web-application-availability-monitoring-template?view=sc-om-2022
https://learn.microsoft.com/en-us/system-center/scom/welcome?view=sc-om-2022
https://learn.microsoft.com/en-us/troubleshoot/system-center/scom/best-practices-configure-overrides
https://learn.microsoft.com/en-us/system-center/scsm/load-balancing?view=sc-sm-2022
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/monitoring-active-directory-for-signs-
of-compromise
Downloads
https://github.com/blakedrumm/SCOM-DW-Grooming-Tool
https://github.com/MPCatalog/scom-community-catalog
https://github.com/search?q=scom&type=repositories
https://www.microsoft.com/en-us/download/details.aspx?id=103379
https://www.microsoft.com/en-us/download/details.aspx?id=13302
https://www.microsoft.com/en-us/download/details.aspx?id=50013
https://www.microsoft.com/en-us/download/details.aspx?id=54081
https://www.microsoft.com/en-us/download/details.aspx?id=54525
Events
https://build.microsoft.com/en-US/home
https://defcon.org/index.html
https://expertslive.org/
https://ignite.microsoft.com/en-US/home
https://mmsmoa.com/
https://www.collabdays.org/
https://azure.microsoft.com/en-us/products/microsoft-sentinel
https://learn.microsoft.com/en-us/answers/questions/107136/scom-2019-role-based-access-and-delegation
https://learn.microsoft.com/en-us/answers/questions/1349333/scom-bottleneck
https://learn.microsoft.com/en-us/answers/questions/906535/need-a-scom-alert-when-perticular-user-tries-to-lo
https://learn.microsoft.com/en-us/answers/questions/926293/script-for-collecting-data-from-scom
https://techcommunity.microsoft.com/t5/skype-for-business-blog/create-and-configure-users-for-synthetic-transactions/ba-
p/619121
https://techcommunity.microsoft.com/t5/system-center/ct-p/SystemCenter
P a g e | 52
https://techcommunity.microsoft.com/t5/system-center-blog/bg-p/SystemCenterBlog
https://techcommunity.microsoft.com/t5/system-center-blog/finally-alert-tuning-for-scom-solved/ba-p/1192802
https://techcommunity.microsoft.com/t5/system-center-blog/secure-your-infrastructure-monitoring-with-scom/ba-p/2180736
https://social.technet.microsoft.com/wiki/contents/articles/16174.microsoft-management-packs.aspx
https://systemcenter.wiki/
https://systemcenter.wiki/#gsc.tab=0
https://systemcenter.wiki/?GetCategory=Community+Catalog+Management+Pack
https://systemcenter.wiki/?GetCategory=Java+EE+Monitoring
https://systemcenter.wiki/?GetCategory=JEE+Application+Servers
https://systemcenter.wiki/?GetCategory=Windows+Server+Network+Load+Balancing+%28NLB%29
https://systemcenter.wiki/?Get-ManagementPack=Microsoft.SystemCenter.SyntheticTransactions.Library&Version=6.1.7221.0
https://systemcenter.wiki/?Get-ManagementPack=Security.Monitoring&Version=1.0.4.272
https://systemcenter.wiki/?Get-ManagementPack=TLS_Compliance_Pack&Version=1.0.0.21
Third-Party Solutions
https://axanto.com/
https://silect.com/
https://squaredup.com/
https://subscription.packtpub.com/book/cloud-and-networking/9781782176244/1/ch01lvl1sec12/designing-for-high-availability
https://www.nice.de/active-365-mp/
https://www.nice.de/aix-management-pack-for-microsoft-scom/
https://www.nice.de/all-solutions/
https://www.nice.de/ibm-db2-management-pack/
https://www.nice.de/log-file-monitoring-scom-nice-logfile-mp/
https://www.nice.de/microsoft-scom-mp-ibm-system-z-monitoring-nice-zlinux-mp/
https://www.nice.de/nice-linux-power-mp-for-microsoft-scom/
https://www.nice.de/nice-mongodb-management-pack-for-microsoft-scom/
https://www.nice.de/nice-veritas-cluster-mp-for-microsoft-scom/
https://www.nice.de/oracle-database-management-pack/
https://www.nice.de/powerha-management-pack/
Trainings
https://learn.microsoft.com/en-us/training/browse/
https://learn.microsoft.com/
https://scomathon.com/training-tools/
https://topqore.com/topqore-scom-certification-path-overview/
P a g e | 53
https://www.etc.at/training/scom/
https://www.glasspaper.no/en/courses/scom/
https://www.pluralsight.com/courses/monitor-maintain-software-defined-datacenter-scom
https://www.pluralsight.com/search?q=system%20center%20operations%20manager
https://www.prajwaldesai.com/update-scom-management-packs/
https://www.stigviewer.com/stig/microsoft_scom/
https://www.truesec.com/training/mastering-system-center-operations-manager
https://www.udemy.com/courses/search/?src=ukw&q=system+center+operations+manager
https://www.youtube.com/results?search_query=system+center+operations+manager
User Groups
https://memug.org/
https://nwscug.org/
https://scomathon.com/
https://scomathon.slack.com/
https://tcsmug.org/
https://www.hasmug.com/
https://www.reddit.com/r/scom/
P a g e | 54
About NiCE
NiCE Services for Microsoft System Center encompass consulting services tailored to System
Center Operations Manager, Configurations Manager, and Service Manager. Our offerings include
SCOM Health Assessments, advice and provisioning for third-party SCOM tools, as well as SCOM-
centric monitoring solutions for business elements such as applications, databases, operating
systems, services, and custom applications.
NiCE Management Packs for SCOM are available for AIX, Azure AD Connect, Entra ID, Citrix VAD &
ADC, Custom Applications, HCL Domino, IBM Db2, IBM Power HA, Linux on Power Systems, Log
Files, Microsoft 365, Microsoft Teams, Microsoft SharePoint, Microsoft Exchange, Microsoft
OneDrive, Mongo DB, Oracle, Veritas Clusters, VMware, VMware Horizon, and zLinux.
Our commitment
1. Ongoing development, incl. latest version support
2. Top required metrics come out-of-the-box
3. Integrated source knowledge to solve issues faster
4. Custom development & coaching
5. Highly responsive support team
6. Easy onboarding & renewals
7. Largest set of Microsoft SCOM Management Packs
Take advantage of all the benefits of advanced monitoring using NiCE Management Packs for
Microsoft System Center Operations Manager. Contact us at [email protected] (EMEA, APAC), or
[email protected] (US, LATAM) for a quick demo, and a free 30 days trial.
NiCE IT Management Solutions GmbH NiCE IT Management Solutions Corporation
Liebigstrasse 9 3478 Buskirk Avenue, Suite 1000
71229 Leonberg Pleasant Hill, CA 94523
Germany USA
www.nice.de www.nice.us.com
[email protected] [email protected]
P a g e | 55