SC2012 OpsMgr Deployment
SC2012 OpsMgr Deployment
Operations Manager
Microsoft Corporation
Published: April 2012
Copyright
This document is provided "as-is". Information and views expressed in this document, including
URL and other Internet Web site references, may change without notice.
Some examples depicted herein are provided for illustration only and are fictitious. No real
association or connection is intended or should be inferred.
This document does not provide you with any legal rights to any intellectual property in any
Microsoft product. You may copy and use this document for your internal, reference purposes.
You may modify this document for your internal, reference purposes.
© 2012 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Bing, Internet Explorer, JScript, SharePoint, Silverlight, SQL Server,
Visio, Visual Basic, Visual Studio, Win32, Windows, Windows Intune, Windows PowerShell, and
Windows Vista are trademarks of the Microsoft group of companies. Portions of this
documentation related to network monitoring are provided by EMC, and for those portions the
following copyright notice applies 2010 © EMC Corporation. All rights reserved. All other
trademarks are property of their respective owners.
Revision History
Release Date Changes
Contents
Document History
Release date Changes
Tasks
The following topics introduce the task areas covered in the Deployment Guide:
Planning the System Center 2012 - Operations Manager Deployment
Deploying System Center 2012 - Operations Manager
Upgrading to System Center 2012 - Operations Manager
Maintaining the System Center 2012 - Operations Manager Infrastructure
Downloadable Documentation
You can download a copy of this technical documentation from the Microsoft Download Center.
Always use the TechNet library for the most up-to-date information.
Note
Unified Installer is a utility designed to perform new, clean installations of System Center
2012 for testing and evaluation purposes only. If you want to upgrade from an existing
System Center installation or choose any set up options such as high availability or multi-
server component installs, we recommend you refer instead to the procedures detailed in
the deployment guides for each individual System Center 2012 component.
Important
Before you follow any of these procedures, make sure that you verify that the servers in
your Operations Manager 2007 R2 management group meet the minimum supported
configurations for System Center 2012 – Operations Manager. This will help you
determine whether you need to add any new servers to your management group before
you upgrade. For more information, see Supported Configurations for
System Center 2012 – Operations Manager.
In a distributed management group upgrade, you upgrade the secondary management servers,
the gateways, and agents. The order of agent upgrade depends on how the agents were
deployed. If you installed the agents manually, you upgrade the agents before you upgrade the
management servers and gateways.
1. Remove Agents from Pending Management
2. Check the Operations Manager 2007 R2 RMS for Active Connected Console
3. Disable Notification Subscription
4. Stop the Connector Services or Disable any Connector
These procedures are outlined in detail in Pre-Upgrade Tasks for Operations Manager
Resource Pools
A resource pool is a collection of management servers, or gateway servers, used to distribute
work amongst themselves and take over work from a failed member.
Due to the introduction of resource pools, we recommend that all management servers be
connected by a low latency network. This means that if you are currently using management
servers in multiple datacenters or sites we recommend you move all management servers to a
single data center and use gateway servers at the other sites.
You should always have two management servers in ANY environment. A second management
server allows for failover and easy restore. All management servers are members of the All
Management Servers Resource pool, which balances the monitoring load of your management
group as new management servers are added, and provides automatic failover for monitoring.
SeeDistributed Deployment of Operations Manager for complete details.
Make sure the SDK Service is running on all management servers and that any SDK client
(console, web console, connector, PowerShell) can connect to it. In System
Center 2012 – Operations Manager, setup sets this service to automatically start on every
management server during installation. We support any SDK client connecting to any
management server.
Network Monitoring
See Considerations when Designing a Management Group for Network Monitoring for information
regarding management packs and running Network Discovery.
Note
Unified Installer is a utility designed to perform new, clean installations of System Center
2012 for testing and evaluation purposes only. If you want to upgrade from an existing
System Center installation or choose any set up options such as high availability or multi-
server component installs, we recommend you refer instead to the procedures detailed in
the deployment guides for each individual System Center 2012 component.
Common Installations
Use the Operations Guide for Operations Manager for System Center 2012 to determine
hardware requirements for each Operations Manager server feature. If you want to install more
than one feature on the same computer, use the higher of the recommended hardware
requirements for any of the combined features.
The sizing helper is a downloadable tool in spreadsheet format that contains tabs listing general
information on supported configurations, as well as sizing examples based on number of agents
and number of network devices monitored, information on gateway servers, and more.
For example, a scenario calling for 500 agents monitoring 50 network devices calls for a
recommendation of:
1. (1) One management server managing up to 500 agents handling the entire workload, plus
(1) one additional management server for HA / failover, managing up to five SDK connections
2. (2) Two management servers in a single resource pool monitoring the 50 network devices
3. (2) Two servers: An Operations Database Server, and an Operations Data Warehouse Server
(with an SRS and Web Console Server)
Not included in this scenario is the possible need for a gateway server. They are supported for
use in managing network devices, but the gateway server must be in its own resource pool, and
not in the same pool as the devices.
Resource Pools
A resource pool is a collection of management servers or gateway servers used to distribute work
amongst themselves and to take over work from a failed member.
Due to the introduction of resource pools it is recommended that all management servers be
connected by a low latency network. This means that if you are currently using management
servers in multiple datacenters or sites we recommend you move all management servers to a
single data center and use gateway servers at the other sites.
You should always have two management servers in ANY environment. A second management
server allows for failover and easy restore. All management servers are members of the All
Management Servers Resource pool, which balances the monitoring load of your management
group as new management servers are added, and provides automatic failover for monitoring.
See Distributed Deployment of Operations Manager for complete details.
Make sure the SDK Service is running on all management servers and that any SDK client
(console, web console, connector, PowerShell) can connect to it. In System
Center 2012 – Operations Manager, setup sets this service to automatically start on every
management server during installation. Any SDK client can connect to any management server.
Resource Pools
Network monitoring in System Center 2012 – Operations Manager requires its own separate
resource pool.
Create a resource pool dedicated to network management; add dedicated management servers
into the newly created resource pool, then remove the dedicated management server from any
other resource pool -- e.g., the "All Management Servers pool”.
1. Each management server or gateway server can run only one discovery rule. You specify a
single management server or gateway server to run the discovery rule and a management
server resource pool to perform the actual monitoring of the network devices.
2. If you create discovery rules on multiple management servers, you should create a
management pool for each and make sure that each discovery defines a different set of
devices. If a single device is managed in different pools, it will not be able to be deleted.
For more information see How to Discover Network Devices in Operations Manager 2012 and
Network Device Discovery Settings.
Upgrade
If you were monitoring network devices in Operations Manager 2007 R2 and are upgrading
toSystem Center 2012 – Operations Manager, the network monitoring you were performing will
still function properly. But if you want to take advantage of the additional monitoring capabilities
available when upgrading, you will need to rerun network device discovery. However, you must
also upgrade any appropriate management packs. See Monitoring Networks by Using
Operations Manager for more information. If upgrading management packs is not an option,
then do not rerun discovery: continue to operate under the original management packs and the
original network monitoring capabilities you had under Operations Manager 2007 R2.
See Also
Security for Servers Performing Network Discovery
Tuning Network Monitoring
Operations Database
The primary consideration for application performance monitoring on design and planning is its
impact on the database. Since application performance monitoring in Operations Manager is
Health Service based, scale and load put on the Operations Manager Database is an important
factor to consider.
For example, when monitoring many applications that generate several events (state changes)
each per second, it is easy to see how the Health Services can be overloaded if not considered in
the design phase. For example, the average application generates 0.3 events per second. With
IIS supporting hundreds of applications per host it can result in 30 or more events being raised
per second through the Health Service.
For more information see Operations Manager Sizing Helper and How to Configure Grooming
Settings for the Operations Manager Database.
Agents
Application performance monitoring is not agentless, so using resource pools is not a design
option for optimizing performance or scale. The application monitoring agent is installed at the
same time as the Operations Manager agent. You do not have to pre-plan where to install the
application monitoring service.
Upgrade
For AVIcode 5.7 customers, there are two ways to look at an upgrade:
1. Integrated (AVIcode integrated with Operations Manager), where Operations Manager
handles some of the configuration steps
2. Stand Alone (Continuing to run AVIcode 5.7 as a separate product from Operations Manager)
For more information, see Notes for AVIcode 5.7 Customers in the Operations Guide.
Note: Installation of AVIcode 5.7 integration management packs is NOT supported in System
Center 2012 – Operations Manager. If you need to use AVIcode 5.7 with System
Center 2012 – Operations Manager, for example to monitor IIS 6 hosts, the management packs
must be installed on the System Center Operations Manager 2007 R2 environment before
upgrading to System Center 2012 – Operations Manager. Additionally, you need to import an
update for the AVIcode 5.7 management packs from the System Center 2012 – Operations
Manager installation media.
See Also
Monitoring .NET Applications
See Also
Operations Manager Sizing Helper
Required Accounts
During setup, you are prompted for two accounts, the management server action account and
the System Center Configuration service and System Center Data Access service account.
In Operations Manager, you can use the same account for both services.
If you install Reporting, you are prompted for two additional accounts, the Data Warehouse
Write account and the Data Reader account. These accounts are created as domain user
accounts and added to the local Administrators group on the target server.
Note
If you create a specific account for installation, this account must be a member of the
sysadmin server role for Microsoft SQL Server, but also have access to the master
database.
Note
If you install multiple management servers, you are prompted for a management server
action account and a System Center Configuration service and System Center Data
Access service account each time you add a management server. You must provide
the same accounts for each installation.
Management server action This account is used to carry To save time, specify a domain-
account out actions on monitored based account. We recommend
computers across a network that you create an account for
connection. this purpose that has local
administrative credentials. You
should not use an account that
has domain administrative
credentials.
System Center Configuration This account is one set of This account can be configured
service and System Center credentials that is used to as either Local System or as a
Data Access service account update and read information domain account. The account
in the operational database. must have local administrative
Operations Manager ensures credentials. For cases where the
that the credentials used for operational database is hosted on
the System Center Data a remote computer that is not a
Access service and System management server, a domain
Center Configuration service account must be used. For better
account are assigned to the security, we recommend that you
Account Description Permissions
Data Warehouse Write The Data Warehouse Write This account is assigned write
account account writes data from the permissions on the Data
management server to the Warehouse database and read
Reporting data warehouse permissions on the operational
and reads data from the database.
operational database.
Note
Ensure that the account
you plan to use for the
Data Warehouse Write
account has SQL Server
Logon rights and has
logon rights for the
computers hosting both
the operational database
and the reporting data
warehouse. Otherwise,
Setup fails, and all
changes are rolled back.
This might leave SQL
Server Reporting
Services in an inoperable
state.
Data Reader account The Data Reader account is The account should be
used to define which account configured as a domain account.
credentials SQL Server
Note
Reporting Services uses to
run queries against the Ensure that the account
Operations Manager you plan to use for the
reporting data warehouse. Data Reader account has
SQL Server logon rights
and Management Server
logon rights.
SQL Server Requirements
Operations Manager requires access to an instance of a server running Microsoft SQL
Server 2008 SP1, SQL Server 2008 R2, or SQL Server 2008 R2 SP1. This instance can be
located on a separate computer from the management servers in a distributed installation or on
the first management server in the management group. In either case, the instance of Microsoft
SQL Server 2008 SP1, SQL Server 2008 R2, or SQL Server 2008 R2 SP1 must already exist and
be accessible before you start your first management server installation. The SQL Server
Collation settings must be SQL_Latin1_General_CP1_CI_AS, and SQL Full Text Search must be
enabled. During setup, you are prompted for the following:
The SQL Server database server name and instance name. If you have installed SQL Server
by using the default instance, you only have to specify the SQL Server name.
You can accept the default values for or set:
SQL Server Port number. By default, 1433.
A new operational database (for first management server installation in the management
group) or an existing operational database (for installing additional management servers in an
existing management group).
The database name. By default, OperationsManager.
The starting database size. By default, 1000 MB.
The Data file and Log folder locations. By default, these are C:\Program Files\Microsoft SQL
Server\MSSQL10.MSSQLSERVER\MSSQL\Data or C:\Program Files\Microsoft SQL Server\
MSSQL10.MSSQLSERVER\MSSQL\Log as appropriate to the SQL Server defaults.
Important
If TCP/IP is disabled on a remote server that is hosting the SQL Server database, Setup
will not be able to connect to the SQL Server database. To resolve this issue, enable
TCP/IP on the remote server.
Ensure that SQL Server Reporting Services has been correctly installed and configured. For more
information about how to install and configure SQL Server 2008 Reporting Services, see SQL
Server Installation (SQL Server 2008 R2).
See Also
Deployment Guide for System Center 2012 - Operations Manager
In This Section
Supporting Infrastructure
Describes prerequisites and issues that you need to be aware of before you install
System Center 2012 – Operations Manager.
Security Considerations
Describes high-level security factors that need to be addressed.
Supporting Infrastructure
This section addresses prerequisites and issues involving Active Directory Domain Services
(AD DS) and Domain Name System (DNS) that you need to be aware of before initiating your
System Center 2012 – Operations Manager installation.
Note
Ensure that you exercise due caution prior to raising a domain's functional level because
it cannot be reversed, and if there are any down-level domain controllers, their function
will be impacted.
Forest Functional Level
The forest functional level is similar to the domain functional level in that it sets a minimum
domain controller operating system level across the whole forest. After it is set, domain controllers
with down-level operating systems from lower functional levels cannot be introduced into the
forest. Operations Manager does not have a forest functional level requirement; however, if the
forest functional level is left at the default Windows 2000 level, there may be domains in your
forest that won't meet the minimum domain functional level requirement.
DNS
DNS must be installed and in a healthy state to support AD DS. Beyond the reliance of
Operations Manager on AD DS, there are no specific DNS requirements.
See Also
Environmental Prerequisites for Operations Manager
Security Considerations
Most of the work in preparing the environment for System Center 2012 – Operations Manager
goes into security-related tasks. This section covers those tasks at a cursory level. For more
information, see the Index to Security-related Information for Operations Manager.
Preparing the security-related tasks involves the following:
Understanding, planning, and preparing for monitoring across trust boundaries.
Understanding, planning, and preparing for monitoring UNIX or Linux computers.
Planning and preparing the service accounts, user accounts, and security groups that you will
need.
Understanding and preparing the network ports as required by your design.
Trust Boundaries
Active Directory domains form the basic unit of a Kerberos trust boundary as seen by Operations
Manager. This boundary is automatically expanded to other domains in the same name space
(the same Active Directory tree), and between domains that are in different Active Directory trees
but still in the same Active Directory forest via transitive trusts. The trust boundary can be further
expanded between domains in different Active Directory forests through the use of across forest
trusts.
Kerberos
The Kerberos authentication protocol, which is supported by Windows 2000 domain controllers
and above, can only occur within a trust boundary. Kerberos authentication is the mechanism
used to perform the Operations Manager agent/server mutual authentication. Agent/server mutual
authentication is mandated in Operations Manager Shell for all agent/server communication.
An Operations Manager management group does have the ability to perform discovery and
monitoring outside of the Kerberos trust boundary that it is in. However, because the default
authentication protocol for Windows-based computers that are not joined to an Active Directory
domain is NTLM, another mechanism must be used to support mutual authentication. This is
done through the exchange of certificates between agents and servers.
Certificates
When Operations Manager communication needs to occur across trust boundaries, such as when
a server that you want to monitor lies in a different, untrusted, Active Directory domain than the
management group that is performing the monitoring, certificates can be used to satisfy the
mutual authentication requirement. Through manual configuration, certificates can be obtained
and associated with the computers and the Operations Manager services running on them. When
a service that needs to communicate with a service on a different computer starts and attempts to
authenticate, the certificates will be exchanged and mutual authentication completed.
Important
The certificates used for this purpose must ultimately trust the same root certification
authority (CA).
For more information about how to obtain and make use of certificates for mutual authentication,
see Deploying a Gateway Server.
Certification Authority
To get the necessary certificates, you will need access to a certification authority (CA). This can
be either Microsoft Certificate Services or a third-party certification service such as VeriSign.
Microsoft Certificate Services
There are four types of Microsoft CAs:
Enterprise root
Enterprise subordinate
Stand-alone root
Stand-alone subordinate
Both enterprise types of CAs require Active Directory Domain Services; stand-alone CAs do
not. Either type of CA can issue the necessary certificates for agent/server mutual
authentication across trust boundaries.
Customarily, a CA infrastructure consists of a root CA that signs its own certificates and certifies
itself and one or more subordinate CAs, which are certified by the root. The subordinate CA
servers are the ones that a service certificate requests, while the root is taken offline and held for
safekeeping. For more information about designing certificates, see Enterprise Design for
Certificate Services and Authentication and Authentication and Data Encryption for Windows
Computers.
Important
The preceding order of operations is for the low security version of UNIX or Linux
discovery.
Planning for UNIX or Linux Run As Profiles
After the UNIX or Linux computer is being managed by the discovering management server, the
management pack discoveries and workflows begin to run. These workflows require the use of
credentials to complete successfully. These credentials, what objects, classes or group they will
be applied to and the computers that they will be distributed to are contained in Run As Profiles.
There are two Run As Profiles that are imported when the UNIX management packs are imported
into your management group; they are:
Unix Action Account profile – This Run As profile and its associated UNIX or Linux credentials
are used for low security activities on the designated UNIX or Linux computers.
Unix Privileged Account profile – This Run As profile and its associated UNIX or Linux
credentials are used for activities that are protected by a higher level of security and therefore
require an account that has higher privileges on the UNIX or Linux computer. This can be (but
does not have to be) the root account.
