Windows Server 2008 R2 Unleashed (164 page)

prise CA, the steps need to be completed for the management servers as well.

To request and install the root CA certificate on the DMZ server, execute the following steps:

1. Log on to a DMZ server with local administrator rights.

2. Open a web browser and point it to the certificate server, in this case

https://dc1.companyabc.com/certsrv. Enter credentials if prompted.

3. Click the Download a CA Certificate, Certificate Chain, or CRL link (shown in

Figure 23.10).

4. Click the Download CA Certificate link. Note: If the certificate does not download,

add the site to the Local Intranet list of sites in Internet Explorer.

5. Click Open to open the CA certificate.

6. Click Install Certificate to install the CA certificate.

Monitoring DMZ Servers with Certificates

833

23

FIGURE 23.10

Downloading a root CA certificate.

ptg

7. At the Certificate Import Wizard screen, click Next.

8. Select Place All Certificates in the Following Store option button.

9. Click Browse.

10. Click the Show Physical Stores check box.

11. Expand the Trusted Root Certification Authorities folder and select the local

computer store.

12. Click OK.

13. Click Next, Finish, and OK to install the CA certificate.

14. Close any open windows.

Repeat for all DMZ servers. Now the DMZ servers will trust certificates issued by the certifi-

cation authority. The next step is to request the certificates to use for the mutual authenti-

cation for all servers.

Requesting a Certificate from the Root CA Server

Each of the management servers and the servers in the DMZ will need to be issued certifi-

cates to use for communication.

The steps to request a certificate are as follows:

1. Log on as an administrator, then open a web browser and point it to the certificate

server (in this case, https://dc1.companyabc.com/certsrv).

2. Click the Request a Certificate link.

834

CHAPTER 23

Integrating System Center Operations Manager 2007 R2 with

Windows Server 2008 R2

3. Click the Advanced Certificate Request link.

4. Click the Create and Submit a Request to This CA link.

5. In the Type of Certificate Template field, select Operations Manager.

6. In the Name field, enter the FQDN (fully qualified domain name) of the target server.

NOTE

Go to the actual server to get the name! On the server, go to Computer Properties,

Computer Name. Copy the full computer name and paste it into the Name field of the

form.

7. Click Submit.

8. Click Yes when you get the warning pop-up.

9. Click Install This Certificate.

10. Click Yes when you see the warning pop-up. The certificate is now installed in the

user certificate store.

ptg

NOTE

The certificate was installed in the user certificate store, but needs to be in the local

computer store for Operations Manager. The ability to use web enrollment to directly

place the certificate into the local computer store was removed from the Windows

Server 2008 web enrollment, so the certificate needs to be moved manually.

11. Select Start, Run and then enter mmc to launch an MMC console.

12. Select File and Add/Remove Snap-In.

13. Select Certificates and click the Add button.

14. Select My User Account and click Finish.

15. Select Certificates again and click the Add button.

16. Select Computer Account and click Next.

17. Select the local computer, click Finish, and then click OK.

18. Expand the Certificates – Current User, Personal, and select the Certificates folder.

19. In the right pane, right-click the certificate issued earlier and select All Tasks,

Export. The certificate can be recognized by the certificate template name

Operations Manager.

20. At the Certificate Export Wizard, click Next.

21. Select Yes, Export the Private Key. Click Next.

22. Click Next.

23. Enter in a password and click Next.

Monitoring DMZ Servers with Certificates

835

24. Enter in a directory and filename and click Next.

25. Click Finish to export the certificate. Click OK at the pop-up.

26. Expand the Certificates (Local Computer), Personal, and select the Certificates folder.

NOTE

If this is the first certificate in the local computer store, the Certificates folder will not

exist. Simply select the Personal folder instead and the Certificates folder will be creat-

ed automatically.

23

27. Right-click in the right pane and select All Tasks, Import.

28. At the Certificate Import Wizard, select Next.

29. Click Browse to locate the certificate file saved earlier. Change the file type to

Personal Information Exchange (.pfx) to see the file. Click Next.

30. Enter in the password used earlier, select the Mark This Key as Exportable, and

click Next.

31. Click Next.

ptg

32. Click Finish and then click OK at the pop-up to complete the import.

The preceding steps need to be completed for each DMZ server and for each manage-

ment server.

Installing the Agent on the DMZ Server

The agent needs to be installed manually on each DMZ server. Normally, agents would be

pushed by the Operations Manager console, but DMZ servers typically reside in the DMZ

and are not members of the domain.

The steps to manually install the agent are as follows:

1. Log on as an administrator and insert the OpsMgr 2007 R2 installation media.

2. At the AutoPlay menu, select Run SetupOM.exe.

3. Select Install Operations Manager 2007 R2 Agent from the menu.

4. Click Next.

5. Click Next to accept the default directory.

6. Click Next to specify management group information.

7. Type in the management group name and FQDN of the management server. Keep

the default management server port as 5723. The example shown in Figure 23.11 has

COMPANYABC as the management group name and omr2.companyabc.com as the

management server.

