Operations | Monitoring | ITSM | DevOps | Cloud

Cookdown

How to get the most from your ITSM monitoring integrations?

Before talking about integration, let’s take a look at your non-automated Service Management processes. There isn’t a right or wrong answer as this varies based on your needs, think through the below questions to get a perspective on how tasks flow within your company today.

How can I convert SCOM alerts into actionable ServiceNow Incidents?

Firstly, let’s look at why it is so valuable to integrate SCOM and ServiceNow. There are lots of tools available to help you integrate SCOM and ServiceNow. So, the next step is to understand which one will provide your business with the best solution. To help you work through this decision we recommend you ask yourself the following questions.

Bringing SCOM Override Sprawl Under Control With PowerBI

Have you ever wondered where all your SCOM overrides are stored? Want to easily find the source and target of each override? In this webinar, we showcase our new PowerBI based tool, designed to turn your override spaghetti into orderly overrides. Using our Microsft PowerBI Sankey Diagrams you can easily see your override MPs scope and destination, enabling you to visualize and then take control of your overrides with Easy Tune, our free alert tuning solution.

Download PowerBI Diagram for visualizing overrides using Sankey

Did you catch our recent webinar on how PowerBI makes it possible to visualize override sprawl in SCOM with Sankey Diagrams and want to give our Sankey diagrams a go yourself? You are in the right place. Before you dive in, take a look at our blog explaining the “why” to using Sankey PowerBI diagrams to see your overrides, and how to take action based on what you see here.

Overcome security challenges with ServiceNow CMDB population

Networks always start off small and simple, but over time they can become increasingly complex. You start with a small network consisting of a simple Virtual Local Area Network (VLAN) with broad connectivity. However, once your security team get involved and add DMZs, routers, firewalls, etc you will find it hard to keep track of the intricate web you have created to support your business network.

Top integration tools to populate your CMDB

A Configuration Management Database (CMDB) is critical in supporting services such as Incidents and Change & Asset Management. Most companies dream of having a beautifully populated CMDB, but struggle with how to make this a reality as the process can be quite daunting! But never fear there are loads of tools you can buy to do just this! Typically, there are three types of solutions designed to populate your CMDB, these are either agent-based, scanner, or integration style tools.

Bringing override sprawl under control with PowerBI

Picture this scenario - the final SQL 2008 server is decommissioned and all replacement SQL servers are monitored using the SQL version agnostic MP - finally! But, before cracking open the bubbly, you will want to pull out the MPs relating to SQL 2008 from SCOM. Easy…? Just delete them from the console… wrong!