You will need to configure these profiles with the appropriate UNIX or Linux computer credentials
for the management pack workflows that use them to function correctly.
Operations Manager Advanced Operator Has limited change Access to all groups,
Advanced Operators: access to Operations views, and tasks
Created at setup; Manager currently present and
globally scoped; cannot configuration; ability to those imported in the
be deleted create overrides to future
rules; monitors for
targets or groups of
targets within the
configured scope
Operations Manager Read-Only Operator Has ability to view Access to all groups
Read-Only Operators: alerts and access and views currently
Created at setup; views according to present and those
globally scoped; cannot configured scope imported in the future
Role name Profile type Profile description Role scope
be deleted
You can add Active Directory security groups or individual accounts to any of these predefined
roles. If you do, those individuals will be able to exercise the given role privileges across the
scoped objects.
Note
The predefined roles are globally scoped, giving them access to all groups, views, and
tasks (except for Report Security Administrator).
Operations Manager also allows you to create custom roles based on the Operator, Read-Only
Operator, Author, and Advanced Operator profiles. When you create the role, you can further
narrow the scope of groups, tasks, and views that the role can access. For example, you can
create a role entitled "Exchange Operator" and narrow the scope to only Exchange-related
groups, views, and tasks. User accounts assigned to this role will only be able to run Operator-
level actions on Exchange-related objects.
Important
Make sure that you create a domain security group for the Operations Manager
Administrators role; this is required to be in place during the first setup run for a
management group.
Notification Accounts and Groups
Individuals in your company that will interact with Operations Manager frequently, such as an
Exchange administrator who has been assigned to the Exchange Operator role, need a way to
discover new alerts. This can be done by either watching the Operations console for new alerts or
by Operations Manager informing them about the alert via supported communications channels.
Operations Manager supports notifications through e-mail, instant messaging, Short Message
Service, or pager messages. Notifications on what the role needs to know go out to recipients
that you specify in Operations Manager. An Operations Manager recipient is merely an object that
has a valid address to receive the notification, such as an SMTP address for e-mail notifications.
Therefore, it is logical to combine role assignment with notification group membership via an e-
mail-enabled security group. For example, create an Exchange Administrators security group and
populate it with individuals that have the knowledge and permissions to fix things in Exchange.
Assign this security group to a custom-created Exchange Administrator role so they have access
to the data and are e-mail-enabled. Then, create a recipient by using the SMTP address of the e-
mail-enabled security group.
Service Accounts
At the time of deployment, you need to have the following service accounts ready. If you use
domain accounts and your domain Group Policy object (GPO) has the default password
expiration policy set as required, you will either have to change the passwords on the service
accounts according to the schedule, or use low maintenance system accounts, or configure the
accounts so that the passwords never expire.
Account name Requested when Used for Low maintenance High security
Data Warehouse Reporting Server Writing to the Low privilege Low privilege
Write Action setup Reporting Data domain account domain account
Account Warehouse
database
Data Reader Reporting Server Querying SQL Low privilege Low privilege
Account setup Reporting domain account domain account
Services
database
Caution
Do not modify the default Active Directory permissions to allow an account to do
unrestricted modifications of its own SPN.
If you select the Local System as the System Center Data Access service account, the account
can create the appropriate SPN. No additional configuration is necessary.
If you use a domain account, you must register an SPN for each management server. Use the
SETSPN command line tool. For more information about running that tool, see Setspn Overview.
Register both the netbios name and fully qualified domain name of the management server, using
the following syntax:
setspn –a MSOMSdkSvc/<netbios name> <DAS account domain>\<DAS account name>
Tip
You can list the SPNs registered to user account or computer with the following syntax:
setspn –l <DAS account name>
setspn –l <fqdn>
If you are using Network Load Balancing or using a hardware load balancer, the System Center
Data Access service must run under a domain account. In addition to the setup already
described, you must also register the load balanced name, using the following syntax:
setspn –a MSOMSdkSvc/<load balanced name> <DAS account domain>\<DAS account name>
Note
All of the System Center Data Access services running behind the load balancer must be
running with the same domain account.
Run As Accounts
Agents on monitored computers can run tasks, modules, and monitors on demand as well as in
response to predefined conditions. By default, all tasks run by using the Agent Action account
credentials. In some cases, the Agent Action account may have insufficient rights and privileges
to run a given action on the computer. Operations Manager supports the running of tasks by
agents in the context of an alternate set of credentials called a Run As Account. A Run As
Account is an object that is created in Operations Manager, just like a recipient is, and maps to an
Active Directory user account. A Run As Profile is then used that maps the Run As Account to a
specific computer. When a rule, task, or monitor that has been associated with a Run As Profile at
the development time of a management pack needs to run on the targeted computer, it does so
by using the specified Run As Account.
Out-of-the-box, Operations Manager provides a number of Run As Accounts and Run As Profiles,
and you can create additional ones as necessary. You may also choose to modify the Active
Directory credentials that a Run As Account is associated with. This will require planning,
creating, and maintaining additional Active Directory credentials for this purpose. You should treat
these accounts as service accounts with respect to password expiration, Active Directory Domain
Services, location, and security.
You will need to work with management pack authors as they develop requests for Run As
Accounts. For more information, see the Index to Security-related Information for Operations
Manager.
See Also
Environmental Prerequisites for Operations Manager
Note
Push agent installation will install MSXML 6 on the targeted device if it is not there.
Ongoing Management
Ongoing management of an agent requires that the TCP 135 (RPC), RPC range, and TCP 445
(SMB) ports remain open and that the SMB service remains enabled.
Agents Outside a Trust Boundary
For agents that lie outside the trust boundary of the management servers, the environmental
prerequisites are the same as for those that lie inside a trust boundary, plus some additions.
Because the device is going to have an installed agent, the software, service, and port
requirements remain the same. However, because there is no underlying infrastructure to support
Kerberos authentication, certificates must be used on both sides of the connection.
To simplify the cross trust boundary configuration, you can install an Operations Manager
gateway server in the same trust boundary as the devices that you will monitor. The gateway
server acts as a proxy so that all communication between the management server and agents is
routed through the gateway server. This communication is done over a single port, TCP 5723,
and requires certificates on the management server and the gateway server. In addition, the
gateway server performs discovery and installation, and relays ongoing administration traffic on
behalf of the management server to the agents. The use of gateway servers also reduces the
volume of network traffic and is therefore useful in low bandwidth conditions
Gateway servers can also discover and manage UNIX/Linux computers; this is done over TCP
ports 1270 and as needed SSH TCP 22, this port is configurable.
For more information about gateway server configuration, see Deploying a Gateway Server.
Manually Installed Agents
Discovery is not performed for manually installed agents, so there are fewer requirements.
Agentless Monitoring
Agentless monitoring of devices is performed by either a management server or by another
device that does have an agent, called a proxy agent. An agentless managed device must not be
separated from its management server or proxy agent by a firewall because monitoring is
performed over RPC. The action account of the agent that is performing the monitoring must
have local administrative rights on the device that is being monitored.
See Also
Environmental Prerequisites for Operations Manager
Restrictions
The single-server management group configuration is the easiest to deploy, but there are
limitations to its capabilities and therefore limitations to what it is commonly used for.
Gateway Server
This configuration does not include the gateway server role. Because of this, all monitored
devices must be in the same Active Directory forest as the management server or you must use
certificates on both the managed computer and the management server to provide for mutual
authentication.
Common Uses
This configuration is most commonly used for evaluation, testing, and management pack
development purposes, usually in nonproduction or preproduction environments. Single-server
management group configurations generally lack the robustness and performance to support
anything but the smallest production loads.
Ports Used
In this configuration, you need to make sure that network ports are opened for communication
between the agents and the management server, between the Operations console and the
management server, and between the web console and the management server. All other inter-
service communication occurs on the management server itself. The ports are as follows:
Operations console to management server: TCP 5724
Operations console to Reporting server: TCP 80
Web console to web console server: selected web site port
Agent to management server: TCP 5723
ACS forwarder to ACS collector: TCP 51909
Agentless management: occurs over remote procedure call
Management server to UNIX\Linux computer: TCP 1270
Management server to UNIX\Linux computer for special discovery and troubleshooting: TCP
22
For a complete listing of ports used, the direction of the communication, and if the ports can be
configured, see Supported Configurations for System Center 2012 – Operations Manager.
To deploy Operations Manager in a single-server management group, see Walkthrough: Installing
Operations Manager on a Single Server.
See Also
Deploying System Center 2012 - Operations Manager
Distributed Deployment of Operations Manager
Prerequisites
You must ensure that your server meets the minimum supported configurations for Operations
Manager. For more information, see Supported Configurations for System Center 2012 –
Operations Manager.
Important
Before you follow these procedures, read the Before You Begin section of Deploying
System Center 2012 - Operations Manager.
Note
Installation of the web console requires that ISAPI and CGI Restrictions in IIS be
enabled for ASP.NET 4. To enable this, select the web server in IIS Manager, and
then double-click ISAPI and CGI Restrictions. Select ASP.NET v4.0.30319, and
then click Allow.
Important
You must install IIS before installing .NET Framework 4. If you installed IIS after
installing .NET Framework 4, you must register ASP.NET 4.0 with IIS. Open a
Command prompt window by using the Run As Administrator option and then
run the following command:
%WINDIR%\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe -r
6. If the Prerequisites checker does not return any warnings or errors, the Prerequisites,
Proceed with Setup page appears. Click Next.
7. On the Configuration, Specify an installation option page, select Create the first
Management server in a new management group, type in a name for your
management group and then click Next.
8. On the Configuration, Please read the license terms page, review the Microsoft
Software License Terms, select I have read, understood, and agree with the license
terms, and then click Next.
9. When the Configuration, Configure the operational database page opens, in the
Server name and instance name box, type the name of the server and the name of the
SQL Server instance for the database server that will host the operational database. If
you installed SQL Server by using the default instance, you only have to enter the server
name. If you changed the default SQL Server port, you must type in the new port number
in the SQL Server port box.
If you type an invalid SQL Server and instance name, you see a red circle with a white X
in it appear to the left of the Server name and instance name and SQL Server port
boxes.
The white X appears under the following circumstances:
You entered an instance of SQL Server or a SQL Server port value that is not valid or
that does not exist.
The instance of SQL Server that you specified does not have the required
configuration or features.
You entered a value that is out-of-range (for example, port 999999).
You entered an illegal character for that box (for example, server\instance%)
You can hover the cursor over the Server name and instance text box to view additional
information about the error.
10. After you type the correct value for the SQL Server database server name, click the SQL
Server port box so that Setup will attempt to validate the values you typed for the SQL
Server name and for the port number.
11. In the Database name, Database size (MB) Data file folder, and Log file folder box,
we recommend that you accept the default values. Click Next
Note
These paths do not change if you connect to a different instance of SQL Server.
Important
You might receive a message about having the wrong version of SQL Server, or
you might encounter a problem with the SQL Server Windows Management
Instrumentation (WMI) provider. To resolve this problem, open a Command
Prompt window, select Run as administrator, and then run the following
command. In the command, replace the <path> placeholder with the location of
SQL Server:
mofcomp.exe “<path>\Microsoft SQL Server\100\Shared\
sqlmgmproviderxpsp2up.mof”
Note
The SQL Server model database size must not be greater than 100 MB. If it is,
you might encounter an error in Setup regarding the inability to create a database
on SQL due to user permissions. To resolve the issue, you must reduce the size
of the model database.
12. When the Configuration, Configure the data warehouse database page opens, in the
Server name and instance name box, type the server name and the name of the
instance of SQL Server for the database server that will host the data warehouse
database.
13. Because this is a single-server installation, accept the default value of Create a new data
warehouse database.
14. In the Database name, Database size (MB) Data file folder, and Log file folder boxes,
we recommend that you accept the default values. Click Next.
Important
You might receive a message about having the wrong version of SQL Server, or
you might encounter a problem with the SQL Server Windows Management
Instrumentation (WMI) provider. To resolve this problem, open a Command
Prompt window, select Run as administrator, and then run the following
command. In the command, replace the <path> placeholder with the location of
SQL Server:
mofcomp.exe “<path>\Microsoft SQL Server\100\Shared\
sqlmgmproviderxpsp2up.mof”.
Note
These paths do not change if you connect to a different instance of SQL Server.
15. On the Configuration, SQL Server instance for reporting services page, select the
SQL Server database instance from the drop-down list. This drop-down list contains the
SQL Server database instance name that was created when you installed
SQL Server 2008 R2 or SQL Server 2008 R2 SP1 and should be the name of the server
on which you are installing Operations Manager. Click Next.
16. On the Configuration, Specify a web site for use with the Web console page, select
Default Web Site or the name of an existing website. Select the option Enable SSL only
if the website has been configured to use SSL, and then click Next.
17. On the Configuration, Select an authentication mode for use with the Web console
page, select your option, and then click Next.
18. On the Configuration, Configure Operations Manager accounts page, we
recommend that you use Domain Account option for the Management Server Action
Account, System Center Configuration service and System Center Data Access
service, the Data Reader account, and the Data Writer account.
Enter the credentials for a domain account in each field. The error icon will disappear
after account validation. Click Next.
19. On the Configuration, Help improve System Center 2012 - Operations Manager
page, select your options and click Next.
20. If Windows Update is not activated on the computer, the Configuration, Microsoft
Update page appears. Select your options, and then click Next.
21. Review the options on the Configuration, Installation Summary page, and click Install.
Setup continues.
22. When Setup is finished, the Setup is complete page appears. Click Close and the
Operations console will open.
To install the System Center 2012 - Operations Manager single server management
group configuration by using the Command Prompt window
1. Log on to the server by using an account that has local administrative credentials.
2. Open the Command Prompt window by using the Run as Administrator option.
Note
Setup.exe requires administrator privileges because the Setup process requires
access to system processes that can only be used by a local administrator.
3. Change the path to where the Operations Manager setup.exe file is located, and run the
following command.
Important
Use the /WebConsoleUseSSL parameter only if your website has Secure Sockets
Layer (SSL) activated.
For a default web installation, specify Default Web Site for the /WebSiteName
parameter.
Important
The following command assumes that you specified the Local System for the
Management server action account (/UseLocalSystemActionAccount) and Data
Access service (/UseLocalSystemDASAccount). To specify a domain\user name for
these accounts, you must provide the following parameters instead.
/ActionAccountUser: <domain\username> /ActionAccountPassword: <password>
Note
After initial deployment, it can take up to 30 minutes for reports to appear.
2. Click Microsoft ODR Report Library, and then double-click any of the reports listed. The
selected report is generated and displays in a new window.
By default, you should see the following reports:
Alerts Per Day
Instance Space
Management Group
Management Packs
Most Common Alerts
Note
Selecting the management packs report is particularly useful at this point
because it provides you with a full inventory of the management packs that have
been installed on your server.
3. Close the report window.
Next Steps
Now that you have installed Operations Manager, you can deploy agents and start monitoring
your applications, servers, and network devices. For more information, see Managing Discovery
and Agents and Operations Manager 2012 Monitoring Scenarios.
See Also
Distributed Deployment of Operations Manager
Restrictions
Single management group configurations do not support partitioning. Partitioning is the
separation of management group services across multiple management groups. In Operations
Manager, you may want to create multiple management groups for the following reasons.
Installed Languages
Operations Manager management groups support only one installed language. If the overall IT
environment that you need to monitor has more than one installed language, a separate
management group will be needed per language.
Consolidated Views
Even the largest distributed management group implementation will not be appropriate in every
instance. This will lead you to implement multiple management groups, which will split your
monitoring and alerting data between management groups. To provide a single, consolidated
view of your environment, data from multiple management groups can be consolidated and
viewed in another management group. For more information, see Connecting Management
Groups in Operations Manager.
Function
You may need to have separate groups as needed according to function, such as preproduction
for testing management packs and new servers, and production for monitoring daily business
processes.
Administrative or Other Business Needs
Your company may have other administrative, security, or business needs that require complete
separation of monitoring data and administrative teams, which will mandate additional
management groups.
Common Uses
Distributed management groups are most commonly used to monitor very large preproduction
environments and large production environments that
Span trust boundaries between domains and workgroups.
Have multiple network environments segmented by firewalls.
Have a need for high availability.
Must have a scalable monitoring solution.
Ports Used
This configuration supports full distribution of features among servers in the management group
as well as monitoring of devices across network boundaries, resulting in a longer list of ports that
need to be available for communications. For more information, see Connecting Management
Groups in Operations Manager.
Distributed Deployment
You deploy System Center 2012 – Operations Manager in a distributed management group when
you want to allow for scalability and high availability of your management servers and gateway
servers. By default, all management servers are members of the All Management Servers
Resource Pool, which balances the monitoring load of your management group as new
management servers are added, and provides automatic failover for monitoring.
A distributed management group distributes the various features of Operations Manager across
several servers. For example, you can install the operational database on one server, the web
console on a second server, and the Reporting server on a separate server. This differs from the
single-server management group installation, where all features are installed on one server. For
more information, see Single-Server Deployment of Operations Manager.
You can install a web console on a stand-alone server or on an existing management server, but
you cannot install the management server feature on a server that has an existing web console. If
you want to install the management server and web console on the same server, you must either
install both features simultaneously, or install the management server before you install the web
console.
