SCOM Installation and Configuration

SCOM Installation and Configuration The below installation procedure will install SCOM components (RMS), Operations Manager DB. The root management server (RMS) is the only management server in a management group that runs the System Center Data Access (previously named the SDK service) and the System Center Management Configuration (previously named the config service) services, and…

Installation of SQL Server for SCOM

Installation of SQL Server for SCOM Overview The below configuration and installation steps are aimed for All-in-One server installation of SCOM, SQL and Reporting components. Hardware Configuration (Recommended): Intel(R) Xeon (R) CPU 2.33 Ghz or above (2 Processors and 64 bit Server) 32 GB RAM 2 TB Hard Drive Software Configuration (Recommended): Microsoft Windows 2008…

Steps to install PDC in RedHAT 6

Steps to install PDC in RedHAT 6 Steps to install PDC in RedHAT 6 Install BIND – yum install bind* Copy localhost from /var/named to in /var/named/chroot/var/named with anyextension – forward lookup (ex. hyaking.for) Cp /var/named/named.localhost /var/named/chroot/var/name/india.for Configure hyaking.for IN SOA @ hostname(FQDN) & root server in domain (              123; 1D; 1H; 1W; 3H;) NS…

Lenovo Chassis Management Module 2

Lenovo Chassis Management Module 2 The Lenovo Chassis Management Module 2 (CMM) is a hot-swap Lenovo Flex System module that you use to configure and manage all installed Lenovo Flex System components. The CMM provides system-management functions for all components in a Lenovo Flex System Enterprise Chassis. It controls a serial port for connection to a local console or a serial management network and…

Symantec Endpoint protection Manager Installation and Configuration

Symantec Endpoint protection Manager Installation and Configuration Symantec Endpoint Protection, developed by Symantec Corporation, is an antivirus and personal firewall product leveled at centrally managed corporate environments security for servers and workstations.  Table of Contents Symantec Endpoint Protection Specifications Installing the SEPM and deploying clients involves the following steps Installation and Configuration Screenshots Specifications: The…

Massive ransomware infection

Massive ransomware infection Massive ransomware infection spreading across the globe. It exploits the EternalBlue exploit from the Shadowbrokers dump released last month. File Name : tasksche.exe SHA : ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa Please apply this patch immediately to all endpoints. https://technet.microsoft.com/en-us/library/security/ms17-010.aspx Wannacry Ransomware fixes from Microsoft. For all OS. Windows XP SP3 http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-custom-enu_eceb7d5023bbb23c0dc633e46b9c2f14fa6ee9dd.exe Windows Vista x86 http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.0-kb4012598-x86_13e9b3d77ba5599764c296075a796c16a85c745c.msu Windows…

Leveraged Finance

Leveraged Finance Leveraged finance was established to oversee and expand the role of a bank in the leveraged finance market. Most of the companies use debt to finance operations. By doing so, a company increases its leverage because it can invest in business operations without increasing its equity. Leveraged finance is funding a company or…