certutil -vocsprootcertutil -vocsproot delete2. Configure Certificate Template
– Open Server Manager -> Expand Roles, Active Directory Certificate Services -> Right-click the name of your CA -> click Properties
– Click the Extensions tab -> In the Select extension list, click Authority Information Access (AIA)
– Click Add -> In the Location box, type http:///ocsp (Note: ServerDNSName is the hostname of the Online Responder server) -> click OK
[table id=10 /]
[table id=11 /]
Some simple netsh command to manage your network interface. Please that the “PublicTeam” in quote is what I named my teaming network. So when running this command, change the PublicTeamto whatever you have named your teaming.
1. Change IP Address of PublicTeam NIC:netsh interface ip set address “PublicTeam” static 192.168.0.41 255.255.255.0 192.168.0. 12. Adding multiple IPs to the PublicTeam NIC:netsh in ip add address “PublicTeam” 192.168.0.42 255.255.255.0netsh in ip add address “PublicTeam” 192.
After the agent had been deployed, review the result and resolve any failure. In my case, the account used for deployment “sysads\scom-msaa” does not have domain admin access to my domain controller. So I will repeat the deployment but this time I would specify an account with domain admin access
Extract: Audit Collection Services (ACS) provides a means to collect records generated by an audit policy and store them in a centralized database.
– In the Connect Using section -> Ensure Windows Integrated Security is selected -> click Apply
– From the console -> Right-click on Management Packs and click Import Management Packs
In Part5, I will be looking at deploying the SCOM agent to the servers and Configure Client Monitoring.
In Part2, I will be looking at installing the Root Management Server (RMS)