This section of the Deployment Guide contains the following topics:
How to Install the First Management Server in a Management Group
How to Install Additional Management Servers
How to Install the Operations Console
How to Configure the Operations Console to Use SSL When Connecting to a Reporting
Server
How to Install the Operations Manager Web Console
Web Console Security in Operations Manager
How to Install the Operations Manager Reporting Server
Deploying a Gateway Server
Deploying ACS and ACS Reporting
See Also
Deploying System Center 2012 - Operations Manager
Important
Before you follow these procedures, read the Before You Begin section of Deploying
System Center 2012 - Operations Manager.
Important
You might receive a message that indicates that ASP.NET 4 is not registered with
Internet Information Services (IIS). To resolve this problem, open a Command
Prompt window, select Run as administrator, and then run the following
command:
%WINDIR%\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe -r
6. If the Prerequisites checker does not return any warnings or errors, the Prerequisites,
Proceed with Setup page appears. Click Next.
7. On the Configuration, Specify an installation option page, select Create the first
Management server in a new management group, type a name for your management
group, and then click Next.
8. On the Configuration, Please read the license terms page, review the Microsoft
Software License Terms, select I have read, understood and agree with the license
terms, and then click Next.
9. When the Configuration, Configure the operational database page opens, in the
Server name and instance name box, type the name of the server and the name of the
SQL Server instance for the database server that will host the operational database. If
you installed SQL Server by using the default instance, you only have to type the server
name. If you changed the default SQL Server port, you must type the new port number in
the SQL Server port box.
As you type the values for the SQL Server and instance names, you see a red circle with
a white X in it appear to the left of the Server name and instance name and SQL
Server port boxes. The white X indicates that the values have not yet been validated,
and the black text indicates that you have not entered any illegal characters. If you enter
illegal characters, the text itself turns red.
The white X appears under the following circumstances:
You entered an instance of SQL Server or a SQL Server port value that is not valid or
that does not exist.
The instance of SQL Server that you specified does not have the required
configuration or features.
You entered a value that is out-of-range (for example, port 999999).
You entered an illegal character for that box (for example, server\instance%)
You can hover the cursor over the Server name and instance name text box to view
additional information about the error.
10. After you type the correct value for the SQL Server database server name, click the SQL
Server port box so that Setup will attempt to validate the values you typed for the SQL
Server name and for the port number.
11. In the Database name, Database size (MB), Data file folder, and Log file folder
boxes, we recommend that you accept the default values. Click Next.
Note
These paths do not change if you connect to a different instance of SQL Server.
Important
You might receive a message about having the wrong version of SQL Server, or
you might encounter a problem with the SQL Server Windows Management
Instrumentation (WMI) provider. To resolve this problem, open a Command
Prompt window, select Run as administrator, and then run the following
command. In the command, replace the <path> placeholder with the location of
SQL Server.
mofcomp.exe “<path>\Microsoft SQL Server\100\Shared\
sqlmgmproviderxpsp2up.mof”.
Note
The SQL Server model database size must not be greater than 100 MB. If it is,
you might encounter an error in Setup regarding the inability to create a database
on SQL due to user permissions. To resolve the issue, you must reduce the size
of the model database.
12. When the Configuration, Configure the data warehouse database page opens, in the
Server name and instance name box, type the server name and the name of the
instance of SQL Server for the database server that will host the data warehouse
database.
13. Because this is the first management server installation, accept the default value of
Create a new data warehouse database.
14. In the Database name, Database size (MB), Data file folder, and Log file folder
boxes, we recommend that you accept the default values. Click Next.
Important
You might receive a message about having the wrong version of SQL Server, or
you might encounter a problem with the SQL Server Windows Management
Instrumentation (WMI) provider. To resolve this problem, open a Command
Prompt window, select Run as administrator, and then run the following
command. In the command, replace the <path> placeholder with the location of
SQL Server.
mofcomp.exe “<path>\Microsoft SQL Server\100\Shared\
sqlmgmproviderxpsp2up.mof”.
Note
These paths do not change if you connect to a different instance of SQL Server.
15. On the Configuration, Configure Operations Manager accounts page, we
recommend that you use the Domain Account option for the Management server
action account, the System Center Configuration service and System Center Data
Access service account, the Data Reader account, and the Data Writer account.
None of them should have domain administrator credentials. Click Next.
16. On the Configuration, Help improve System Center 2012 - Operations Manager
page, select your options, and then click Next.
17. If Windows Update is not enabled on the computer, the Configuration, Microsoft
Update page appears. Select your options, and then click Next.
18. Review the options on the Configuration, Installation Summary page, and then click
Install. Setup continues.
19. When Setup is finished, the Setup is complete page appears. Click Close.
20. Open the Operations console.
21. In the Operations console, in the navigation pane, click the Administration button, and
then expand Device Management.
22. In Device Management, select Management Servers. In the results pane, you should
see the management server that you just installed with a green check mark in the Health
State column.
To install the first management server in the management group by using the
Command Prompt window
1. Log on to the server by using an account that has local administrative credentials.
2. Open the Command Prompt window by using the Run as Administrator option.
Note
Setup.exe requires administrator privileges because the Setup process requires
access to system processes that can only be used by a local administrator.
3. Change the path to where the Operations Manager setup.exe file is located, and run the
following command.
Important
The following command assumes that you specified the Local System for the
Management server action account (/UseLocalSystemActionAccount) and Data
Access service (/UseLocalSystemDASAccount). To specify a domain\user name for
these accounts, you must provide the following parameters instead.
/ActionAccountUser: <domain\username> /ActionAccountPassword: <password>
See Also
Distributed Deployment of Operations Manager
Important
If you install a stand-alone web console on a server, you will not be able to add the
management server feature to this server. If you want to install the management server
and web console on the same server, you must either install both features
simultaneously, or install the management server before you install the web console.
You must ensure that your server meets the minimum supported configurations for System
Center 2012 – Operations Manager. For more information, see Supported Configurations for
System Center 2012 – Operations Manager.
Important
Before you follow these procedures, read the Before You Begin section of Deploying
System Center 2012 - Operations Manager.
Important
You must provide the same credentials for the Management server action
account and the System Center Configuration Service and System Center Data
Access service that you provided when you created the first management server
in your management group.
12. If Windows Update is not enabled on the computer, the Configuration, Microsoft
Update page appears. Select your options, and then click Next.
13. Review the options on the Configuration, Installation Summary page, and then click
Install. Setup continues.
14. When setup is finished, the Setup is complete page appears. Click Close.
15. Open the Operations console.
16. In the Operations console, select the Administration workspace, and then expand
Device Management.
17. In Device Management, select Management Servers. In the results pane, you should
see the management server that you just installed with a green check mark in the Health
State column.
To install additional management servers by using the Command Prompt window
1. Log on to the server by using an account that has local administrative credentials.
2. Open the Command Prompt window by using the Run as Administrator option.
3. Change the path to where the Operations Manager setup.exe file is located, and run the
following command.
Important
The following command assumes that you specified the Local System for the
Management server action account (/UseLocalSystemActionAccount) and Data
Access service (/UseLocalSystemDASAccount). To specify a domain\user name for
these accounts, you must provide the following parameters instead.
/ActionAccountUser: <domain\username> /ActionAccountPassword: <password>
See Also
Distributed Deployment of Operations Manager
Important
If you are going to edit company knowledge on this computer, you also have to install the
Microsoft Visual Studio 2005 Tools for Office Second Edition Runtime.
Important
Company knowledge cannot be edited with the x64 version of Microsoft Word 2010. You
must install the x86 version of Microsoft Office 2010 or an earlier version to edit
knowledge.
See Also
Distributed Deployment of Operations Manager
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box displays. In the Server name text box,
type the name of the Operations Manager management server that you want the
Operations console to connect to.
3. In the Administration pane, expand Administration, expand Device Management, and
then click Settings.
4. In the Settings pane, right-click Reporting, and then click Properties.
5. In the General tab, under Reporting Server Settings, click the Reporting server URL
drop-down list and select https://.
6. Edit the URL by replacing :80 with :443, and then click OK.
See Also
Distributed Deployment of Operations Manager
How to Install the Operations Manager Web Console
You can install the web console when you install System Center 2012 – Operations Manager, or
you can install it separately. You can install a stand-alone web console or install it on an existing
management server that meets the prerequisites. For information about the prerequisites, see
Supported Configurations for System Center 2012 – Operations Manager. After you install the
web console, you must configure permissions inheritance to allow users to view performance and
diagram views. For instructions, see To configure permissions inheritance for the web console.
Important
If you install a stand-alone web console on a server, you will not be able to add the
management server feature to this server. If you want to install the management server
and web console on the same server, you must either install both features
simultaneously, or install the management server before you install the web console.
When you install the web console, three components are installed: the Operations Manager web
console itself, Application Diagnostics console, and Application Advisor console.
Note
If Application Diagnostics console is not installed, when viewing APM alerts, you will not
be able to use the link embedded in the alert description to launch the APM event details.
To use this feature, install the web console within the management group.
Security
The web console operates with sensitive data, such as clear text user credentials, server
names, IP addresses, and so on. If these are exposed on the network, they can represent
a significant security risk. If Internet Information Services (IIS) does not have Secure
Sockets Layer (SSL) configured, you are advised to configure it manually.
Important
Before you follow these procedures, read the Before You Begin section of Deploying
System Center 2012 - Operations Manager.
If the web console does not have sufficient access to the operational database or the data
warehouse database, you will receive a warning during the web console configuration step. You
can proceed with Setup, but the web console will not be configured correctly for .NET Application
monitoring. To resolve this issue, you can have your database administrator run the following SQL
Server statement on both the operational database and data warehouse database:
EXEC [apm].GrantRWPermissionsToComputer N'[LOGIN]
Note
If you run Repair on the web console after installation, the settings that were selected
during installation will be restored. Any changes that you manually make to the web
console configuration after the installation will be reset.
Note
Installation of the web console requires that ISAPI and CGI Restrictions in IIS be
enabled for ASP.NET 4. To enable this, select the web server in IIS Manager, and
then double-click ISAPI and CGI Restrictions. Select ASP.NET v4.0.30319, and
then click Allow.
Important
You must install IIS before installing .NET Framework 4. If you installed IIS after
installing .NET Framework 4, you must register ASP.NET 4.0 with IIS. Open a
Command prompt window by using the Run As Administrator option and then
run the following command:
%WINDIR%\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe -r
6. If the Prerequisites checker does not return any warnings or errors, the Prerequisites,
Proceed with Setup page appears. Click Next.
7. On the Configuration, Specify a management server page, enter the name of a
management server that only the web console uses, and then click Next.
8. On the Configuration, Specify a web site for use with the Web console page, select
the Default Web Site, or the name of an existing website. Select Enable SSL only if the
website has been configured to use Secure Sockets Layer (SSL), and then click Next.
Warning
Installing the web console on a computer that has SharePoint installed is not
supported.
9. On the Configuration, Select an authentication mode for use with the Web console
page, select your options, and then click Next.
Note
If you install the management server on a server using a domain account for
System Center Configuration service and System Center Data Access service,
and then install the Web console on a different server and select Mixed
Authentication, you may need to register Service Principal Names and configure
constraint delegations, as described in Running the Web Console Server on a
standalone server using Windows Authentication.
10. If Microsoft Update is not enabled on the computer, the Configuration, Microsoft
Update page appears. Select your options, and then click Next.
11. Review your selections on the Configuration, Installation Summary page, and then
click Install. Setup continues.
12. When Setup is finished, the Setup is complete page appears. Click Close.
Note
Installation of the web console requires that ISAPI and CGI Restrictions in IIS be
enabled for ASP.NET 4. To enable this, select the web server in IIS Manager, and
then double-click ISAPI and CGI Restrictions. Select ASP.NET v4.0.30319, and
then click Allow.
Important
You must install IIS before installing .NET Framework 4. If you installed IIS after
installing .NET Framework 4, you must register ASP.NET 4.0 with IIS. Open a
Command prompt window by using the Run As Administrator option and then
run the following command:
%WINDIR%\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe -r
6. If the Prerequisite checker returns no warnings or errors, the Prerequisites, Proceed
with Setup page appears. Click Next.
7. On the Configuration, Specify a web site for use with the Web console page, select
the Default Web Site, or the name of an existing website. Select Enable SSL only if the
website has been configured to use Secure Sockets Layer (SSL), and then click Next.
8. On the Configuration, Select an authentication mode for use with the Web console
page, select your options, and then click Next.
9. If Windows Update is not activated on the computer, the Configuration, Microsoft
Update page appears. Select your options, and then click Next.
10. Review your selections on the Configuration, Installation Summary page, and click
Install. Setup continues.
11. On the Setup is complete page, click Close.
Important
The Default website must have an http or https binding configured.
1. Log on to the computer with an account that has local administrative credentials.
2. Open a Command Prompt window by using the Run as Administrator option.
3. Change the path to where the Operations Manager setup.exe file is located, and run the
following command.
Important
Use the /WebConsoleSSL parameter only if your website has Secure Sockets
Layer (SSL) activated.
For a default web installation, specify Default Web Site for the /WebSiteName
parameter.
Note
The /ManagementServer parameter is only required when you are installing the
web console on a server that is not a management server.
setup.exe /silent /install /components:OMWebConsole
/ManagementServer: <ManagementServerName>
/WebSiteName: "<WebSiteName>" [/WebConsoleUseSSL]
/WebConsoleAuthorizationMode: [Mixed|Network]
/UseMicrosoftUpdate: [0|1]
See Also
Distributed Deployment of Operations Manager
Note
The best practice for accessing the web console from the Internet is to use network
authentication with SSL with the web console.
The web console uses two encryption algorithms:
1. SHA256
2. HMACSHA256
These algorithms may not be sufficient to meet compliance standards. For instance, they do not
meet the Federal Information Processing Standard (FIPS). In order to meet a compliance
standard, you need to map these names, in the appropriate configuration files, to appropriate
encryption algorithms.
The next section uses FIPS compliant algorithms as an example.
How to Use FIPS Compliant Algorithms
System Center 2012 – Operations Manager can use Federal Information Processing Standard
(FIPS) compliant algorithms. A FIPS compliant algorithm is included on your installation media.
After you install it, you need to manually edit several configuration files.
In order to use algorithms that are FIPS compliant, follow these steps for all Operations Manager
server components.
Install Microsoft.EnterpriseManagement.Cryptography.dll.
Edit several instances of the machine.config file.
For systems that host a web console, also do the following steps.
Edit the WebHost\web.config file.
Edit the MonitoringView\web.config file.
You need the Global Assembly Cache Tool, gacutil.exe. This utility is part of the Windows SDK.
For more information, see Gacutil.exe (Global Assembly Cache Tool).
Warning
same computer as Operations Manager Reporting server.
You must ensure that your server meets the minimum supported configurations for System
Center 2012 – Operations Manager. For more information, see Supported Configurations for
System Center 2012 – Operations Manager.
Important
Before you follow these procedures, read the Before You Begin section of Deploying
System Center 2012 - Operations Manager.
Note
Before you continue with this procedure, ensure that the account you plan to use for the
Data Warehouse Write account has SQL Server logon rights and is an Administrator on
the computers hosting both the operational database and the Reporting data warehouse
database. Otherwise, Setup fails, and all changes are rolled back, which might leave SQL
Server Reporting Services in an inoperable state.
1. Verify that the ReportServer and ReportServerTempDB databases in SQL Server
Management Studio are located on the stand-alone server. Click Start, point to All
Programs, point to Microsoft SQL Server 2008 R2, point to SQL Server Management
Studio, and then connect to the default database instance. Open the Databases node
and verify that the two Reporting Services databases exist under this node.
2. Verify the correct configuration of SQL Server Reporting Services. Click Start, point to
Programs, point to Microsoft SQL Server 2008 R2, point to Configuration Tools, and
then click Reporting Services Configuration Manager. Connect to the instance on
which you installed Reporting Services.
3. In the navigation pane, select the <servername>\SQLinstance. This displays the Report
Server status in the results pane. Ensure that the Report Server Status is Started.
4. In the navigation pane, select Scale-out Deployment, and then ensure that the Status
column has the value of Joined.
5. If Report Server is not started and the Scale out Deployment is not joined, check the
configuration of Service Account, Web Service URL, and Database.
6. Confirm that the SQL Server Reporting Services service is running. On the taskbar, click
Start, point to Administrative Tools, and then click Services.
7. In the Name column, find the SQL Server Reporting Services instance service and
verify that its status reads Started and that the Startup Type is Automatic.
8. In the Name column, find the SQL Server Agent service and verify that its status reads
Started and that its Startup Type is Automatic.
9. Verify that the Report Server website is functioning and available by browsing to
http://servername/reportserver<$instance>. You should see a page with the
<servername>/ReportServer<$INSTANCE> and the text, Microsoft SQL Server
Reporting Services Version ##.#.####.## where the # is the version number of your
SQL Server installation.
10. Verify that the Report Manager website is configured correctly by opening Internet
Explorer and browsing to http://<servername>/reports<instance>.
11. In the Report Manager website, click New Folder to create a new folder. Enter a name
and description, and then click OK. Ensure that the new, created folder is visible on the
Report Manager website.
Note
The /ManagementServer parameter is only required when you are installing
reporting on a server that is not a management server.
setup.exe /silent /install /components:OMReporting
/ManagementServer: "<ManagementServerName>"
/SRSInstance: <server\instance>
/DataReaderUser: <domain\username>
/DataReaderPassword: <password>
/SendODRReports: [0|1]
/UseMicrosoftUpdate: [0|1]
To confirm the health of Operations Manager reports
1. Open the Operations console, and select the Reporting workspace.
Note
After initial deployment, reports can require up to 30 minutes to appear.
