SlideShare a Scribd company logo
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
Using Microsoft System Center to Manage beyond the Trusted Domain Pete Zerger, Rory McCawPrincipal ConsultantsInfront Consulting GroupSession Code:  MGT300Both
Agenda RoryPublic Key Infrastructure DefinedAnatomy of  a Certificate How Does Certificate Authentication Work?Public Key Infrastructure Differences across Operating Systems Using PKI to Extend the Reach of System CenterChanges in Provisioning Certificates in Windows 2008Bulk Certificate Provisioning for System CenterManaging Internet-Based Clients with ConfigMgr 2007Troubleshooting Certificates in OpsMgr 2007Monitoring CA and Certificate Validity
What Is a PKI?The combination of software, encryption technologies, processes, and services that enables an organization to secure its communications and business transactions
Anatomy of a CertificateA certificate is like a PassportIssued for specific usesServer Authentication (1.3.6.1.5.5.7.3.1)Client Authentication (1.3.6.1.5.5.7.3.2)To work, the issuer must be a ‘trusted’ authorityIf some piece of information does not check out – authentication fails
RoryHow Does Certificate Authentication Work?“Keys” to Success All systems must trust the CA that issued the certificates
 Each system requires a cert mapped to their FQDN
  Public keys are distributed with the certificate
 Private keys are never distributed, they are privateAgentGW
Certificate Authority OptionsRoryStandalone CA can be a quick fix   EnterpriseCA - requires more thought, planning and buy-in from across the organizationServer OS version is another important consideration. Our recommendation:Use Standard Edition Server for all offline CAs (Root CA, Policy CA). Use Enterprise Edition Server of all online CAs
RoryStand-alone versus Enterprise CA on Win2k3Standalone Root CA on W2k3 Standard‘Other’ certificate template  allows  for certificate creationEnterprise Root CA on Enterprise EditionNeed to duplicate Server Authentication certificate template to create an OpsMgr template
RoryStand-alone versus Enterprise CA on W2k8Standalone Root CA on W2k8 StandardNo option to store the certificate in the Local Computers certificate storeMust use certreq or export from the Local User store and import into the Local Computer storeEnterprise CA on W2k8 Enterprise Cross forest authentication allows clients to request a certificate from a CA that is part of a different ADThis will require populating the NTAuth store in the additional forests
The Certificate Stores RoryCertificates storesPersonal Certificate storeTrusted Root Certificate Authorities storeOperations Manager storeDon’t touch the certificates in this store. This is internally generated.
Pete Configuration ValidationCertificate Configuration and Validity1. Check for Certificate in StoreLocal Computer/Personal/Certificates2. Verify Certificate ConfigurationCheck for client and server authentication OIDs 4. Verify Issuing CA is Trusted Check the Certification Path3. Check for Certificate in StoreLocal Computer/Personal/Certificates
Common PitfallsRoryName resolutionConfirm that DNS is working or use hosts fileIPv6 on Windows Server 2008 R2 Confirm that IPv6 addresses are registered in DNSWindows FirewallConfigure properly or disableCertificate configurationImport Trusted Root CA certConfirm certs are imported in Local Computer store, not Local User storeRun momcertimport.exe with Admin credentials on W2k8CRLs must be accessible
