Export (0) Print
Expand All
1 out of 1 rated this helpful - Rate this topic

Managing Access in Operations Manager

Updated: November 1, 2013

Applies To: System Center 2012 - Operations Manager, System Center 2012 R2 Operations Manager, System Center 2012 SP1 - Operations Manager

Managing Access in Operations Manager topics

  • Operations Manager Accounts

    This section describes the accounts that Operations Manager uses.

  • Implementing User Roles

    To enable individuals to access monitoring data and perform actions, you assign them to user roles. This section explains how to use user roles to manage access in Operations Manager.

  • How to Create a New Action Account in Operations Manager

    The action account is used to gather information about, and run responses on, the managed computer. This procedure explains how to create a new action account that has access to the Operations Manager database.

  • How to Manage the Report Server Unattended Execution Account in Operations Manager

    The Operations Manager Report Server unattended execution account is used to query data from the Reporting Data Warehouse and is configured through Microsoft SQL Server 2008. This procedure explains how to manage this account.

  • Control Access by Using the Health Service Lockdown Tool in Operations Manager

    On computers requiring high security, such as a domain controller, you may need to deny certain identities access to rules, tasks, and monitors that might jeopardize the security of your server. The Health Service lockdown tool (HSLockdown.exe) enables you to use various command-line options to control and limit the identities used to run a rule, task, or monitor.

  • Accessing UNIX and Linux Computers in Operations Manager

    This section explains how to configure and manage access to computers running UNIX and Linux operating systems.

  • Managing Run As Accounts and Profiles

    Operations Manager workflows, such as rules, tasks, monitors, and discoveries, require credentials to run on a targeted agent or computer. These credentials are configured by using Run As profiles and Run As accounts. This section explains how to create, configure, and manage Run As profiles and accounts.

Other resources for this component

-----
For additional resources, see Information and Support for System Center 2012.

Tip: Use this query to find online documentation in the TechNet Library for System Center 2012. For instructions and examples, see Search the System Center 2012 Documentation Library.
-----
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft. All rights reserved.