2. Click Microsoft ODR Report Library, and then double-click any of the reports listed. The
selected report is then generated and displayed in a new window.
By default, you should see the following reports:
Alerts Per Day
Instance Space
Management Group
Management Packs
Most Common Alerts
3. Close the report window.
See Also
Distributed Deployment of Operations Manager
Procedure overview
1. Request certificates for any computer in the agent, gateway server, management server
chain.
2. Import those certificates into the target computers by using the MOMCertImport.exe tool.
Note
For information about obtaining and importing a certificate by using an enterprise
certification authority, see How to Obtain a Certificate Using Windows Server
2008 Enterprise CA. For information about using a stand-alone certification
authority, see How to Obtain a Certificate Using Windows Server 2008 Stand-
Alone CA.
3. Distribute the Microsoft.EnterpriseManagement.GatewayApprovalTool.exe to the
management server.
4. Run the Microsoft.EnterpriseManagement.GatewayApprovalTool.exe tool to initiate
communication between the management server and the gateway
5. Install the gateway server.
Note
The hosts file is located in the \Windows\system32\drivers\ directory, and it
contains directions for configuration.
To copy Microsoft.EnterpriseManagement.GatewayApprovalTool.exe to
management servers
1. From a target management server, open the Operations Manager installation media \
SupportTools directory.
2. Copy the Microsoft.EnterpriseManagement.GatewayApprovalTool.exe from the
installation media to the Operations Manager installation directory.
Registering the Gateway with the Management Group
This procedure registers the gateway server with the management group, and when this is
completed, the gateway server appears in the Discovered Inventory view of the management
group.
4. If the approval is successful, you will see The approval of server <GatewayFQDN>
completed successfully.
5. If you need to remove the gateway server from the management group, run the same
command, but substitute the /Action=Delete flag for the /Action=Create flag.
6. Open the Operations console to the Monitoring view. Select the Discovered Inventory
view to see that the gateway server is present.
Installing Gateway Server
This procedure installs the gateway server. The server that is to be the gateway server should be
a member of the same domain as the agent-managed computers that will be reporting to it.
Tip
An installation will fail when starting Windows Installer (for example, installing a gateway
server by double-clicking MOMGateway.msi) if the local security policy User Account
Control: Run all administrators in Admin Approval Mode is enabled.
To run Operations Manager Gateway Windows Installer from a command prompt
window
1. On the Windows desktop, click Start, point to Programs, point to Accessories, right-
click Command Prompt, and then click Run as administrator.
2. In the Administrator: Command Prompt window, navigate to the local drive that hosts
the Operations Manager installation media.
3. Navigate to the directory where the .msi file is located, type the name of the .msi file, and
then press ENTER.
1. Log on to the gateway server with Administrator rights.
2. From the Operations Manager installation media, start Setup.exe.
3. In the Install area, click the Gateway management server link.
4. On the Welcome screen, click Next.
5. On the Destination Folder page, accept the default, or click Change to select a different
installation directory, and then click Next.
6. On the Management Group Configuration page, type the target management group
name in the Management Group Name field, type the target management server name
in the Management Server field, check that the Management Server Port field is 5723,
and then click Next. This port can be changed if you have enabled a different port for
management server communication in the Operations console.
7. On the Gateway Action Account page, select the Local System account option, unless
you have specifically created a domain-based or local computer-based gateway Action
account. Click Next.
8. On the Microsoft Update page, optionally indicate if you want to use Microsoft Update,
and then click Next.
9. On the Ready to Install page, click Install.
10. On the Completing page, click Finish.
See Also
Deploying a Gateway Server
Note
You should install one gateway at a time and verify that each newly installed gateway is
configured correctly before adding another gateway in the chain.
3. Install the gateway server on a new server. For more information, see Installing Gateway
Server.
4. Configure the certificates between gateways in the same way that you would configure
certificates between a gateway and a management server. For more information, see
Importing Certificates with the MOMCertImport.exe Tool. The Health Service can only
load and use a single certificate. Therefore, the same certificate is used by the parent and
child of the gateway in the chain.
See Also
Deploying a Gateway Server
Authentication and Data Encryption for Windows Computers
System Center 2012 – Operations Manager consists of features such as the management server,
gateway server, Reporting server, Operational database, Reporting data warehouse, agent, web
console, and Operations console. This section explains how authentication is performed and
identifies connection channels where the data is encrypted.
Certificate-Based Authentication
When an Operations Manager agent and management server are separated by either an
untrusted forest or workgroup boundary, certificate-based authentication will need to be
implemented. The following sections provide information about these situations and specific
procedures for obtaining and installing certificates from Windows-based certification authorities.
Setting Up Communication Between Agents and Management Servers Within the Same
Trust Boundary
An agent and the management server use Windows authentication to mutually authenticate with
each other before the management server accepts data from the agent. The Kerberos version 5
protocol is the default method for providing authentication. In order for Kerberos-based mutual
authentication to function, the agents and management server must be installed in an Active
Directory domain. If an agent and a management server are in separate domains, full trust must
exist between the domains. In this scenario, after mutual authentication has taken place, the data
channel between the agent and the management server is encrypted. No user intervention is
required for authentication and encryption to take place.
Setting Up Communication Between Agents and Management Servers Across Trust
Boundaries
An agent (or agents) might be deployed into a domain (domain B) separate from the
management server (domain A), and no two-way trust might exist between the domains. Because
there is no trust between the two domains, the agents in one domain cannot authenticate with the
management server in the other domain using the Kerberos protocol. Mutual authentication
between the Operations Manager features within each domain still occurs.
A solution to this situation is to install a gateway server in the same domain where the agents
reside, and then install certificates on the gateway server and the management server to achieve
mutual authentication and data encryption. The use of the gateway server means you need only
one certificate in domain B and only one port through the firewall, as shown in the following
illustration.
For more information, see the following topics:
How to Obtain a Certificate Using Windows Server 2008 Enterprise CA
How to Obtain a Certificate Using Windows Server 2008 Stand-Alone CA
Setting Up Communication Across a Domain – Workgroup Boundary
In your environment, you may have one or two agents deployed to a workgroup inside your
firewall. The agent in the workgroup cannot authenticate with the management server in the
domain using the Kerberos protocol. A solution to this situation is to install certificates on both the
computer hosting the agent and the management server that the agent connects to, as shown in
the following illustration.
Note
In this scenario, the agent must be manually installed.
Perform the following steps on both the computer hosting the agent and the management server
using the same certification authority (CA) for each:
Request certificates from the CA.
Approve the certificate requests on the CA.
Install the approved certificates in the computer certificate stores.
Use the MOMCertImport tool to configure Operations Manager.
These are the same steps for installing certificates on a gateway server, except you do not install
or run the gateway approval tool. For more information, see the following:
How to Obtain a Certificate Using Windows Server 2008 Enterprise CA
How to Obtain a Certificate Using Windows Server 2008 Stand-Alone CA
Confirming Certificate Installation
If you have properly installed the certificate, the following event is written into the Operations
Manager event log.
During the setup of a certificate, you run the MOMCertImport tool. When the MOMCertImport tool
has finished, the serial number of the certificate that you imported is written to the registry at the
following subkey.
Caution
Incorrectly editing the registry can severely damage your system. Before making changes
to the registry, you should back up any valued data on the computer.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Operations Manager\3.0\Machine
Settings
Authentication and Data Encryption Between Management Server, Gateway Server, and
Agents
Communication among these Operations Manager features begins with mutual authentication. If
certificates are present on both ends of the communications channel, then certificates will be
used for mutual authentication; otherwise, the Kerberos version 5 protocol is used. If any two
features are separated across an untrusted domain, mutual authentication must be performed
using certificates.
Normal communications, such as events, alerts, and deployment of a management pack, occur
over this channel. The previous illustration shows an example of an alert being generated on one
of the agents that is routed to the management server. From the agent to the gateway server, the
Kerberos security package is used to encrypt the data, because the gateway server and the
agent are in the same domain. The alert is decrypted by the gateway server and re-encrypted
using certificates for the management server. After the management server receives the alert, the
management server decrypts the message, re-encrypts it using the Kerberos protocol, and sends
it to the management server where the management server decrypts the alert.
Some communication between the management server and the agent may include credential
information; for example, configuration data and tasks. The data channel between the agent and
the management server adds another layer of encryption in addition to the normal channel
encryption. No user intervention is required.
Management Server and Operations Console, Web Console Server, and Reporting Server
Authentication and data encryption between the management server and the Operations console,
web console server, or Reporting Server is accomplished by using Windows Communication
Foundation (WCF) technology. The initial attempt at authentication is made by using the user's
credentials. The Kerberos protocol is attempted first. If the Kerberos protocol does not work,
another attempt is made using NTLM. If authentication still fails, the user is prompted to provide
credentials. After authentication has taken place, the data stream is encrypted as a function of
either the Kerberos protocol or SSL, if NTLM is used.
In the case of a Reporting Server and a management server, after authentication has occurred, a
data connection is established between the management server and SQL Server Reporting
Server. This is accomplished by strictly using the Kerberos protocol; therefore, the management
server and Reporting Server must reside in trusted domains. For more information about WCF,
see the MSDN article What Is Windows Communication Foundation.
Management Server and Reporting Data Warehouse
Two communication channels exist between a management server and the Reporting data
warehouse:
The monitoring host process spawned by the health service (System Center Management
service) in a management server
The System Center Data Access services in the management server
Monitoring Host Process and Reporting Data Warehouse
By default, the monitoring host process spawned by the Health Service, which is responsible for
writing collected events and performance counters to the data warehouse, achieves Windows
Integrated Authentication by running as the Data Writer Account specified during Reporting
Setup. The account credential is securely stored in a Run As Account called Data Warehouse
Action Account. This Run As Account is a member of a Run As Profile called Data Warehouse
Account (which is associated with the actual collection rules).
If the Reporting data warehouse and the management server are separated by a trust boundary
(for example, each resides in different domains with no trust), then Windows Integrated
Authentication will not work. To work around this situation, the monitoring host process can
connect to the Reporting data warehouse using SQL Server Authentication. To do this, create a
new Run As Account (of Simple Account type) with the SQL account credential and make it a
member of the Run As Profile called Data Warehouse SQL Server Authentication Account, with
the management server as the target computer.
Important
By default, the Run As Profile, Data Warehouse SQL Server Authentication Account was
assigned a special account through the use of the Run As Account of the same name.
Never make any changes to the account that is associated with the Run As Profile, Data
Warehouse SQL Server Authentication Account. Instead, create your own account and
your own Run As Account and make the Run As Account a member of the Run As Profile,
Data Warehouse SQL Server Authentication Account when configuring SQL Server
Authentication.
The following outlines the relationship of the various account credentials, Run As Accounts, and
Run As Profiles for both Windows Integrated Authentication and SQL Server Authentication.
Default: Windows Integrated Authentication
Run As Profile: Data Warehouse Account
Run As Account: Data Warehouse Action Account
Credentials: Data Writer Account (specified during setup)
Run As Profile: Data Warehouse SQL Server Authentication Account
Run As Account: Data Warehouse SQL Server Authentication Account
Credentials: Special account created by Operations Manager (do not change)
Optional: SQL Server Authentication
Run As Profile: Data Warehouse SQL Server Authentication Account
Run As Account: A Run As Account you create.
Credentials: An account you create.
The System Center Data Access Service and Reporting Data Warehouse
By default, the System Center Data Access service, which is responsible for reading data from
the Reporting data warehouse and making it available in the Report Parameter Area, achieves
Windows Integrated Authentication by running as the Data Access Service and Config Service
account that was defined during setup of Operations Manager.
If the Reporting data warehouse and the management server are separated by a trust boundary
(for example, each resides in different domains with no trust), then Windows Integrated
Authentication would not work. To work around this situation, the System Center Data Access
service can connect to the Reporting data warehouse using SQL Server Authentication. To do
this, create a new Run As Account (of Simple Account type) with the SQL account credential and
make it a member of the Run As Profile called Reporting SDK SQL Server Authentication Account
with the management server as the target computer.
Important
By default, the Run As Profile, Reporting SDK SQL Server Authentication Account was
assigned a special account through the use of the Run As Account of the same name.
Never make any changes to the account that is associated with the Run As Profile,
Reporting SDK SQL Server Authentication Account. Instead, create your own account
and your own Run As Account, and make the Run As Account a member of the Run As
Profile, Reporting SDK SQL Server Authentication Account when configuring SQL Server
Authentication.
The following outlines the relationship of the various account credentials, Run As Accounts, and
Run As Profiles for both Windows Integrated Authentication and SQL Server Authentication.
Default: Windows Integrated Authentication
Data Access Service and Config Service Account (defined during setup of Operations Manager)
Run As Profile: Reporting SDK SQL Server Authentication Account
Run As Account: Reporting SDK SQL Server Authentication Account
Credentials: Special account created by Operations Manager (do not change)
Optional: SQL Server Authentication
Run As Profile: Data Warehouse SQL Server Authentication Account
Run As Account: A Run As Account you create.
Credentials: An account you create.
Operations Console and Reporting Server
The Operations console connects to Reporting Server on port 80 using HTTP. Authentication is
performed by using Windows Authentication. Data can be encrypted by using the SSL channel.
For more information about using SSL between the Operations console and Reporting Server,
see How to Configure the Operations Console to Use SSL When Connecting to a Reporting
Server.
Reporting Server and Reporting Data Warehouse
Authentication between Reporting Server and the Reporting data warehouse is accomplished
using Windows Authentication. The account that was specified as the Data Reader Account
during setup of Reporting becomes the Execution Account on Reporting Server. If the password
for the account should change, you will need to make the same password change using the
Reporting Services Configuration Manager in SQL Server. For more information about resetting
this password, see How to Change the Reporting Server Execution Account Password. The data
between the Reporting Server and the Reporting data warehouse is not encrypted.
How to Obtain a Certificate Using Windows Server 2008 Enterprise CA
Use the procedures in this topic to obtain a certificate from Windows Server 2008 R2, or Windows
Server 2008 R2 SP1 computer hosting Enterprise Root Active Directory Certificate Services (AD
CS). You use the CertReq command-line utility to request and accept a certificate, and you use a
Web interface to submit and retrieve your certificate.
It is assumed that you have AD CS installed, an HTTPS binding has been created, and its
associated certificate has been installed. Information about creating an HTTPS binding is
available in the topic How to Configure an HTTPS Binding for a Windows Server 2008 CA.
Important
The content for this topic is based on the default settings for Windows Server 2008 AD
CS; for example, setting the key length to 2048, selecting Microsoft Software Key
Storage Provider as the CSP, and using Secure Hash Algorithm 1 (SHA1). Evaluate
these selections against the requirements of your company’s security policy.
The high-level process to obtain a certificate from an Enterprise certification authority (CA) is as
follows:
1. Download the Trusted Root (CA) certificate.
2. Import the Trusted Root (CA) certificate.
3. Create a certificate template.
4. Add the template to the Certificate Templates folder.
5. Create a setup information file for use with the CertReq command-line utility.
6. Create a request file.
7. Submit a request to the CA.
8. Import the certificate into the certificate store.
9. Import the certificate into Operations Manager using MOMCertImport.
Download the Trusted Root (CA) certificate
Note
On 64-bit computers, type cd\SupportTools\amd64
6. Type the following:
MOMCertImport /SubjectName <Certificate Subject Name>
7. Press ENTER.
See Also
Authentication and Data Encryption for Windows Computers
How to Obtain a Certificate Using Windows Server 2008 Stand-Alone CA
Use the procedures in this topic to obtain a certificate from a stand-alone Windows
Server 2008 R2, or Windows Server 2008 R2 SP1–based computer hosting Active Directory
Certificate Services (AD CS). You use the CertReq command-line utility to request and accept a
certificate, and you use a Web interface to submit and retrieve your certificate.
It is assumed that you have AD CS installed, an HTTPS binding is being used, and its associated
certificate has been installed. Information about creating an HTTPS binding is available in the
topic How to Configure an HTTPS Binding for a Windows Server 2008 CA.
Important
The content for this topic is based on the default settings for Windows Server 2008 AD
CS; for example, setting the key length to 2048, selecting Microsoft Software Key
Storage Provider as the CSP, and using Secure Hash Algorithm 1 (SHA1). Evaluate
these selections against the requirements of your company’s security policy.
The high-level process to obtain a certificate from a stand-alone certification authority (CA) is as
follows:
1. Download the Trusted Root (CA) certificate.
2. Import the Trusted Root (CA) certificate
3. Create a setup information file to use with the CertReq command-line utility.
4. Create a request file.
5. Submit a request to the CA using the request file.
6. Approve the pending certificate request.
7. Retrieve the certificate from the CA.
8. Import the certificate into the certificate store.
9. Import the certificate into Operations Manager using MOMCertImport.
Download the Trusted Root (CA) certificate
Note
If an HTTPS binding has not been configured on the Certificate Services Web
site, the browser will fail to connect. For more information, see How to Configure
an HTTPS Binding for a Windows Server 2008 CA.
2. On the Microsoft Active Directory Certificate Services Welcome screen, click
Request a certificate.
3. On the Request a Certificate page, click advanced certificate request.
4. On the Advanced Certificate Request page, click Submit a certificate request by
using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by
using a base-64-encoded PKCS #7 file.
5. On the Submit a Certificate Request or Renewal Request page, in the Saved
Request text box, paste the contents of the CertRequest.req file that you copied in step 4
in the previous procedure, and then click Submit.