Using PKI to Extend the Reach of System CenterExtend OpsMgr to Windows based workgroup computersExtend OpsMgr to separate Active Directory Forest through a gatewayExtend OpsMgr to xplat serversExtend Config Mgr to internet based clients
Certificate Configuration in OpsMgrRoryRory McCawPrincipal Consultant	Infront Consulting Groupdemo
PeteCertificate Provisioning Options Auto-enrollment is not an option outside trust boundaries  without W2k8*2008 Web Enrollment no longer gives users the option of storing a Machine Certificate in the Local Computer storeAdvantages of Command Line Provisioning Avoid Web Enrollment Limitations Many certificate properties can be pre-populated Provisioning can be automated to some degreeCertificates can be generated in bulk* Cross Forest Authentication in W2k8
Pete Bulk Certificate Provisioning Manual requests can be time consuming Automation possible from the command lineCertreq.exe – to make the requestCertutil.exe - to process/retrieve the request Can be scripted for batch processingRequires a certificate templateTIP: Because they share common OID requirements, OpsMgr 2007 and ConfigMgr 2007 agents can share the same certificate
Bulk Provisioning of Certificates  demoPeteFor System Center
Internet-Based Client Management Pete TIP: AD Forest can be separate from site servers and no trust required
ConfigMgr Topology Optionsfor Internet-based Client Mgmt
Ops Mgr Mutual AuthenticationRequired in Operations Manager 2007 Two methods: Kerberos  - Requires Active Directory Certificate Authentication Update TopologyOkUpdate TopologyRequest toJoinX
OpsMgr Authentication Troubleshooting ChecklistCertificate ConfigurationCorrect OIDs (1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2)
Serial Appears in Registry (MOMCertImport)
Issuing CA Appears in Trusted Root Cert AuthoritiesConnectivity Issues Network Connectivity – Ping, Telnet 5723
Name Resolution Review Events in OpsMgr Event Log Start on Downstream Node
Pete Certificate Authentication Events Look for Events in OpsMgr Event Log Relevant events will be in the 20,000 and 21,000 ranges21016 / 20070 – Generic event with every authentication failure.
20050 – Enhanced key usage error (wrong OID)
21005 – DNS resolution failed
21006 – TCP Connection failed (at TCP level)
21007 – Not in a trusted domain. (no full trust)Master List of OpsMgr Authentication Errorshttp://www.systemcentercentral.com/teched
TroubleshootingName Resolution and ConnectivityPete Name ResolutionDownstream node must resolve name of upstream node by FQDNGateway must resolve FQDN of Mgmt ServerAgent must resolve FQDN of GatewayAgent must resolve FQDN of Mgmt Server (if no GW)Network Connectivity Verify Agent or Gateway Server can telnet to management server on port 5723Connection is instantiated by downstream component
Pete Troubleshooting Namespace IssuesIf using non-routable namespaces across the Internet Establish site-to-site VPN tunnel  ORUse HOSTS file on Gateway to resolve Management Serverms.contoso.localgtw.contoso.localInternet
Pete Troubleshooting Certificates (cont)Verify MOMCertImport successfully wrote certificate serial # to the registryHKLM\SOFTWARE\Microsoft\Microsoft Operations Manager\3.0\Machine Settings\ChannelCertificateSerialNumberCompare to certificate serial number on certificate in Local Computer Certificate StoreIf wrong serial, delete the key and re-run MOMCertImportRun momcertimport.exe as an Administrator
Cross-Platform Monitoring OpsMgr 2007 R2 extends agent-based monitoring to *NIX systemsCan be installed remotely from the consoleTarget *NIX systems can be outside Kerberos boundaryRory

