Platform: System Center 2012 RTM/SP1
Bytes ------------------------------------------------------------------------------------------------------
If you cannot or are not suitable for installing a proxy on your computer, use the computer without proxy monitoring.
Computers without proxy management are Windows-based computers found on the Operation console. You can assign a Computer Managed by a Management Server or proxy to provide the remote proxy function of the computer.
Managing a computer without proxy management is the same as installing a proxy on the computer. Not all management packages work in Agent-free mode.
Bytes ------------------------------------------------------------------------------------------------------
Configure the computer for no-proxy Management
Use a specific account to log on to the console. This account is a member of the Operations Manager Administrator role of the Management Group.
Click Manage ".
At the bottom of the Navigation Pane, click discovery wizard ".
650) This. width = 650; "Title =" 00 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 00 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798103cZsg.png "Height =" 484 "/>
On the "Discovery type" page, click "Windows computer ".
650) This. width = 650; "Title =" 01 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 01 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798103WqKq.png "Height =" 484 "/>
On the "Automatic or advanced" Page, perform the following operations:
Select Automatic Computer discovery or advanced discovery ".
In the "computer and equipment" list, select "server and client", "server only", or "client only ".
In the manage servers list, click the Management Server or gateway server of the computer you want to discover.
If you select "server and client", you can select the "verify that you can contact a computer found" check box. This may increase the agent deployment success rate, but it may take longer.
Note
If the Active Directory does not contain the NetBIOS Name of the computer in the domain, select "verify that you can contact the computer you found ". Otherwise, the "Browse or type" option cannot find the computer. This affects computers in the following domains by using the gateway server: The domain where the management server is located, another domain with full trust, And untrusted domain.
Click "Next ".
Note
If you have selected "verify that you can contact the computer you found", the wizard returns about 4000 computers. If you do not select this option, you can return 10,000 computers. "Automatic Computer discovery" verifies that you can contact the computer you found. Computers that have been managed by the Management Group do not return.
650) This. width = 650; "Title =" 02 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 02 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798104qY7n.png "Height =" 484 "/>
On the "Discovery Method" page, you can scan or browse the Active Directory domain service or Type A computer name to find the computer you want to manage.
To browse the Active Directory domain service or Type A computer name, perform the following operations:
Select Browse or enter a computer name, Click Browse, specify the name of the computer to be managed, and then click OK ".
In the Browse or Type Computer Name box, type A computer name separated by a semicolon, comma, or new line. You can use the NetBIOS computer name or a fully qualified domain name (FQDN ).
650) This. width = 650; "Title =" 03 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 03 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798104ZjaC.png "Height =" 484 "/>
Click "Next" and then Perform one of the following operations on the "Administrator Account" Page:
If you have not selected "Use the selected management server operation account", select it.
Select "other user accounts", type "User Name" and "password", and select "Domain" from the list ". If the user name is not a domain account, select "this is a local computer account, not a domain account ".
Important
This account must have administrative privileges on the target computer. If you select "this is a local computer account, not a domain account", the management server operation account is used for execution discovery.
650) This. width = 650; "Title =" 04 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 04 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798104OIiv.png "Height =" 484 "/>
Click discover to display the discovery progress page. The time required to complete the discovery depends on many factors, such as the specified conditions and environment configuration.
Note
The wizard does not return to a computer that has been managed by the Management Group.
On the "select objects to manage" Page, perform the following operations:
Select the computer on which you want to become a proxy management computer.
In the "Management Mode" list, click "No proxy", and then click "Next ".
Click Change, select the proxy program you want to use, click OK, and then click Next ".
650) This. width = 650; "Title =" 05 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 05 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798105NSnW.png "Height =" 484 "/>
The agent can be an scom Management Server or another server with the scom agent installed ..
650) This. width = 650; "Title =" 06 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 06 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798108QwzK.png "Height =" 484 "/>
On the summary page, click Finish.
650) This. width = 650; "Title =" 07 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 07 "src =" http://img1.51cto.com/attachment/201407/31/639838_14067981080wim.png "Height =" 484 "/>
After completion ,.
650) This. width = 650; "Title =" 08 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 08 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798108Bj7o.png "Height =" 299 "/>
Here we configure the proxy program used for non-proxy monitoring as scom Management Server scom1. Right-click scom1 and select Properties ,.
650) This. width = 650; "Title =" 09 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 09 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798112rUeb.png "Height =" 398 "/>
Switch to the Security tab and you can see that the default scom Management Server has configured "allow this server to act as a proxy and discover hosted objects on other computers".
650) This. width = 650; "Title =" 10 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 10 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798112pGkh.png "Height =" 484 "/>
Of course, we can also choose another server with the scom agent installed to act as a proxy without proxy monitoring. We can right-click the target computer server.demo.com without proxy monitoring, standalone "change agent".
650) This. width = 650; "Title =" 11 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 11 "src =" http://img1.51cto.com/attachment/201407/31/639838_14067981120K18.png "Height =" 268 "/>
On the change agent page, you can select another computer as the agent without proxy monitoring ,.
650) This. width = 650; "Title =" 12 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 12 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798112TIGX.png "Height =" 451 "/>
By default, the installed proxy server does not enable the "allow this server to act as a proxy and discover hosted objects on other computers" option. We can manually enable it.
650) This. width = 650; "Title =" 13 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 13 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798113m75C.png "Height =" 305 "/>
Select "allow this server to act as a proxy and discover hosted objects on other computers".
650) This. width = 650; "Title =" 14 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 14 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798113V5YQ.png "Height =" 259 "/>
After a moment, we can see the running status of the computer without proxy monitoring ,.
650) This. width = 650; "Title =" 38 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 38 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798113attx.png "Height =" 215 "/>
You can further view the alarm details ,.
650) This. width = 650; "Title =" 39 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 39 "src =" http://img1.51cto.com/attachment/201407/31/639838_1406798114Enip.png "Height =" 417 "/>
Bytes --------------------------------------------------------------------------------------------------------------
This article is from the blog "Zeng luxin's technical column" and will not be reposted!