6. Close Internet Explorer.
Approve the pending certificate request
Note
On 64-bit computers, type cd\SupportTools\amd64
6. Type the following:
MOMCertImport /SubjectName <Certificate Subject Name>
7. Press ENTER.
See Also
Authentication and Data Encryption for Windows Computers
How to Configure an HTTPS Binding for a Windows Server 2008 CA
If you are setting up a new certification authority (CA) for the first time for use with System
Center 2012 – Operations Manager, use the following procedure to configure an HTTPS binding
for the CA.
Note
To uninstall Operations Manager from the management server that functions as your ACS
Collector, you must first uninstall ACS.
See Collecting Security Events Using Audit Collection Services in Operations Manager in the
Operations Guide for information on minimum and recommended system requirements for ACS.
See Also
Deploying ACS and ACS Reporting
How to Install an Audit Collection Services (ACS) Collector and Database
How to Deploy ACS on a Secondary Management Server
How to Deploy ACS Reporting
Note
To display a list of SQL Server Instances, on the database computer click Start,
point to Programs and Microsoft SQL Server 2005, and then click SQL Server
Management Studio. On the Server name list, click Browse for more and then
expand Database Engine. All databases are listed as server name\database
name.
9. On the Database Authentication page, select one of the authentication methods. If the
ACS collector and the ACS database are members of the same domain, you can select
Windows authentication, otherwise select SQL authentication, and then click Next.
Note
If you select SQL authentication and click Next, the Database Credentials
page displays. In the SQL login name box, enter the name of the user account
that has access to the SQL Server and the password for that account in the SQL
password box, and then click Next.
10. On the Database Creation Options page, click Use SQL Server's default data and log
file directories to use SQL Server's default folders. Otherwise, click Specify directories
and enter the full path, including drive letter, to the location you want for the ACS
database and log file, for example C:\Program Files\Microsoft SQL Server\MSSQL.1\
MSSQL\Data. Click Next.
11. On the Event Retention Schedule page, click Local hour of day to perform daily
database maintenance. Choose a time when the number of expected security events is
low. During the database maintenance period, database performance will be impacted. In
the Number of days to retain events box type the number of days ACS should keep
events in the ACS database before the events are removed during database grooming.
The default value is 14 days. Click Next.
12. On the ACS Stored Timestamp Format page, choose Local or Universal Coordinated
Time, formerly known to as Greenwich Mean Time, and then click Next
13. The Summary page displays a list of actions that the installation program will perform to
install ACS. Review the list, and then click Next to begin the installation.
Note
If a SQL server login dialog box displays and the database authentication is set
to Windows authentication, click the correct database and verify that the Use
Trusted Connection check box is checked. Otherwise click to remove the check
and enter the SQL login name and password. Click OK.
14. When the installation is complete, click Finish.
See Also
Deploying ACS and ACS Reporting
How to Install Audit Collection Services (ACS)
How to Deploy ACS on a Secondary Management Server
How to Deploy ACS Reporting
Note
The ACS Collector uses an Open Database Connectivity (ODBC) Data Source
Name (DSN) to communicate with the ACS database.
8. On the Database page, select the Remote database server option. In the Remote
database server machine name field, enter the value in the name field of the SQL
Server network. Leave the Database server instance name field blank, unless you have
installed a SQL Server cluster in a named instance of SQL Server, and then enter that
value. In the Database name field, accept the default of OperationsManagerAC, but if
you plan to host multiple ACS databases in the same instance of SQL Server, enter a
unique name. Click Next.
9. On the Database Authentication page, select Windows authentication, and then click
Next. By selecting Windows authentication, the ACS Collector services will use the local
machine account to write to the ACS database during normal operations.
10. On the Database Creation Options page, select the Use SQL Server default data and
log file directories option, and then click Next.
11. On the Event Retention Schedule page, set the Local hour of day to perform daily
maintenance and Number of days an event is retained in database options to the
appropriate values, and then click Next.
12. On the ACS Stored Timestamp Format page, select either the Local or Universal
Coordinated Time (UTC) option, and then click Next.
13. On the Summary page, review the installation options, and then click Next.
14. During the installation, you might be prompted for a SQL Server Login. If you are logged
on with an account that has SQL Server Administrator rights, then accept the default or
otherwise provide credentials that have the SQL Server Administrator rights.
Note
This account is used by the setup process to create the ACS database.
15. Click Finish to complete the installation.
16. Open the SQL Server Management Studio tool, open the Databases folder, and
confirm the presence of the OperationsManagerAC database.
17. On the ACS management server, open Server Manager tool, expand the Configuration
container and select Services, and confirm that the Operations Manager Audit
Collection Service is present, that it is started, and that the Startup Type is set to
Automatic.
18. You can now enable the ACS forwarders. For more information, see How to Enable ACS
Forwarders.
See Also
Deploying ACS and ACS Reporting
How to Install an Audit Collection Services (ACS) Collector and Database
How to Install Audit Collection Services (ACS)
How to Deploy ACS Reporting
Note
The reporting server URL needs the reporting server virtual directory
(ReportingServer_<InstanceName>) instead of the reporting manager directory
(Reports_<InstanceName>).
7. Open Internet Explorer and enter the following address to view the SQL Reporting
Services Home page. http://<yourReportingServerName>/Reports_<InstanceName>
8. Click Audit Reports in the body of the page and then click Show Details in the upper
right part of the page.
9. Click the Db Audit data source.
10. In the Connect Using section, select Windows Integrated Security and click Apply.
See Also
Deploying ACS and ACS Reporting
How to Install an Audit Collection Services (ACS) Collector and Database
How to Deploy ACS on a Secondary Management Server
How to Install Audit Collection Services (ACS)
Command-line Parameters
The following table lists the command-line parameters for installing features of Operations
Manager.
Note
If the parameter contains a colon, a value is required. Otherwise, it is simply a switch.
Parameter Value
For examples of command lines for installing the various features of Operations Manager see the
following:
Walkthrough: Installing Operations Manager on a Single Server
How to Install the First Management Server in a Management Group
How to Install Additional Management Servers
How to Install the Operations Console
How to Install the Operations Manager Web Console
How to Install the Operations Manager Reporting Server
How to Deploy a Gateway Server
See Also
Deploying System Center 2012 - Operations Manager
To configure NLB
1. First, you must set up a virtual IP address. You must configure a static IP address for all
nodes participating in the cluster and set up DNS. For more information, see. Configure
a Static IP Address.
2. You must enable NLB on each management server in your management group. For more
information, see
Installing Network Load Balancing
Create a New Network Load Balancing Cluster
Add a Host to the Network Load Balancing Cluster
Using a Firewall
Note
Separating the Operations console, management server, or Reporting Server by either a
firewall or across a trust boundary is not supported.
In an environment where the Reporting data warehouse is separated from the management
server and Reporting Server by a firewall, Windows Integrated Authentication cannot be used.
You need to take steps to configure SQL Server Authentication. The following sections explain
how to enable SQL Server Authentication between the management server (or management
server), the Reporting Server, and the Reporting data warehouse, as shown in the following
illustration.
Port Assignments
The following table shows Operations Manager feature interaction across a firewall, including
information about the ports used for communication between the features, which direction to open
the inbound port, and whether the port number can be changed.
web console 51908 ---> web console Yes (IIS Admin) Port 51908 is the
browser server default port used
when selecting
Windows
Authentication. If
you select Forms
Authentication, you
will need to install
an SSL certificate
and configure an
available port for
https functionality
for the Operations
Manager web
console web site.
To enter the SQL Server port number into the dbo.MT_ManagementGroup table
1. On the computer hosting the operational database, on the Windows desktop, click Start,
2. In the Connect to Server dialog box, in the Server type list, select Database Engine.
3. In the Server name list, type the server name, instance, and port number for your
operational database (for example, computer\<instance>).
4. In the Authentication list, select Windows Authentication, and then click Connect.
5. In the Object Explorer pane, expand Databases, expand the operational database (for
example, OperationsManager), expand Tables, right-click
dbo.MT_ManagementGroup, and then click Open Table.
6. In the results pane, scroll to the right to the column titled SQLServerName_<guid>.
7. In the first row, enter computer\<instance> followed by a comma, a space, and then the
SQL Server port number (for example, computer\INSTANCE1, <port>).
8. Click File, and then click Exit.
To enter the SQL Server port number into the dbo.MemberDatabase table
Important
This is the only supported upgrade path to System Center 2012 – Operations Manager. If
you are using another, you must first upgrade to System Center Operations Manager
2007 R2.
See Also
Upgrading from System Center Operations Manager 2007 R2
Single-server Upgrade (Simple) Use this upgrade path when you have an
Operations Manager 2007 R2 management
group where all features are installed on the
same server, and the hardware and software
meets the minimum supported configuration for
System Center 2012 – Operations Manager.
Single-server Upgrade (Complex) Use this upgrade path when you have an
Operations Manager 2007 R2 management
group where all features are installed on the
same server, and the hardware and software do
not meet the minimum supported configuration
for System Center 2012 – Operations Manager.
If the operating system on the server is 32-bit, a
new, 64-bit server is required.
Distributed Upgrade (Simple) Use this path when you have an Operations
Manager 2007 R2 management group where
various features are installed on separate
servers, all of which meet the minimum
supported configurations for System
Center 2012 – Operations Manager.
Distributed Upgrade (Complex) Use this path when you have an Operations
Manager 2007 R2 management group where
various features are installed on separate
servers, and where one or more servers do not
meet the minimum supported configuration for
System Center 2012 – Operations Manager.
For example, if the RMS is clustered, you must
follow this path. If the operating system on any
of the server is 32-bit, new 64-bit replacement
servers are required.
This guide also contains the specific pre-upgrade and post-upgrade procedures and checklists to
help you through the upgrade process. The following content will help you upgrade to System
Center 2012 – Operations Manager.
Upgrade Path Checklists for Operations Manager
Upgrading Hardware and Software to Meet System Requirements
Pre-Upgrade Tasks for Operations Manager
Upgrade Tasks for Operations Manager
Improving Upgrade Performance
Upgrading a Single-Server Operations Manager 2007 R2 Environment
Upgrading a Distributed Operations Manager 2007 R2 Environment
Post-Upgrade Tasks when Upgrading from Operations Manager 2007 R2
See Also
Upgrading to System Center 2012 - Operations Manager
Note
You can click the appropriate process box to open and review the content for any step in
the process.
The following table lists the process flow diagrams available, along with a description of when
each upgrade path should be used.
When your distributed management group has Distributed Upgrade (Complex) Process Flow
one or more servers that do not meet the Diagram
minimum supported configuration requirements
for System Center 2012 – Operations Manager,
and might require new hardware.
See Also
Checklist: Single-Server Upgrade (Simple)
Checklist: Single-Server Upgrade (Complex)
Checklist: Distributed Upgrade (Simple)
Checklist: Distributed Upgrade (Complex)
Important
Before you follow any of these procedures, make sure that you have verified that the
servers in your Operations Manager 2007 R2 management group meet the minimum
supported configurations for System Center 2012 – Operations Manager. This will help
you determine whether you will need to add any new servers to your management group
prior to upgrading. For more information, see Supported Configurations for
System Center 2012 – Operations Manager.
See Also
Single-Server and Distributed Upgrade (Simple) Process Flow Diagram
Single-Server Upgrade (Complex) Process Flow Diagram
Distributed Upgrade (Complex) Process Flow Diagram
If you prefer to avoid downtime on your single-server management group, you can add a
secondary management server and then follow the distributed management group upgrade
process. For more information, see:
How to Add an Operations Manager 2007 R2 Secondary Management Server (Operations
Manager Upgrade)
Checklist: Distributed Upgrade (Simple)
Checklist
Use the following checklist to upgrade your single-server management group if it already meets
the supported configuration requirements for System Center 2012 – Operations Manager
Tip
You can also view a process flow diagram that links to the relevant topics. For more
information, see Single-Server and Distributed Upgrade (Simple) Process Flow Diagram
Task References
Verify that you have a supported SQL Verify the SQL Server
Server collation on all databases and Collation
instances of databases.
See Also
Upgrade Path Checklists for Operations Manager
Single-Server and Distributed Upgrade (Simple)
Checklist
Use the following checklist to upgrade your single-server management group if it does not yet
meet the supported configuration requirements for System Center 2012 – Operations Manager.
Tip
You can also view a process flow diagram that links to the relevant topics. For more
information, see Single-Server Upgrade (Complex)
Task References
See Also
Upgrade Path Checklists for Operations Manager
Single-Server Upgrade (Complex)
Checklist
Use the following checklist to upgrade your distributed management group if it already meets the
supported configuration requirements for System Center 2012 – Operations Manager.
Tip
You can also view a process flow diagram that links to the relevant topics. For more
information, see Single-Server and Distributed Updated (Simple).
Note
In this checklist, we recommend that you move agents that report to the root
management server (RMS) to a secondary management server before upgrading the
agents. However, if you do not mind experiencing downtime, you can upgrade the agents
after you upgrade the management group instead of moving them to a secondary
management server.
Task References
See Also
Upgrade Path Checklists for Operations Manager
Single-Server and Distributed Updated (Simple)
Checklist
Use the following checklist to upgrade your distributed management group if any of the servers
do not yet meet the supported configuration requirements for System Center 2012 – Operations
Manager.
Tip
You can also view a process flow diagram that links to the relevant topics. For more
information, see Distributed Upgrade (Complex) .
This checklist contains multiple paths and you will not have to follow each step consecutively. For
example, you will upgrade the management group from either the RMS or the secondary
management server, depending on your current configuration. You should follow the steps in each
as needed.
Section Description
Import the Upgrade Helper Management Pack Use these procedures to import and use the
Upgrade Helper management pack.
Management Group Upgrade from RMS Use these procedures only if your RMS meets
the minimum system requirements for System
Center 2012 – Operations Manager.
Management Group Upgrade from Secondary Use these procedures only if your RMS does
Management Server not meet the minimum system requirements for
System Center 2012 – Operations Manager.
Task References
Note
You only have to add new secondary management servers if your current servers have a
32-bit operating system, which do not meet the supported configuration requirements for
System Center 2012 – Operations Manager. Otherwise, just ensure that your secondary
management servers meet the remaining supported configuration requirements.
Task References
Replacing Gateways
If you do not have gateway servers, or you have gateways that meet the minimum system
requirements, go to the Secondary Management Server Upgrade section of this checklist.
Otherwise, use the following procedures for each gateway in your management group.
Note
You only have to add new gateway servers if your current servers are 32-bit, which do not
meet the supported configuration requirements for System Center 2012 – Operations
Manager. Otherwise, just ensure that your gateway servers meet the remaining
supported configuration requirements.
Task References
Task References
Verify that you have a supported Verify the SQL Server Collation
SQL Server collation on all
databases and instances of
databases.
Note
A clustered RMS does not meet the supported configuration requirements for System
Center 2012 – Operations Manager.
Task References
Note
A clustered RMS does not meet the supported configuration requirements for System
Center 2012 – Operations Manager.
Task References
See Also
Upgrade Path Checklists for Operations Manager
Distributed Upgrade (Complex)
Important
Before you follow any of these procedures, make sure that you verify that the servers in
your Operations Manager 2007 R2 management group meet the minimum supported
configurations for System Center 2012 – Operations Manager. This will help you
determine whether you need to add any new servers to your management group before
you upgrade. For more information, see Supported Configurations for
System Center 2012 – Operations Manager.
The following table shows the tasks that you must complete before you upgrade from Operations
Manager 2007 R2 to System Center 2012 – Operations Manager. This table provides the
following information:
Tasks to complete
Links to the procedures related to those tasks
Potential downtime that a task might create
Description of the potential risk to the stability of your data and monitoring environment and
how to mitigate that risk
Important
The order of the tasks depends on the upgrade path that you follow. Use the Upgrade
Path Checklists for Operations Manager to follow the steps in order for your particular
upgrade scenario.
Import the Upgrade Helper Management Pack No downtime or interference; low risk.
Check for Gateway Servers Reporting to the No downtime or interference; low risk if the
Task Downtime, risk, and mitigation
Check the Operations Manager 2007 R2 RMS Consoles might lose connectivity to the RMS
for Active Connected Consoles during upgrade.
Stop the Services or Disable any Connectors Connectors do not function during upgrade.
Verify that the Operational Database Has More No downtime or interference; low risk.
Than 50 Percent Free Space
Verify the SQL Server Collation The management group upgrade does not
succeed if unsupported collation configurations
exist.
Back Up the Operations Manager Databases Depending on the backup technology that you
use, some backup methods might lock a
database during backup.
Restore the RMS Encryption Key on the No downtime or interference; low risk. Required
Secondary Management Server only if the root management server (RMS) does
not meet the supported configuration
requirements for System
Center 2012 – Operations Manager. This
should be performed just prior to management
group upgrade.
Upgrade SQL Server Reporting Services The reports will be unavailable, but data will not
be lost.
Write-Host "";
$failoverServers = $_.getFailoverManagementServers();
Write-Host "";
To ensure mutual authentication between the gateway and the secondary management server,
you install certificates from a certification authority (CA) on the secondary management server
and the gateway server. For more information, see the Deploying the Certificates section of How
to Replace an Operations Manager 2007 R2 Gateway that Has an Unsupported Configuration
(Operations Manager Upgrade).
After you have imported the certificates on the new secondary management server, and you
verify that the gateway server has a healthy state, you must set the new management server as
the primary management server for the gateway, and set the RMS as the secondary
management server.
Remove Agents from Pending Management
Before you upgrade the secondary management server, remove any agents that are in Pending
Management.