More Related Content

PDF
Configuring kerberos based sso in weblogic
PPTX
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
PPTX
Win Connections Technical Overview (Harold W)
PDF
Citrix xen server 6.0.2
PDF
Directory of-infosec-assured-products
PDF
Ccnp sisas 300 208
PDF
LTRSEC-2017-LG
PDF
Four Must Know Certificate and Key Management Threats That Can Bring Down You...
Configuring kerberos based sso in weblogic
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Win Connections Technical Overview (Harold W)
Citrix xen server 6.0.2
Directory of-infosec-assured-products
Ccnp sisas 300 208
LTRSEC-2017-LG
Four Must Know Certificate and Key Management Threats That Can Bring Down You...

What's hot (6)

PDF
Five Must Haves to Prevent Encryption Disasters
PDF
20140416 cisco
PDF
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
PDF
Silk4net Tcm6 174178
PDF
1 y0 253-q&a-demo-certmagic
PDF
1. device onboarding pdf
Five Must Haves to Prevent Encryption Disasters
20140416 cisco
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Silk4net Tcm6 174178
1 y0 253-q&a-demo-certmagic
1. device onboarding pdf
Ad

Viewers also liked (20)

PPT
24 Hours Of Exchange Server 2007 ( Part 9 Of 24)
PDF
Microsoft Exchange Server 2010 Installation
PDF
Partners Guide - System Center
PDF
System Center Configuration Manager 2012 Sneak Peek
PDF
System Center Configuration Manager-The Most Popular System Center Component
PPTX
Deploying Microsoft System Center in Days
PPT
Data Center Optimization With Microsoft System Center Son Vu
PDF
OCSL - Microsoft System Center & Windows Server 2012 webinar March 2012
PDF
MS TechDays 2011 - Automating Your Infrastructure System Center Orchestrator ...
PPTX
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
PDF
System Center 2012 Orchestrator R2 - Enterprise IT Automation
PDF
System Center 2012 R2 - Enterprise Automation
PPTX
System Center Endpoint Protection
PDF
Microsoft System Center 2012 Delivering better IT Management
PDF
Microsoft System Center Service Manager on a Single Computer
PPTX
Managing Updates with System Center Configuration Manager 2012
PDF
Microsoft Exchange Server 2013 Installation
PDF
Microsoft System Center 2012 R2 Overview - Presented by Atidan
PPTX
Microsoft System Center Configuration Manager for Education
PPTX
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
24 Hours Of Exchange Server 2007 ( Part 9 Of 24)
Microsoft Exchange Server 2010 Installation
Partners Guide - System Center
System Center Configuration Manager 2012 Sneak Peek
System Center Configuration Manager-The Most Popular System Center Component
Deploying Microsoft System Center in Days
Data Center Optimization With Microsoft System Center Son Vu
OCSL - Microsoft System Center & Windows Server 2012 webinar March 2012
MS TechDays 2011 - Automating Your Infrastructure System Center Orchestrator ...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
System Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 R2 - Enterprise Automation
System Center Endpoint Protection
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center Service Manager on a Single Computer
Managing Updates with System Center Configuration Manager 2012
Microsoft Exchange Server 2013 Installation
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center Configuration Manager for Education
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
Ad

Similar to MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain (20)

PDF
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
PPTX
VMworld 2015: Horizon View Troubleshooting - Looking Under the Hood
PDF
Sp 29 two_factor_auth_guide
PPT
Creating Secure Applications
DOC
Ad cs-step-by-step-guide
PPTX
3DConsulting_Presentation
PPT
SQL Server 2008 Security Overview
PPTX
MCSA 70-412 Chapter 06
PDF
ESM_AdminGuide_6.9.0.pdf
PPT
The WiKID Strong Authentication Systems Overview
PPTX
Why Cant I Access The Portal
PPTX
DigiCert EV Code Signing Certificate Feature and Benefits
PPT
Session 10 Tp 10
PDF
Help Achieve Compliance Objectives with Microsoft Dynamics GP
PPT
0505 Windows Server 2008 一日精華營 PartI
PPTX
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
PPTX
Building Secure Extranets with Claims-Based Authentication #SPEvo13
PDF
How to Pass Salesforce Identity and Access Management Architect Exam?
PDF
How EverTrust Horizon PKI Automation can help your business?
PPTX
Win Connections Technical Overview ( Harold W)
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
VMworld 2015: Horizon View Troubleshooting - Looking Under the Hood
Sp 29 two_factor_auth_guide
Creating Secure Applications
Ad cs-step-by-step-guide
3DConsulting_Presentation
SQL Server 2008 Security Overview
MCSA 70-412 Chapter 06
ESM_AdminGuide_6.9.0.pdf
The WiKID Strong Authentication Systems Overview
Why Cant I Access The Portal
DigiCert EV Code Signing Certificate Feature and Benefits
Session 10 Tp 10
Help Achieve Compliance Objectives with Microsoft Dynamics GP
0505 Windows Server 2008 一日精華營 PartI
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
Building Secure Extranets with Claims-Based Authentication #SPEvo13
How to Pass Salesforce Identity and Access Management Architect Exam?
How EverTrust Horizon PKI Automation can help your business?
Win Connections Technical Overview ( Harold W)

More from Louis Göhl (19)

PPTX
Citrix vision and product highlights november 2011
PPTX
Citrix vision & strategy overview november 2011
PPTX
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
PPTX
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
PPTX
VMware vSphere 4.1 deep dive - part 2
PPTX
VMware vSphere 4.1 deep dive - part 1
PPTX
Storage and hyper v - the choices you can make and the things you need to kno...
PPTX
Security best practices for hyper v and server virtualisation [svr307]
PPTX
Hyper v and live migration on cisco unified computing system - virtualized on...
PPT
HP Bladesystem Overview September 2009
PPTX
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
PPTX
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
PPTX
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
PPTX
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
PPTX
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
PPTX
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
PPTX
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
PPTX
Windows Virtual Enterprise Centralized Desktop
PPTX
Optimized Desktop, Mdop And Windows 7
Citrix vision and product highlights november 2011
Citrix vision & strategy overview november 2011
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 1
Storage and hyper v - the choices you can make and the things you need to kno...
Security best practices for hyper v and server virtualisation [svr307]
Hyper v and live migration on cisco unified computing system - virtualized on...
HP Bladesystem Overview September 2009
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
Windows Virtual Enterprise Centralized Desktop
Optimized Desktop, Mdop And Windows 7

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Tartificialntelligence_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain

