Scom 2012 knowledge sharing-21: No proxy Management

Source: Internet
Author: User
Tags fully qualified domain name

Platform: System Center 2012 RTM/SP1

Bytes ------------------------------------------------------------------------------------------------------

If you cannot or are not suitable for installing a proxy on your computer, use the computer without proxy monitoring.

Computers without proxy management are Windows-based computers found on the Operation console. You can assign a Computer Managed by a Management Server or proxy to provide the remote proxy function of the computer.

Managing a computer without proxy management is the same as installing a proxy on the computer. Not all management packages work in Agent-free mode.

Bytes ------------------------------------------------------------------------------------------------------

Configure the computer for no-proxy Management

Use a specific account to log on to the console. This account is a member of the Operations Manager Administrator role of the Management Group.

Click Manage ".

At the bottom of the Navigation Pane, click discovery wizard ".

650) This. width = 650; "Title =" 00 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 00 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798103cZsg.png "Height =" 484 "/>

On the "Discovery type" page, click "Windows computer ".

650) This. width = 650; "Title =" 01 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 01 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798103WqKq.png "Height =" 484 "/>

On the "Automatic or advanced" Page, perform the following operations:

Select Automatic Computer discovery or advanced discovery ".

In the "computer and equipment" list, select "server and client", "server only", or "client only ".

In the manage servers list, click the Management Server or gateway server of the computer you want to discover.

If you select "server and client", you can select the "verify that you can contact a computer found" check box. This may increase the agent deployment success rate, but it may take longer.

Note

If the Active Directory does not contain the NetBIOS Name of the computer in the domain, select "verify that you can contact the computer you found ". Otherwise, the "Browse or type" option cannot find the computer. This affects computers in the following domains by using the gateway server: The domain where the management server is located, another domain with full trust, And untrusted domain.

Click "Next ".

Note

If you have selected "verify that you can contact the computer you found", the wizard returns about 4000 computers. If you do not select this option, you can return 10,000 computers. "Automatic Computer discovery" verifies that you can contact the computer you found. Computers that have been managed by the Management Group do not return.

650) This. width = 650; "Title =" 02 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 02 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798104qY7n.png "Height =" 484 "/>

On the "Discovery Method" page, you can scan or browse the Active Directory domain service or Type A computer name to find the computer you want to manage.

To browse the Active Directory domain service or Type A computer name, perform the following operations:

Select Browse or enter a computer name, Click Browse, specify the name of the computer to be managed, and then click OK ".

In the Browse or Type Computer Name box, type A computer name separated by a semicolon, comma, or new line. You can use the NetBIOS computer name or a fully qualified domain name (FQDN ).

650) This. width = 650; "Title =" 03 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 03 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798104ZjaC.png "Height =" 484 "/>

Click "Next" and then Perform one of the following operations on the "Administrator Account" Page:

If you have not selected "Use the selected management server operation account", select it.

Select "other user accounts", type "User Name" and "password", and select "Domain" from the list ". If the user name is not a domain account, select "this is a local computer account, not a domain account ".

Important

This account must have administrative privileges on the target computer. If you select "this is a local computer account, not a domain account", the management server operation account is used for execution discovery.

650) This. width = 650; "Title =" 04 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 04 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798104OIiv.png "Height =" 484 "/>

Click discover to display the discovery progress page. The time required to complete the discovery depends on many factors, such as the specified conditions and environment configuration.

Note

The wizard does not return to a computer that has been managed by the Management Group.

On the "select objects to manage" Page, perform the following operations:

Select the computer on which you want to become a proxy management computer.

In the "Management Mode" list, click "No proxy", and then click "Next ".

Click Change, select the proxy program you want to use, click OK, and then click Next ".

650) This. width = 650; "Title =" 05 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 05 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798105NSnW.png "Height =" 484 "/>

The agent can be an scom Management Server or another server with the scom agent installed ..

650) This. width = 650; "Title =" 06 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 06 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798108QwzK.png "Height =" 484 "/>

On the summary page, click Finish.

650) This. width = 650; "Title =" 07 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 07 "src =" http://img1.51cto.com/attachment/201407/31/639838_14067981080wim.png "Height =" 484 "/>

After completion ,.

650) This. width = 650; "Title =" 08 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 08 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798108Bj7o.png "Height =" 299 "/>

Here we configure the proxy program used for non-proxy monitoring as scom Management Server scom1. Right-click scom1 and select Properties ,.

650) This. width = 650; "Title =" 09 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 09 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798112rUeb.png "Height =" 398 "/>

Switch to the Security tab and you can see that the default scom Management Server has configured "allow this server to act as a proxy and discover hosted objects on other computers".

650) This. width = 650; "Title =" 10 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 10 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798112pGkh.png "Height =" 484 "/>

Of course, we can also choose another server with the scom agent installed to act as a proxy without proxy monitoring. We can right-click the target computer server.demo.com without proxy monitoring, standalone "change agent".

650) This. width = 650; "Title =" 11 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 11 "src =" http://img1.51cto.com/attachment/201407/31/639838_14067981120K18.png "Height =" 268 "/>

On the change agent page, you can select another computer as the agent without proxy monitoring ,.

650) This. width = 650; "Title =" 12 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 12 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798112TIGX.png "Height =" 451 "/>

By default, the installed proxy server does not enable the "allow this server to act as a proxy and discover hosted objects on other computers" option. We can manually enable it.

650) This. width = 650; "Title =" 13 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 13 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798113m75C.png "Height =" 305 "/>

Select "allow this server to act as a proxy and discover hosted objects on other computers".

650) This. width = 650; "Title =" 14 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 14 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798113V5YQ.png "Height =" 259 "/>

After a moment, we can see the running status of the computer without proxy monitoring ,.

650) This. width = 650; "Title =" 38 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 38 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798113attx.png "Height =" 215 "/>

You can further view the alarm details ,.

650) This. width = 650; "Title =" 39 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 39 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798114Enip.png "Height =" 417 "/>

Bytes --------------------------------------------------------------------------------------------------------------

This article is from the blog "Zeng luxin's technical column" and will not be reposted!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.