Note
Recovery of the password is not possible if the key is lost or forgotten.
Note
Store the encryption key in a location that can be easily accessed, such as a file
share. You have to restore this encryption key on all management servers in your
management group before you upgrade.
To back up the encryption key by using the Encryption Key Backup or Restore
Wizard
To back up the RMS encryption key by using the Command Prompt window
1. Log on to the computer that hosts the Operations Manager 2007 R2 root management
server by using an account that is a member of the Administrators group.
2. Open a Command Prompt window as an administrator by using the Run as
administrator option.
3. At the command prompt, type cd <path to installation folder>, and then press Enter.
4. To back up the encryption key, do the following:
a. Type SecureStorageBackup Backup <BackupFile>, and then press Enter.
b. At the Please enter the password to use for storage/retrieval prompt, type a
password that is at least eight characters long, and then press Enter.
c. At the Please re-enter your password prompt, type the same password, and then
press Enter.
Check the Operations Manager 2007 R2 RMS for Active Connected Consoles
Consoles that are connected to the Operations Manager 2007 R2 RMS might lose connectivity
during the upgrade of the management group. Before you perform the upgrade of the
management group, you should notify anyone who has a connected console to close the
connection.
Disable the Notification Subscriptions
You should disable notification subscription before you upgrade the management group to ensure
that notifications are not sent during the upgrade process.
1. Log on to the Operations console account that is a member of the Operations Manager
Administrators role for the Operations Manager management group.
2. In the Operations console, select the Administration view.
3. In the navigation pane, expand Administration, expand the Notifications container, and
then click Subscriptions.
4. Select each subscription, and then click Disable in the Actions pane.
Note
Multiselect does not work when you are disabling subscriptions.
To disable subscriptions
1. On the Start menu, point to Administrative Tools, and then click Services.
2. In the Name column, right-click the Connector that you want to control, and then click
To increase the free space for the operational database and log files
1. On the computer that hosts the operational database, open SQL Server Management
Studio.
2. In the Connect to Server dialog box, in the Server Type list, select Database Engine.
3. In the Server Name list, select the server and instance for your operational database (for
example, computer\INSTANCE1).
4. In the Authentication list, select Windows Authentication, and then click Connect.
5. In the Object Explorer pane, expand Databases, right-click the operational database,
and then click Properties.
6. In the Database Properties dialog box, under Select a page, click Files.
7. In the results pane, increase the Initial Size value for the MOM_DATA database by 50
percent.
Note
This step is not required if free space already exceeds 50 percent.
8. Set the Initial Size value for the MOM_LOG to be 50 percent of the total size of the
database. For example, if the operational database size is 100 GB, the log file size
should be 50 GB. Then click OK.
Important
You must ensure that all databases and database instances have the correct collation
before you run upgrade on the management group.
To determine the SQL Server collation of a database, you can check the database properties. In
SQL Server Management Studio, right-click the database you want to check, and then click
Properties. The collation is listed under Maintenance.
For information about changing the SQL Server collation of a database, see Setting and
Changing the Server Collation.
Restore the RMS Encryption Key on the Secondary Management Server
When you cannot upgrade the management group from the RMS because it does not meet the
minimum supported configurations for System Center 2012 – Operations Manager, you must
restore the encryption key on the Operations Manager 2007 R2 secondary manager server from
which you will run the management group upgrade. For more information about whether the RMS
meets the required supported configurations, see Supported Configurations for System Center
2012 - Operations Manager. You should restore the encryption key just prior to upgrading the
management group. To restore the encryption key, you must use the SecureStorageBackup tool.
To restore up the RMS encryption key by using the Encryption Key Backup or
Restore Wizard
1. Log on to the computer hosting the secondary management server with an account that
is a member of the Administrators group.
2. Open a command prompt window by using the Run as Administrator option.
3. At the command prompt, type:
cd <Operations Manager Installation Folder>
SecureStorageBackup
4. In the Encryption Key Backup or Restore Wizard, on the Backup or Restore? page,
select the Restore the Encryption Key option and then complete the wizard, providing
location and password for the key.
1. Log on to the computer hosting the secondary management server with an account that
is a member of the Administrators group.
2. In a Command Prompt window using the Run as Administrator option, type:
cd <Operations Manager Installation Folder>
SecureStorageBackup Restore <BackupFile>
3. At the Please enter the password to use for storage/retrieval prompt, type the
password, and then press Enter.
4. Use the same password that was used to back up the encryption keys.
Caution
Incorrectly editing the registry can severely damage your system. Before you
make changes to the registry, back up any valued data that is on the computer.
3. Navigate to the HKLM\Software\microsoft\Microsoft Operations Manager\3.0\
MOMBins key. If value1 and value2 exist, the encryption key has successfully been
restored.
See Also
Upgrade Path Checklists for Operations Manager
Upgrade Phases
When you upgrade a single-server management group, you run the upgrade on all features
installed on a single server. In a distributed management group upgrade, upgrade tasks are
performed in a number of phases.
Each type of upgrade requires some pre-upgrade and post-upgrade tasks. The phases of
upgrade include the following:
See Also
Upgrading to System Center 2012 - Operations Manager
Note
The use command assumes that the name of the operational database was not
changed and the default value of OperationsManager is used.
7. Click the Query menu, and then click Execute.
8. Click the File menu, and then click Exit.
Note
Before you follow any of these procedures, make sure that you verify that the servers in
your Operations Manager 2007 R2 management group meet the minimum supported
configurations for System Center 2012 – Operations Manager. This will help you
determine whether you need to add any new servers to your management group before
you upgrade. For more information, see Supported Configurations for
System Center 2012 – Operations Manager.
The Upgrade Helper management pack discovers the root management server, secondary
management servers, gateway servers, and any agent-managed computers in your distributed
Operations Manager 2007 R2 management group. The Upgrade Helper management pack
monitors the progress of each phase of your upgrade.
Note
You might have to perform a number of pre-upgrade tasks before each phase of upgrade.
For more information, see Upgrade Path Checklists for Operations Manager.
Note
It may take up to 15 minutes for discovery to run after you first import the management
pack.
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box appears. In the Server name box,
type the name of the management server from which you want to connect to the
Operations console.
3. Right-click the Management Packs node, and then click Import Management Packs.
4. In the Import Management Packs wizard, click Add, and then click Add from disk.
5. The Select Management Packs to import dialog box opens. Browse to the
/ManagementPacks directory of the Operations Manager installation media. Select
OperationsManager.Upgrade.mp, and then click Open.
6. The Select Management Packs page lists the management pack that you selected for
import. A green check mark next to the management pack in the list indicates that the
management pack can be imported. Click Install.
The Import Management Packs page appears and shows the progress for the
management pack. The management pack is downloaded to a temporary directory,
imported to Operations Manager 2007 R2, and then deleted from the temporary directory.
If there is a problem at any stage of the import process, select the management pack in
the list to view the status details.
7. Click Close.
After you have imported the Upgrade Helper management pack, you can view steps for each
upgrade phase in the Monitoring workspace of the Operations console.
Important
Typically, you follow each of the steps in the Upgrade Helper management pack in order.
However, if you have manually installed agents, you should upgrade them before you
upgrade the secondary management servers. You upgrade push-installed agents after
you upgrade the secondary management servers.
Note
You can open the discovered instances with the Operations Manager Health
Explorer to see the upgrade status, with additional information about how to
upgrade the management servers.
Note
You can open the discovered instances with the Health Explorer to see the
upgrade status, with additional information about how to upgrade the gateways.
Important
You must upgrade the agents that have a value of True in the
IsManuallyInstalled property before you upgrade your secondary management
servers.
3. Review the state of each agent. If the agent is upgraded, the state is Healthy. If it is not
upgraded, a Warning appears.
4. You must upgrade the agents and ensure that the status of each is healthy before you
move to the next step in the process. For more information, see How to Upgrade Agents
from Operations Manager 2007 R2.
Note
You can open the discovered instances with the Health Explorer to see the
upgrade status, with additional information about how to upgrade the agents.
Note
You can open the discovered instances with the Health Explorer to see the
upgrade status, with additional information about how to upgrade the
management group.
See Also
Checklist: Distributed Upgrade (Simple)
Checklist: Distributed Upgrade (Complex)
Note
It can take up to five minutes for the System Center Management Service on the
new management server to establish secure communications with the root
management (RMS) server, and during that time it appears as not monitored.
When communications are established, its Health state changes to Healthy.
The next step is to move the agents that reported to the old management server or RMS to
the new secondary management server. For more information, see How to Move Agents to
an Operations Manager 2007 R2 Secondary Management Server (Operations Manager
Upgrade).
See Also
Upgrading Hardware and Software to Meet System Requirements
Important
If you have a distributed management group that meets the minimum supported
configurations, you can alternatively upgrade the agents after you upgrade the
management group instead of moving the agents to a secondary management server.
However, you will experience monitoring downtime until the agents are upgraded.
You can move the agents by using the Operations console, by using Active Directory Integration,
or by running a Windows PowerShell script. However, if the agents were deployed manually, you
cannot move them by using the Operations console.
Moving Agents to a Secondary Management Server
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box appears. In the Server name box,
type the name of the Operations Manager 2007 R2 management server that you
want the Operations console to connect to.
3. In the Administration pane, under Device Management, click Agent-Managed.
4. For Windows agents, right-click the computers in the Agent-Managed pane that have
agents that you want to move to the secondary management server, and then click
Change Primary Management Server.
For UNIX and Linux agents, right-click the computers in the UNIX/Linux Servers pane
that have agents that you want to move to the secondary management server, and then
click Change Primary Management Server.
5. In the Change Management Server dialog box, select the secondary management
server from the list, and then click OK. The change takes effect on the agent after its next
update interval.
The Operations console should now list the secondary management server as the primary
management server for the agent that was moved.
Moving Agents to a Secondary Management Server by using Active Directory Integration
Using Active Directory Integration to move Windows agents to a secondary management server
is a multistep process. First, you delete the configuration rule for the management server that you
will replace. Then, you create a new rule that sets the replacement management server as the
failover management server. This step is an intermediary step that is required for the agent to
recognize the replacement management server. After the agent assignment propagates in Active
Directory Domain Services, which can take up to one hour, you delete the configuration rule that
you just created. Finally, you create a new configuration rule on the replacement management
server.
In the following procedures, it is assumed that you have an existing primary management server
and a failover management server that do not meet the minimum configuration requirements for
System Center 2012 – Operations Manager, and you have already created two new secondary
management servers that do meet these requirements to replace the old ones. By creating the
configuration rules for Active Directory Integration, you move the agents from the old servers to
the new servers in a multistep process.
To create a configuration rule for the management server that you are replacing
(step 1)
1. Log on to a computer that hosts an Operations console with an Operations Manager
Administrators role account for the Operations Manager 2007 R2 management group.
2. In the Operations console, click the Administration button.
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box appears. In the Server name box,
type the name of the Operations Manager 2007 R2 management server that you
want the Operations console to connect to.
3. In the Administration pane, under Device Management, click Management Servers.
4. In the Management Servers pane, right-click the management server that you are
replacing, and then click Properties. This sets the management server that you are
replacing as the Primary Management Server for the computers that are returned by the
rules you will create in the following procedure.
5. In the Management Server Properties dialog box, click the Auto Agent Assignment
tab.
6. Select the agent assignment, and then click Delete.
Click Add to start the Agent Assignment and Failover Wizard, and then click Next.
Note
The Introduction page does not appear if the wizard has been run and Do not
show this page again was selected.
7. On the Domain page, do the following:
Select the domain of the computers from the Domain name list. The management
server must be able to resolve the domain name.
Important
The management server and the computers that you want to manage must be in
2-way trusted domains.
Select the Use a different account to perform agent assigned in the specified
domain check box.
Set Select Run As Profile to the Run As profile associated with the Run As account
that was provided when MOMADAdmin.exe was run for the domain. The default
account that is used to perform agent assignment is the computer account for the
root management server, also referred to as the Active Directory-Based Agent
Assignment Account. If this was not the account that was used to run
MOMADAdmin.exe, select Use a different account to perform agent assignment
in the specified domain, and then select or create the account from the Select Run
As Profile list.
8. On the Inclusion Criteria page, either type the LDAP query for assigning computers to
this management server, and then click Next, or click Configure. If you click Configure,
do the following:
a. In the Find Computers dialog box, type the criteria that you want to use for
assigning computers to this management server.
b. Click OK, and then click Next.
Note
The following LDAP query returns computers with a name starting with MsgOps,
(&(sAMAccountType=805306369)(objectCategory=computer)(cn=MsgOps*))
For more information about LDAP queries, see Creating a Query Filter.
9. On the Exclusion Rule page, type the fully qualified domain name (FQDN) of computers
that you explicitly want to prevent from being managed by this management server, and
then click Next.
Important
You must separate the computer FQDNs that you type with a semicolon, colon,
or a new line (CTRL+ENTER).
10. On the Agent Failover page, select Manually configure failover, and then do the
following:
a. Select the check box of the replacement secondary management server. This sets
the replacement server as the failover server.
b. Click Create.
11. In the Management Server Properties dialog box, click OK.
Note
It can take up to one hour for the agent assignment setting to propagate in Active
Directory Domain Services.
12. After you have confirmed that the agent assignment was successful, delete the agent
assignment that you created earlier.
nNote
The Introduction page does not appear if the wizard has been run and Do not
show this page again was selected.
6. On the Domain page, do the following:
Select the domain of the computers from the Domain name list. The management
server must be able to resolve the domain name.
Important
The management server and the computers that you want to manage must be in
2-way trusted domains.
Select the Use a different account to perform agent assigned in the specified
domain check box.
Set Select Run As Profile to the Run As profile associated with the Run As account
that was provided when MOMADAdmin.exe was run for the domain. The default
account that is used to perform agent assignment is the computer account for the
root management server, also referred to as the Active Directory-Based Agent
Assignment Account. If this was not the account that was used to run
MOMADAdmin.exe, select Use a different account to perform agent assignment
in the specified domain, and then select or create the account from the Select Run
As Profile list.
7. On the Inclusion Criteria page, either type the LDAP query for assigning computers to
this management server, and then click Next, or click Configure. If you click Configure,
do the following:
a. In the Find Computers dialog box, type the criteria that you want to use for
assigning computers to this management server.
b. Click OK, and then click Next.
Note
The following LDAP query returns computers with a name starting with MsgOps,
(&(sAMAccountType=805306369)(objectCategory=computer)(cn=MsgOps*))
For more information about LDAP queries, see Creating a Query Filter.
8. On the Exclusion Rule page, type the fully qualified domain name (FQDN) of computers
that you explicitly want to prevent from being managed by this management server, and
then click Next.
Important
You must separate the computer FQDNs that you type with a semicolon, colon,
or a new line (CTRL+ENTER).
9. On the Agent Failover page, select Manually configure failover, and then do the
following:
a. Select the check box of the second replacement management server that you added
to the management group. This sets it as the failover server.
b. Click Create.
10. In the Management Server Properties dialog box, click OK.
Note
It can take up to one hour for the agent assignment setting to propagate in Active
Directory Domain Services.
See Also
Upgrading Hardware and Software to Meet System Requirements
To copy Microsoft.EnterpriseManagement.GatewayApprovalTool.exe to
management servers
Note
The Hosts file is located in a subdirectory of the C:\Windows\System32\Drivers, and it
contains directions for configuration.
After you have downloaded the certificates to each gateway server and management server, you
import them by using the MOMCertImport tool.
To request and download certificates
1. Request and download a Trusted Root (CA) certificate on each gateway and
management server. See the following procedures for more information about how to
request a Trusted Root (CA) certificate:
How to obtain a Certificate Using Windows Server 2008 Enterprise CA in Operations
Manager 2007
How to Obtain a Certificate Using Windows Server 2008 Stand-Alone CA in
Operations Manager 2007
Tip
If you double-click MOMCertImport.exe or run it at the Command Prompt window
without any parameters, a dialog box appears where you can select the installed
certificate, and then click OK.
The next step is to remove the old gateway server from the management group. For more
information, see How to Remove an Operations Manager 2007 R2 Gateway (Operations
Manager Upgrade).
See Also
Upgrading Hardware and Software to Meet System Requirements
How to Remove an Operations Manager 2007 R2 Gateway (Operations Manager Upgrade)
See Also
Upgrading Hardware and Software to Meet System Requirements
See Also
Checklist: Single-Server Upgrade (Simple)
Checklist: Single-Server Upgrade (Complex)
Single-Server and Distributed Upgrade Process Flow Diagram
Important
Before you follow any of these procedures, make sure that you verify that the servers in
your Operations Manager 2007 R2 management group meet the minimum supported
configurations for System Center 2012 – Operations Manager. This will help you
determine whether you need to add any new servers to your management group before
you upgrade. For more information, see Supported Configurations for
System Center 2012 – Operations Manager.
If your single-server management group meets the supported configuration requirements, but you
do not want to experience any downtime during the upgrade process, you can add a secondary
management server, and then follow the upgrade process for a distributed upgrade. For more
information, see Supported Configurations for System Center 2012 – Operations Manager. If your
server cannot meet the supported configurations because it requires new hardware, you can add
a secondary management server, and then follow the upgrade process for a distributed upgrade.
For more information, see Upgrade Path Checklists for Operations Manager.
Note
The Getting Started page displays information about what will be upgraded. The
Operations Manager data warehouse will be installed if it does not already exist.
Click Next to proceed with the upgrade.