  • 2. Using Microsoft System Center to Manage beyond the Trusted Domain Pete Zerger, Rory McCawPrincipal ConsultantsInfront Consulting GroupSession Code: MGT300Both
  • 3. Agenda RoryPublic Key Infrastructure DefinedAnatomy of a Certificate How Does Certificate Authentication Work?Public Key Infrastructure Differences across Operating Systems Using PKI to Extend the Reach of System CenterChanges in Provisioning Certificates in Windows 2008Bulk Certificate Provisioning for System CenterManaging Internet-Based Clients with ConfigMgr 2007Troubleshooting Certificates in OpsMgr 2007Monitoring CA and Certificate Validity
  • 4. What Is a PKI?The combination of software, encryption technologies, processes, and services that enables an organization to secure its communications and business transactions
  • 5. Anatomy of a CertificateA certificate is like a PassportIssued for specific usesServer Authentication (1.3.6.1.5.5.7.3.1)Client Authentication (1.3.6.1.5.5.7.3.2)To work, the issuer must be a ‘trusted’ authorityIf some piece of information does not check out – authentication fails
  • 6. RoryHow Does Certificate Authentication Work?“Keys” to Success All systems must trust the CA that issued the certificates
  • 7. Each system requires a cert mapped to their FQDN
  • 8. Public keys are distributed with the certificate
  • 9. Private keys are never distributed, they are privateAgentGW
  • 10. Certificate Authority OptionsRoryStandalone CA can be a quick fix   EnterpriseCA - requires more thought, planning and buy-in from across the organizationServer OS version is another important consideration. Our recommendation:Use Standard Edition Server for all offline CAs (Root CA, Policy CA). Use Enterprise Edition Server of all online CAs
  • 11. RoryStand-alone versus Enterprise CA on Win2k3Standalone Root CA on W2k3 Standard‘Other’ certificate template allows for certificate creationEnterprise Root CA on Enterprise EditionNeed to duplicate Server Authentication certificate template to create an OpsMgr template
  • 12. RoryStand-alone versus Enterprise CA on W2k8Standalone Root CA on W2k8 StandardNo option to store the certificate in the Local Computers certificate storeMust use certreq or export from the Local User store and import into the Local Computer storeEnterprise CA on W2k8 Enterprise Cross forest authentication allows clients to request a certificate from a CA that is part of a different ADThis will require populating the NTAuth store in the additional forests
  • 13. The Certificate Stores RoryCertificates storesPersonal Certificate storeTrusted Root Certificate Authorities storeOperations Manager storeDon’t touch the certificates in this store. This is internally generated.
  • 14. Pete Configuration ValidationCertificate Configuration and Validity1. Check for Certificate in StoreLocal Computer/Personal/Certificates2. Verify Certificate ConfigurationCheck for client and server authentication OIDs 4. Verify Issuing CA is Trusted Check the Certification Path3. Check for Certificate in StoreLocal Computer/Personal/Certificates
  • 15. Common PitfallsRoryName resolutionConfirm that DNS is working or use hosts fileIPv6 on Windows Server 2008 R2 Confirm that IPv6 addresses are registered in DNSWindows FirewallConfigure properly or disableCertificate configurationImport Trusted Root CA certConfirm certs are imported in Local Computer store, not Local User storeRun momcertimport.exe with Admin credentials on W2k8CRLs must be accessible
  • 16. Using PKI to Extend the Reach of System CenterExtend OpsMgr to Windows based workgroup computersExtend OpsMgr to separate Active Directory Forest through a gatewayExtend OpsMgr to xplat serversExtend Config Mgr to internet based clients
  • 17. Certificate Configuration in OpsMgrRoryRory McCawPrincipal Consultant Infront Consulting Groupdemo
  • 18. PeteCertificate Provisioning Options Auto-enrollment is not an option outside trust boundaries without W2k8*2008 Web Enrollment no longer gives users the option of storing a Machine Certificate in the Local Computer storeAdvantages of Command Line Provisioning Avoid Web Enrollment Limitations Many certificate properties can be pre-populated Provisioning can be automated to some degreeCertificates can be generated in bulk* Cross Forest Authentication in W2k8