836

CHAPTER 23

Integrating System Center Operations Manager 2007 R2 with

Windows Server 2008 R2

FIGURE 23.11

Manually entered management group information.

8. Click Next.

9. Click Next at the Agent Action Account page to leave the local system as the

action account.

ptg

10. Click Install to complete the installation.

11. When the installer is finished, click Finish.

The preceding steps need to be completed for each DMZ server.

The agent is installed, but will not communicate correctly with the management server.

This is because the agent has not been configured to use the certificate for mutual authen-

tication. This will be done in the next section.

Configuring the Agent to Use the Certificate

After the agent is installed, the agent still needs to be configured to use the correct certifi-

cate. The OpsMgr installation includes a utility called MOMCertImport.exe that configures

the agent to use certificates for authentication and specifies which certificate in the local

computer store to use. The tool does not do any validation checking of the certificate

itself, so care needs to be taken that the correct certificate is selected.

The steps to configure the agent to use a certificate are as follows:

1. Log on as an administrator on the DMZ server and insert the OpsMgr 2007 R2 instal-

lation media.

2. At the AutoPlay menu, select Run SetupOM.exe.

3. Select Browse This CD from the menu.

4. Select the SupportTools directory and then the AMD64 directory.

Using Operations Manager 2007 R2

837

NOTE

Windows Server 2008 R2 is a 64-bit operating system, so the AMD64 is the correct

folder for the 64-bit binaries. If the procedure is being run for 32-bit servers, select the

appropriate directory for the binaries such as i386.

5. In the directory, double-click MOMCertImport.exe.

6. In the pop-up window, select the certificate issued previously and click OK. The

23

View Certificate button can be used to view the certificate details if the correct cer-

tificate is not obvious.

The Operation Manager service will restart automatically to have the certificate selection

take effect. The preceding steps need to be repeated for each DMZ server and for each

management server.

The Operations Manager event log can be viewed with the Windows Event Viewer. It is

named Operations Manager and is located in the Applications and Services Logs folder in

the tool. Any problems with the certificate will be shown in the log immediately follow-

ing the start of the System Center Management service.

ptg

Using Operations Manager 2007 R2

After Operations Manager 2007 R2 has been installed and configured, ongoing work needs

to be done to ensure that the product performs as expected. The two primary activities are

to, first, tune the management packs to ensure that alerts are valid for the environment

and that alert noise is reduced and, second, produce reports of the information that

Operations Manager 2007 R2 is collecting.

Alert Tuning

After deploying Operations Manager 2007 R2, there are frequently complaints about the

number of alert notifications that get generated. This can cause organizations to decom-

mission the product, ignore the emails, or generally complain about what a bad product it

is. In reality, the Operations Manager alert notifications just need to be tuned.

The following process will help you tune the management packs quickly and effectively to

reduce alert and email noise. This is done by adjusting parameters on the rules

(Enable/Disable, Severity, and Priority) using overrides.

Alert Severity is the first parameter to be tuned. There are three levels:

. Critical (2)

. Warning (1)

. Information (0)

838

CHAPTER 23

Integrating System Center Operations Manager 2007 R2 with

Windows Server 2008 R2

The numeric value of the severity is given as well, as some rules and monitors will show

the severity as a value rather than as text.

Alert Priority is the second parameter to be tuned. There are three levels of priority as well:

. High

. Medium

. Low

These tuning procedures assume that the notification subscriptions were created that were

outlined in the “Notifications and Subscriptions” section earlier in the chapter. These noti-

fication subscriptions are as follows:

. Notification for All Critical Severity High-Priority Alerts

. Notification for All Critical Severity Medium-Priority Alerts

When you get an email from an alert that you don’t want, you need to tune the manage-

ment pack monitor or rule. The basic decision tree is as follows:

A. Disable the Alert?

If yes, create an override to disable the rule for either the

instance of the object, the class of objects, or a group of the objects. This prevents

the alert from being generated, so no console alerts and definitely no emails are

ptg

generated. This would be done if the alert does not reflect a real problem.

B. Change Severity?

If yes, create an override to change the alert severity to

Warning. This keeps the alert in the console as a warning, but does not generate an

email. This would be done if the alert is real, but is not actionable.

Other books

Lipstick 'n Lead by Petrova, Em
Romancing the Billionaire by Jessica Clare
What Had Become of Us by Kathryn Kuitenbrouwer
Finding Parker by Hildreth, Scott, Hildreth, SD
Molly by Melissa Wright
Las aventuras de Pinocho by Carlo Collodi
Crossing the River by Caryl Phillips