3. On the Getting Started, Please read the license terms page, read the Microsoft
Software License Terms, click I have read, understood, and agree with the license
terms, and then click Next.
4. On the Select installation location page, accept the default value of C:\Program Files\
System Center 2012\Operations Manager, or type in a new location or browse to one.
Then click Next.
5. On the Prerequisites page, review and address any warnings or errors that the
Prerequisites checker returns, and then click Verify Prerequisites Again to recheck the
system.
Note
Microsoft SQL Server Full Text Search must be enabled. For more information,
see Full-text Search Overview.
Note
The Agent Upgrade Check warning can be ignored if you plan to upgrade the
agents after the single-server management group has been upgraded.
6. If the Prerequisites checker does not return any other errors or warnings that have to be
addressed, click Next.
7. If the single-server management group does not already have a data warehouse
installed, a data warehouse is created, and you must configure it as follows:
a. On the Configure the data warehouse database page, in the Server name and
instance name box, type the server name of the SQL Server database and instance
for the database server that will host the data warehouse database.
b. After you have typed in the correct values for the server name of the SQL Server
database, Setup attempts to validate the values that you have typed as the SQL
Server name and the port number. In the Database name, Database size (MB),
Data file folder, and Log file folder boxes, we recommend that you accept the
default values. Click Next.
Warning
These paths do not change if you connect to a different instance of SQL
Server.
c. On the Configuration, Specify a web site for use with the Web console page,
select the Default Web Site, or the name of an existing website. Select Enable SSL
only if the website has been configured to use Secure Sockets Layer (SSL), and then
click Next.
d. On the Configuration, Select an authentication mode for use with the Web
console page, select your options, and then click Next.
8. On the Configuration, Configure Operations Manager accounts page, we
recommend that you use the Domain Account option for the System Center
Configuration service and System Center Data Access service accounts. Enter the
credentials for a domain account in each box, and then click Next.
Important
If you receive a message about using the wrong version of SQL Server, or
experience a problem with the SQL Server Windows Management
Instrumentation (WMI) provider, you can resolve this. Open a Command Prompt
window by using the Run as administrator option. Then run the following
command, where <path> is the location of Microsoft SQL Server:
mofcomp.exe “<path>\Microsoft SQL Server\100\Shared\
sqlmgmproviderxpsp2up.mof”.
9. When the Ready to Upgrade page appears, review the upgrade summary, and then click
Upgrade.
Important
Use the /WebConsoleUseSSL parameter only if your website has Secure Sockets
Layer (SSL) activated. For a default web installation, specify Default Web Site
for the /WebSiteName parameter.
Note
If the web console reports to an unsupported or inaccessible root management
server, you must also pass the following parameter:
/ManagementServer:<servername>.
Important
The following commands assume that you specified the Local System for the
Data Access service (/UseLocalSystemDASAccount). To specify a domain\user
name for these accounts, you must provide the following parameters instead:
/DASAccountUser: <domain\username> /DASAccountPassword: <password>
See Also
Upgrading Agents in an Operations Manager 2007 R2 Single-Server Management Group
Checklist: Single-Server Upgrade (Simple)
Checklist: Single-Server Upgrade (Complex)
Important
For information about how upgrade works with AVIcode 5.7 agents and .NET Application
Performance Monitoring Agents, see Notes for AVIcode 5.7 Customers.
You should upgrade manually installed agents before you run upgrade on the management
group. Push-installed agents can be upgraded after you run upgrade on the management group.
You use the System Center 2012 – Operations Manager Operations console to upgrade push-
installed agents in a single-server management group.
For information about how to upgrade Windows agents and UNIX and Linux agents, see How to
Upgrade Agents from Operations Manager 2007 R2.
See Also
Upgrading Operations Manager 2007 R2 Agents in a Distributed Management Group
Important
Before you follow any of these procedures, make sure that you verify that the servers in
your Operations Manager 2007 R2 management group meet the minimum supported
configurations for System Center 2012 – Operations Manager. This will help you
determine whether you need to add any new servers to your management group before
you upgrade. For more information, see Supported Configurations for
System Center 2012 – Operations Manager.
The following topics describe how to perform the necessary steps in a distributed management
group upgrade. The specific upgrade path you take depends on your current environment. For
information on choosing an upgrade path, see Upgrade Path Checklists for Operations Manager.
How to Upgrade a Secondary Management Server from Operations Manager 2007 R2
How to Upgrade a Gateway Server from Operations Manager 2007 R2
Upgrading Operations Manager 2007 R2 Agents in a Distributed Management Group
How to Upgrade Agents from Operations Manager 2007 R2
How to Upgrade a Management Group from an Operations Manager 2007 R2 RMS
How to Upgrade a Management Group from an Operations Manager 2007 R2 Secondary
Management Server
How to Upgrade a Stand-Alone Operations Console from Operations Manager 2007 R2
How to Upgrade a Web Console from Operations Manager 2007 R2
How to Upgrade Reporting from Operations Manager 2007 R2
How to Upgrade an ACS Collector from Operations Manager 2007 R2
See Also
Checklist: Distributed Upgrade (Simple)
Checklist: Distributed Upgrade (Complex)
Distributed Upgrade (Complex) Process Flow Diagram
Single-Server and Distributed Upgrade (Simple) Process Flow Diagram
Upgrading a Single-Server Operations Manager 2007 R2 Environment
Note
If a web console exists on the secondary management server, it will be removed
instead of upgraded. You have to re-install the web console after you upgrade the
management group. For more information, see How to Install the Operations
Manager Web Console. To minimize downtime, you can install the Operations
Manager 2007 R2 web console on a stand-alone server.
3. On the Getting Started, System Center 2012 - Operations Manager Upgrade page,
click Next to proceed with the upgrade.
4. On the Getting Started, Select installation location page, accept the default value of
C:\Program Files\System Center 2012\Operations Manager, or type in a new location,
or browse to one. Then click Next.
5. On the Prerequisites page, review and address any warnings or errors that the
Prerequisites checker returns, and then click Verify Prerequisites Again to recheck the
system.
6. If the Prerequisites checker does not return any warnings or errors, the Prerequisites,
Proceed with Setup page appears. Click Next.
7. On the Configuration, Configure Operations Manager accounts page, we
recommend that you use the Domain Account option for the System Center
Configuration service and System Center Data Access service accounts.
Enter the credentials for a domain account, and then click Next.
8. Review the options on the Configuration, Ready To Upgrade page, and then click
Upgrade. The upgrade proceeds and displays the upgrade progress.
9. When the upgrade is finished, the Upgrade complete page appears. Click Close.
Upgrading a secondary management server is just one phase of the distributed upgrade
process. Upgrade is not completed until you have upgraded all of the other features in your
management group, and have run upgrade on the management group itself. The next step is
to upgrade any gateways.
Important
The following commands assume that you specified the Local System account
for the Data Access service (/UseLocalSystemDASAccount). To specify a domain\
user name for these accounts, you must provide the following parameters
instead.
/DASAccountUser: <domain\username> /DASAccountPassword: <password>
See Also
How to Upgrade a Gateway Server from Operations Manager 2007 R2
How to Upgrade Agents from Operations Manager 2007 R2
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
See Also
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
Important
For information about how upgrade works with AVIcode 5.7 agents and .NET Application
Performance Monitoring Agents, see Notes for AVIcode 5.7 Customers.
You should upgrade manually installed agents before you run upgrade on the secondary
management server. Push-installed agents can be upgraded after you run upgrade on the
secondary management server, before you upgrade the management group. You use the
Operations Manager 2007 R2 Operations console to upgrade push-installed agents in a
distributed topology.
When you move the push-installed agents to a secondary management server by using the
Operations console, they are placed in Pending Management, and you must approve the update
to upgrade the agents to System Center 2012 – Operations Manager.
For information about how to upgrade agents, see How to Upgrade Agents from Operations
Manager 2007 R2
See Also
Upgrading Agents in an Operations Manager 2007 R2 Single-Server Management Group
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
Note
If you attempt to upgrade a 32-bit agent that was installed on a 64-bit machine, the
upgrade of the agent will fail.
Note
If UAC is enabled, you must run the agent upgrade from an elevated command prompt.
Note
Information about upgraded agents might not appear in the Operations console for up to
60 minutes after performing the upgrade.
Upgrading Push-Installed Agents
To upgrade push-installed Windows agents by using the Operations console
1. If you are upgrading agents in a distributed management group or if you have added a
secondary management server, log on to the computer hosting the Operations Manager
2007 R2 Operations console. Use an account that is a member of the Operations
Manager Administrators role for the Operations Manager 2007 R2 management group.
If you are upgrading agents in a single-server management group, log on to the computer
hosting the Operations Manager Operations console by using an account that is a
member of the Operations Manager Administrators role.
2. In the Operations console, click Administration.
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box appears. In the Server name box,
type the name of the management server to which you want to connect.
3. In the Administration workspace, in the navigation pane under Device Management,
click Pending Management.
4. In the Pending Management pane, under Type: Agent Requires Update, right-click
each agent-managed computer listed, and then click Approve.
Warning
You should not approve more than 200 agents at one time.
5. In the Update Agents dialog box, enter the administrator account credentials, and then
click Update. The upgrade status is displayed in the Agent Management Task Status
dialog box.
6. When the upgrade is completed, click Close.
Note
If you upgrade manually installed agents that also run the AVIcode 5.7 agent (or
earlier versions of the AVICode agent), you must include the option: NOAPM=1
in the command. For more information, see Install Agent Using the Command
Line.
msiexec /i MOMAgent.msi /qn /l*v D:\logs\AgentUpgrade.log
Note
It can take up to one hour for the console to show the updated version of the
agent.
Note
If any UNIX or Linux agents are not upgraded to the System
Center 2012 – Operations Manager version, and a Run As account is configured
for a normal user account on the UNIX or Linux computer that uses sudo
elevation, the elevation fails under that circumstance. A normal user account
does not have root-level access or special permissions, but allows monitoring of
system processes and of performance data. For more information about
credentials and elevation, see Accessing UNIX and Linux Computers in
Operations Manager 2012.
2. Run the UNIX/Linux Upgrade Wizard. For more information, see Upgrading and
Uninstalling Agents on UNIX and Linux Computers.
Note
It can take up to one hour for the console to show the updated version of the
agent.
See Also
Upgrading Agents in an Operations Manager 2007 R2 Single-Server Management Group
Upgrading Operations Manager 2007 R2 Agents in a Distributed Management Group
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
Important
The Operations Manager data warehouse will be added if it does not already
exist.
4. On the Getting Started, Please read the license terms page, review the license terms
and select the option I have read, understood, and agree with the license terms, and
then click Next.
5. On the Select installation location page, accept the default value of C:\Program Files\
System Center 2012\Operations Manager, or type in a new location or browse to one.
Then click Next.
6. On the Prerequisites page, review and address any warnings or errors that the
Prerequisites checker returns, and then click Verify Prerequisites Again to recheck the
system.
Note
SQL Server Full Text Search must be enabled. For more information, see Full-
text Search Overview.
7. If the Prerequisites checker does not return any warnings or errors, the Prerequisites,
Proceed with Setup page appears. Click Next.
8. If a data warehouse was not already installed, it is created, and you must configure it as
follows:
a. In the Configuration, Configure the data warehouse database page, type the
name and instance of the SQL Server database server for the database server that
will host the System Center 2012 – Operations Manager data warehouse database in
the Server name and instance name box.
b. Accept the default value of Create a new data warehouse database or select an
existing data warehouse.
c. In the Database name, Database size (MB) Data file folder, and Log file folder
boxes, we recommend that you accept the default values. Click Next.
Note
These paths do not change if you connect to a different instance of SQL
Server.
9. On the Configuration, Configure Operations Manager accounts page, we
recommend that you use the Domain Account option for the System Center
Configuration service and System Center Data Access service accounts. Before the
account is validated, an error icon appears to the left of the Domain\Username box.
10. Enter the credentials for a domain account in each box. The error icons disappear after
account validation. Click Next.
11. On the Configuration, Ready To Upgrade page, click Upgrade.
12. When the upgrade is finished, the Upgrade complete page appears. Click Close.
Important
The following commands assume that you specified the Local System account
for the Data Access service (/UseLocalSystemDASAccount). To specify a domain\
user name for these accounts, you must provide the following parameters
instead.
/DASAccountUser: <domain\username> /DASAccountPassword: <password>
See Also
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
Important
If you have a clustered Operations Manager 2007 R2 RMS, you might receive an error
during the prerequisite check that indicates that the root management server still has
devices reporting to it, even if you have moved the agents to a secondary management
server. To resolve this, open the Operations console, and select the Administration
workspace. In Device Management, select Agentless Managed. Right-click the
agentless nodes, and then click Delete.
Note
Before you follow any of these procedures, make sure that you verify that the servers in
your Operations Manager 2007 R2 management group meet the minimum supported
configurations for System Center 2012 – Operations Manager. This will help you
determine whether you need to add any new servers to your management group before
you upgrade. For more information, see Supported Configurations for
System Center 2012 – Operations Manager.
You should first upgrade other features, such as secondary management servers, agents, and
gateways before running the final upgrade on the management group. If you have more than one
secondary management server in your management group, we recommend that you upgrade
from the secondary management server that has the simplest configuration. For example, if you
have a management server that does not have any gateways, agents, or network devices, run
upgrade from that management server. For more information about each upgrade path and the
order in which to perform each upgrade task, see Upgrade Path Checklists for Operations
Manager.
If the computer hosting the RMS meets the minimum supported configurations, you can run
upgrade on that server. For more information, see How to Upgrade a Management Group from an
Operations Manager 2007 R2 RMS.
When you run upgrade from the secondary management server, the management server is
marked as the RMS emulator, and the unsupported RMS is removed from the management
group. The RMS emulator enables legacy management packs that rely on the RMS to continue to
function in System Center 2012 – Operations Manager.
Important
You must restore the encryption key on the secondary management server before you
attempt to upgrade the management group. For more information, see Restore the
Encryption Key on the Secondary Management Server
Important
The Operations Manager data warehouse is added if it does not already exist.
The Operations Manager 2007 R2 root management server is removed from the
management group.
6. On the Getting Started, Please read the license terms page, review the license terms
and select the option I have read, understood, and agree with the license terms, and
then click Next.
7. On the Prerequisites page, review and address any warnings or errors that the
Prerequisites checker returns, and then click Verify Prerequisites Again to recheck the
system.
Important
If there are any issues with the upgrade, such as having agents still reporting to
the RMS, the Prerequisites page appears with information about the issue and
how to resolve it.
8. If the Prerequisites checker does not return any warnings or errors the Prerequisites,
Proceed with Setup page appears. Click Next.
9. If a data warehouse was not already installed, it is created, and you must configure it as
follows:
a. In the Configuration, Configure the data warehouse database page, type the
name and instance of the SQL Server database server that will host the Operations
Manager data warehouse database in the Server name and instance name box.
b. Accept the default value of Create a new data warehouse database.
c. In the Database name, Database size (MB) Data file folder, and Log file folder
boxes, we recommend that you accept the default values. Click Next.
Note
These paths do not change if you connect to a different instance of SQL
Server.
10. On the Configuration, Configure Operations Manager accounts page, we
recommend that you use the Domain Account option for the System Center
Configuration service and System Center Data Access service accounts, the Data
Reader account and Data Writer account. Before the account is validated, an error icon
appears to the left of the Domain\Username box.
11. Enter the credentials for a domain account in each box. The error icons disappear after
account validation. Click Next.
12. If Windows Update is not enabled on the computer, the Configuration, Microsoft
Update page appears. Select your options, and then click Next.
13. Review the options on the Configuration, Ready to Upgrade page, and then click
Upgrade.
14. When the upgrade is finished, the Upgrade complete page appears. Click Close.
Important
The following commands assume that you specified the Local System account
for the Data Access service (/UseLocalSystemDASAccount). To specify a domain\
user name for these accounts, you must provide the following parameters
instead:
/DASAccountUser: <domain\username> /DASAccountPassword: <password>
See Also
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
Important
If you have a Reporting server installed on a root management server (RMS) that does
not meet the supported configuration for System Center 2012 – Operations Manager, you
will not be able to upgrade it. Instead, you can install a System Center 2012 – Operations
Manager Reporting server after you have upgraded your management group.
The following list provides links to optional features you can upgrade.
How to Upgrade a Stand-Alone Operations Console from Operations Manager 2007 R2
How to Upgrade a Web Console from Operations Manager 2007 R2
How to Upgrade Reporting from Operations Manager 2007 R2
How to Upgrade an ACS Collector from Operations Manager 2007 R2
The following list provides links to optional features you can install.
How to Install the Operations Console
How to Install the Operations Manager Web Console
How to Install the Operations Manager Reporting Server
How to Deploy ACS on a Secondary Management Server
Caution
Incorrectly editing the registry can severely damage your system. Before you
make changes to the registry, you should back up any valued data that is on the
computer.
3. Browse to the HKey_Local_Machine\Software\Microsoft\Microsoft Operations
Manager\3.0\Setup key. If the value of the UIVersion entry is 7.0.85##.#, where # is any
positive integer, the Operations console was upgraded successfully.
See Also
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
Note
When you upgrade the web console, any customizations that were made to the
web.config file after the web console was installed will be reset.
For more information about each upgrade path and the order in which to perform each upgrade
task, see Upgrade Path Checklists for Operations Manager.
Before you proceed, ensure that your server meets the minimum supported configurations for
System Center 2012 – Operations Manager. For more information, see Supported Configurations
for System Center 2012 – Operations Manager.