  • 19. Pete Bulk Certificate Provisioning Manual requests can be time consuming Automation possible from the command lineCertreq.exe – to make the requestCertutil.exe - to process/retrieve the request Can be scripted for batch processingRequires a certificate templateTIP: Because they share common OID requirements, OpsMgr 2007 and ConfigMgr 2007 agents can share the same certificate
  • 20. Bulk Provisioning of Certificates demoPeteFor System Center
  • 21. Internet-Based Client Management Pete TIP: AD Forest can be separate from site servers and no trust required
  • 22. ConfigMgr Topology Optionsfor Internet-based Client Mgmt
  • 23. Ops Mgr Mutual AuthenticationRequired in Operations Manager 2007 Two methods: Kerberos - Requires Active Directory Certificate Authentication Update TopologyOkUpdate TopologyRequest toJoinX
  • 24. OpsMgr Authentication Troubleshooting ChecklistCertificate ConfigurationCorrect OIDs (1.3.6.1.5.5.7.3.1,1.3.6.1.5.5.7.3.2)
  • 25. Serial Appears in Registry (MOMCertImport)
  • 26. Issuing CA Appears in Trusted Root Cert AuthoritiesConnectivity Issues Network Connectivity – Ping, Telnet 5723
  • 27. Name Resolution Review Events in OpsMgr Event Log Start on Downstream Node
  • 28. Pete Certificate Authentication Events Look for Events in OpsMgr Event Log Relevant events will be in the 20,000 and 21,000 ranges21016 / 20070 – Generic event with every authentication failure.
  • 29. 20050 – Enhanced key usage error (wrong OID)
  • 30. 21005 – DNS resolution failed
  • 31. 21006 – TCP Connection failed (at TCP level)
  • 32. 21007 – Not in a trusted domain. (no full trust)Master List of OpsMgr Authentication Errorshttp://www.systemcentercentral.com/teched
  • 33. TroubleshootingName Resolution and ConnectivityPete Name ResolutionDownstream node must resolve name of upstream node by FQDNGateway must resolve FQDN of Mgmt ServerAgent must resolve FQDN of GatewayAgent must resolve FQDN of Mgmt Server (if no GW)Network Connectivity Verify Agent or Gateway Server can telnet to management server on port 5723Connection is instantiated by downstream component
  • 34. Pete Troubleshooting Namespace IssuesIf using non-routable namespaces across the Internet Establish site-to-site VPN tunnel ORUse HOSTS file on Gateway to resolve Management Serverms.contoso.localgtw.contoso.localInternet
  • 35. Pete Troubleshooting Certificates (cont)Verify MOMCertImport successfully wrote certificate serial # to the registryHKLM\SOFTWARE\Microsoft\Microsoft Operations Manager\3.0\Machine Settings\ChannelCertificateSerialNumberCompare to certificate serial number on certificate in Local Computer Certificate StoreIf wrong serial, delete the key and re-run MOMCertImportRun momcertimport.exe as an Administrator
  • 36. Cross-Platform Monitoring OpsMgr 2007 R2 extends agent-based monitoring to *NIX systemsCan be installed remotely from the consoleTarget *NIX systems can be outside Kerberos boundaryRory
  • 37. demoCross Platform Agent Deployment in OpsMgrRory McCawPrincipal Consultant Infront Consulting Group
  • 38. OpsMgr Cross-Platform Issues RoryPortsTCP 22 (Discovery with SSH)TCP 1270 (Agent Communication via WS-Man)Certificate ErrorsPrerequisite IssuesHostname mismatchWinRM Errors Basic Authentication Not Enabled winrm set winrm/config/client/auth @{Basic="true"}Run As Execution Unix Action Account and Unix Privileged Account
  • 39. Monitoring CA HealthRoryPKI Health Tool Monitors CA Health and Current Activity Included in Windows 2008 OS Provides Visual Indicators of HealthTo launch: Start  Run  PKIView.mscCRL Distribution Points Enterprise CA HierarchyAuthority Information Access (AIA)
  • 40. Monitoring Certificate HealthRoryAll Certificates have an Expiration DateCertificate validity can be monitored with Operations ManagerNo off-the-shelf Microsoft Solution Solution: PKI Certificate Verification MPAlerts on Certificate Health Issues Including:A certificate’s lifetime is about to expire A certificate’s lifetime has ended Certificate has been revoked Root CertOM CertCRLX
  • 41. Birds of a feather session on Thursday System Center Questions... Answered!!announcing
  • 43. Required SlideSpeakers, TechEd 2009 is not producing a DVD. Please announce that attendees can access session recordings at TechEd Online. www.microsoft.com/techedSessions On-Demand & Communitywww.microsoft.com/learningMicrosoft Certification & Training Resourceshttp://microsoft.com/technetResources for IT Professionalshttp://microsoft.com/msdnResources for DevelopersResources
  • 44. Complete an evaluation on CommNet and enter to win an Xbox 360 Elite!
  • 46. Required Slide© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.