To upgrade the web console server by using the Command Prompt window
1. Log on to the computer that hosts the web console server with an Operations Manager
Administrators role account for your Operations Manager 2007 R2 management group.
2. Open a Command Prompt window by using the Run as Administrator option.
3. Change the path to where the System Center 2012 – Operations Manager Setup.exe file
is located, and run the following command.
Important
Use the /WebConsoleUseSSL parameter only if your website has Secure Sockets
Layer (SSL) activated. For a default web installation, specify Default Web Site
for the /WebSiteName parameter.
Note
If the web console reports to an unsupported or inaccessible root management
server, you must also pass the following parameter:
/ManagementServer:<servername>.
See Also
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
Important
If you upgraded your management group from the RMS, then you do not have to
manually update the configuration file for the Reporting server.
1. On computer that hosts the Reporting server you plan to upgrade, open the
rsreportserver.config file using Notepad. The path is typically C:\Program Files\
Microsoft SQL Server\MSRS10.MSSQLServer\Reporting Services\ReportServer,
where MSSQLServer is the name of the SQL Server instance.
2. From the Edit menu, click Find. Search for <ServerName>.
Note
The <ServerName> element appears in two places in the configuration file, in the
Security Extension and in the Authentication Extension.
3. Replace the name of the management server from the old RMS name, with the name of
an upgraded management server.
4. Search for <ServerName> again, and update the server name.
5. Save and close the configuration file.
6. If the Setup wizard is open, you should close it and restart the upgrade process.
1. Log on to the computer that hosts the Reporting server with an account that is a member
of the Operations Manager 2007 R2 Administrators role for your Operations Manager
2007 R2 management group.
2. On the System Center 2012 – Operations Manager source media, run Setup.exe, and
then click Install.
3. On the Getting Started, System Center 2012 - Operations Manager Upgrade page,
review the features that will be upgraded. In this case, it is Operations Manager 2007 R2
Reporting. Click Next.
4. On the Select installation location page, accept the default value of C:\Program Files\
System Center 2012\Operations Manager, or type in a new location or browse to one.
Then click Next.
5. On the Prerequisites page, review and address any warnings or errors that the
Prerequisites checker returns, and then click Verify Prerequisites Again to recheck the
system.
6. If the Prerequisites checker does not return any warnings or errors, the Prerequisites,
Proceed with Setup page appears. Click Next.
7. If the root management server has not been upgraded or is unavailable, the
Configuration, Specify a management server page appears. Enter the name of a
System Center 2012 – Operations Manager management server that is to be used by the
Reporting server, and then click Next.
8. On the Ready to Upgrade page, review the options, and then click Upgrade.
9. When upgrade is finished, the Upgrade complete page appears. Click Close.
Note
If the Reporting server reports to an unsupported or inaccessible root
management server, you must also pass the following parameter:
/ManagementServer: <ManagementServerName>.
See Also
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
Note
A computer that hosts an ACS Collector must also be an Operations Manager
management server or gateway server. You must upgrade the management servers
before you upgrade the ACS Collector. For more information about each upgrade path
and the order in which to perform each upgrade task, see Upgrade Path Checklists for
Operations Manager.
Before you proceed, ensure that your server meets the minimum supported configurations for
System Center 2012 – Operations Manager. For more information, see Supported Configurations
for System Center 2012 - Operations Manager.
Note
If you select SQL Server Authentication and click Next, the Database
Credentials page appears. Enter the name of the user account that has access
to the SQL Server in the SQL login name box and the password for that
account in the SQL password password box, and then click Next.
10. The Summary page displays a list of actions that the installation program will perform to
upgrade ACS. Review the list, and then click Next to begin the installation.
Note
If a SQL Server Login dialog box appears and the database authentication is set
to Windows Authentication, select the correct database, and then verify that
the Use Trusted Connection check box is selected. Otherwise, clear it, enter the
SQL Server login name and password, and then click OK.
11. When the upgrade is finished, click Finish.
See Also
Upgrading a Distributed Operations Manager 2007 R2 Environment
Upgrade Path Checklists for Operations Manager
Post-Upgrade Tasks
The following table shows the tasks that you need to complete after you have upgraded to
System Center 2012 – Operations Manager. It also indicates when to perform the task.
Re-enable the Notification Subscriptions After you complete the upgrade tasks in any
upgrade path.
Restart or Re-enable the Connector Services After you complete the upgrade tasks in any
upgrade path, and only if the connector
services are installed.
Uninstall the Old RMS Only if you upgrade the management group on
the secondary management server.
Update the Run As Accounts After you upgrade the distributed management
group.
Verify That the Upgrade Was Successful After you complete the upgrade tasks in any
upgrade path.
Task When to the Perform Task
Run SQL Query on each Management Group Run SQL query on each management group to
clean up the Localizedtext table and the
Publishmessage table.
Assign UNIX/Linux Agents to a Resource Pool After you complete the upgrade tasks in any
upgrade path.
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box appears. In the Server name text box,
type the name of the System Center 2012 – Operations Manager management
server to which you want to connect.
3. In the Administration pane, under Notifications, click Subscriptions.
4. In the Actions pane, click Enable for each subscription listed.
Note
If you upgraded from the secondary management server, you can build a new
management server with the same Windows computer name as the old RMS, rather than
change the configuration settings to point to the new management server.
Update Overrides
If you created any overrides for the Active Directory Integration rules, you must recreate them
after the management group upgrade is complete. Delete the old override, and then create a new,
matching override that targets the Active Directory Assignment Resource Pools.
Verify That the Upgrade Was Successful
Perform the following tasks to verify that the upgrade was successful.
Check the health state of the management servers and agents in the Health Service Watcher
state view. In the Administration workspace of the Operations console, ensure that the
management servers and agents are healthy. In the Monitoring workspace, check if there
are any alerts related to the management group health.
Review the event logs of all the management servers for new errors.
Sort alerts by the last-modified column to review the new alerts.
Check the CPU utilization and disk I/O on your database servers to ensure that they are
functioning normally.
If the Reporting feature is installed, click Reporting, and then run a generic performance
report to ensure that Reporting is functioning correctly.
Re-deploy any agents that you uninstalled during the upgrade process.
-- Create a temporary table to quickly find a PublisherId when you know the MessageId.
BEGIN TRY
MessageId INT)
CREATE CLUSTERED INDEX #PublisherMessageReverseIndex_CI ON
#PublisherMessageReverseIndex(MessageStringId)
FROM dbo.PublisherMessages
-- Create a temporary table of message lengths, message IDs, and message hashes with the
LTValueLen INT,
LTValueHash VARBINARY(32),
-- Create a temporary table for the orphaned PublisherStrings that you find. Orphaned
PublisherStrings
-- are rows in PublisherMessages whose corresponding events have already been groomed.
They still
-- have corresponding rows in LocalizedText. Do not add rows for PublisherMessages; they
are not
MessageStringId UNIQUEIDENTIFIER)
-- Create a temporary table so that you can determine whether a PublisherMessages row
still
-- has a corresponding event. These events do not have an index on the PublisherId, so do
-- not query the EventAllView. If a PublisherId occurs multiple times in the event tables,
-- it is only needed one time in the temp table; therefore, the unique clustered index
-- must contain IGNORE_DUP_KEY. This keeps the temporary table relatively small and saves
SELECT PublisherId
FROM EventAllView
-- Populate the first temporary table to determine which messages are duplicated.
FROM dbo.LocalizedText LT
MessageId INT,
LTValueHash VARBINARY(32),
MsgCount INT)
-- Populate second message for duplicate message detection by scanning the INDEX of
FROM #LTHashStrings
-- You are now set up to detect both orphaned PublisherStrings and duplicated messages
-- by joining to our relatively small (and correctly indexed) temporary tables.
FROM dbo.PublisherMessages PM
LTC.MsgCount > 1
-- Deleting all the OrphanedPublisherStrings and all the corresponding LocalizedText rows
-- at one time may be too large for the transaction log to handle. Create a numbered
-- or ordered table so that you can delete them in relatively small batches and not
PublisherId UNIQUEIDENTIFIER,
MessageStringId UNIQUEIDENTIFIER)
END TRY
BEGIN CATCH
GOTO Error
END CATCH
-- If the transaction log fills up, try to reduce the @OrphanIncrement value,
-- which controls the number of rows that are delete at the same time.
SET @OrphanNum = 0
BEGIN TRY
BEGIN
ON LT.LTStringId = OPS.MessageStringId
ON PM.PublisherId = OPS.PublisherId
END
END TRY
BEGIN CATCH
GOTO Error
END CATCH
Error:
IF @@ERROR <> 0
SELECT
ERROR_NUMBER() AS ErrorNumber,
ERROR_MESSAGE() AS ErrorMessage;
BEGIN TRY
END TRY
BEGIN CATCH
SELECT
ERROR_NUMBER() AS ErrorNumber,
ERROR_MESSAGE() AS ErrorMessage;
END CATCH
1. Open the Operations console by using an account that is a member of the Operations
Manager Administrators role for the om12short management group.
2. In the Operations console, in the navigation pane, click the Administration button.
3. In the Administration pane, under Device Management, click UNIX/Linux Computers.
4. Select the UNIX/Linux computers to assign to a resource pool, and in the Actions pane,
click Change Resource Pool.
5. Complete the Change Resource Pool wizard to assign the computers to the selected
resource pool.
Upgrading to System Center 2012 - Operations Manager by
Using the Command Prompt Window
You can upgrade to System Center 2012 – Operations Manager by using the setup.exe
command in the Command Prompt window. Gateway and agent upgrades require the use of
MOMGateway.msi and MOMAgent.msi. For information about supported configuration
requirements of System Center 2012 – Operations Manager, see Supported Configurations for
System Center 2012 – Operations Manager.
Note
If the parameter contains a colon, a value is required. Otherwise, it is simply a switch.
Parameter Value
For examples of command lines for upgrading the various features of Operations Manager 2007
R2 to System Center 2012 – Operations Manager, see the following:
How to Upgrade an Operations Manager 2007 R2 Single-Server Management Group
Upgrading Agents in an Operations Manager 2007 R2 Single-Server Management Group
How to Upgrade a Secondary Management Server from Operations Manager 2007 R2
How to Upgrade a Gateway Server from Operations Manager 2007 R2
How to Upgrade Agents from Operations Manager 2007 R2
How to Upgrade a Management Group from an Operations Manager 2007 R2 RMS
How to Upgrade a Management Group from an Operations Manager 2007 R2 Secondary
Management Server
How to Upgrade a Stand-Alone Operations Console from Operations Manager 2007 R2
How to Upgrade a Web Console from Operations Manager 2007 R2
How to Upgrade Reporting from Operations Manager 2007 R2
Note
Before reading this section, be sure to review Planning the System Center 2012 -
Operations Manager Deployment to understand the components of Operations Manager
and to learn how to prepare for failure recovery.
Decide on the following issues:
What to back up
How often to back up
Whether to perform complete or incremental backups
How and when to practice restore procedures
After you decide what the best backup strategies for your System Center 2012 – Operations
Manager environment, develop and document a backup plan to become part of the overall
disaster recovery plan.
We strongly recommend that you test your backup and restore procedures thoroughly. Testing
helps ensure that you have the required backups to recover from various failures and that staff
can run the procedures smoothly and quickly if a failure occurs.
You can use a test environment including all the Operations Manager features to test your backup
and restore processes.
Note
The overall backup practices in your organization might include backing up the disk
drives that the Operations Manager is installed on. When backing up those disk drives,
including the management servers, ensure to exclude the <Installed Partition>\Program
Files\System Center 2012\Operations Manager\Server\Health Service State folder.
In This Section
Complete and Incremental Backups in Operations Manager
Backup File Naming Conventions in System Center 2012 - Operations Manager
Back Up System Center 2012 - Operations Manager
Note
By default, the report server database uses a full recovery model. Other Operations
Manager databases use a simple recovery model. For more information about backup
options, see Backup Overview (SQL Server).
Note
The data warehouse database uses a simple recovery model that truncates all
transactions after completion. This means that backing up the log file is insufficient.
Perform a complete database file backup.
For more information about recovery models, see Recovery Model Overview.
Data to Back Up
To ensure your ability to correctly preserve and restore your Operations Manager environment,
you should back up the following key items:
Operational database, data warehouse database, and the Audit Collection Services (ACS)
database
Custom management packs
Custom report definition files and computer certificates
Recommended Backup Schedule for System Center 2012 - Operations Manager
How to Back Up Custom Management Packs
How to Schedule Backups of System Center 2012 - Operations Manager Databases
Master database (Master) Every time, after installing and Per IT policies
configuring the Operations
Manager database features
and after making significant
changes to logons or other
security changes.
Msdb database (Msdbdata) After the initial installation and After changing the scheduled
configuration of the Operations Microsoft SQL Server Agent
Manager database features. jobs that Operations Manager
uses.
Important
The destination location must have enough available free disk space to store the
backup files based on the frequency of your backup schedule.
8. In the Script list, click Script Action to Job.
9. If you want to change job parameters, in the New Job dialog box, under Select a page,
click Steps, and then click Edit.
10. Under Select a page, click Schedules, and then click New.
11. In the New Job Schedule dialog box, type the job name in the Name box, specify the job
schedule, and then click OK.
Note
If you want to configure alerts or notifications, you can click Alerts or
Notifications under Select a page.
12. Click OK and OK.
Operational Database
The operational database contains almost all of the System Center 2012 – Operations Manager
environment configuration settings, agent information, management packs with customizations,
operations data, and other data required for Operations Manager to operate correctly.
Important
It is critical that you back up the operational database regularly to preserve the latest
information about your Operations Manager environment. A database failure without a
recent backup results in the loss of almost all Operations Manager-specific data, and you
would have to rebuild the entire Operations Manager environment.
Note
If your backup procedure sets the operational database to be offline during backup,
Operations Manager caches incoming data, and then, after backup is completed,
Operations Manager stores that data in the database.
Reporting Databases
Operations Manager Reporting uses the following databases:
Operations Manager data warehouse (data warehouse database)
SQL Server Reporting Services databases (ReportServer and ReportServerTempDB)
The data warehouse database contains all of the performance and other operational data from
your Operations Manager environment. SQL Server Reporting Services then uses this data to
generate reports such as trend analysis and performance tracking.
To be able to restore reporting functionality in case of failure, it is critical that you back up the data
warehouse database. When determining how often and when to back up this database, you
should consider the following:
This database can grow to a very large size (more than one terabyte) over time.
Management servers frequently write data to this database.
IT SLA requirements are based on the requirement for reporting availability in the
organization.
Note
The data warehouse database uses a simple recovery model, which truncates all
transactions after completion. Therefore, backing up only the log file is insufficient; you
must back up the entire database.
The SQL Server Reporting Services databases store report definitions, report metadata, cached
reports, and snapshots. In case of failure, you can re-create report definitions by re-importing the
reports. However, cached reports, which are reports that have already been created, will be lost.
To be able to restore reporting functionality in case of failure, we recommend that you back up the
SQL Server Reporting Services databases.
ACS Database
The Audit Collection Services (ACS) database, OperationsManagerAC, is the central repository
for events and security logs that are collected by ACS forwarders on monitored computers.
The Audit Collection Services database can grow significantly depending on how many ACS
forwarders send events to the ACS database and the filters configured to control what events are
written to the database.
Master Database
The master database is a system database, which records all of the system-level information for
a Microsoft SQL Server system, including the location of the database files. It also records all
logon accounts and system configuration settings. The appropriate functionality of the master
database is key to the operation of all of the databases in an instance of SQL Server.
MSDB Database
The MSDB database, Msdbdata, is a SQL Server system database, which is used by the
SQL Server agent to schedule jobs and alerts and for recording operators. The appropriate
functionality of the MSDB database is key to the operation of all the databases in an instance of
SQL Server.
Note
This database contains task schedules that are vital to the health of the Operations
Manager database, and it should be included in your backup plan. You have to back up
this database only after you configure Operations Manager or if you change the
scheduled agent jobs.
Note
This process only recovers the management server. If consoles or Reporting
were also installed on the failed management server, you must reinstall them
after recovery is complete.
Important
You must use the same parameter values for account credentials, management
group, and database names as the failed server you are trying to recover.
Important
The following command assumes that you specified the Local System for the
Management server action account (/UseLocalSystemActionAccount) and Data
Access service (/UseLocalSystemDASAccount). To specify a domain\user name for
these accounts, you must provide the following parameters instead.
/ActionAccountUser: <domain\username> /ActionAccountPassword: <password>
For information about the command-line parameters, see Disaster Recovery Command-line
Parameters.
If you have to recover a management server when all management servers in the management
group have failed, then you must also reconfigure the RunAs Accounts.
Important
If you have management servers that have not failed, you should not reconfigure the
RunAs Accounts.
Note
If you are not using SQL Server authentication, you can remove any associations
to the Data Warehouse SQL Server Authentication Account and Reporting
SDK SQL Server Authentication Account and then delete these accounts.
If you are not using SQL Server authentication, you can remove the SQL Server Authentication
accounts.
See Also
Backup and Disaster Recovery in Operations Manager
Disaster Recovery Command-line Parameters
Note
If the parameter contains a colon, a value is required. Otherwise, it is simply a switch.
Parameter Value
See Also
Disaster Recovery in System Center 2012 - Operations Manager
Note
If you want to resize the operational database, you must resize it by using SQL Server.
For more information, see Microsoft SQL Server in the TechNet Library.
See Also
Maintaining the System Center 2012 - Operations Manager Infrastructure
Action Accounts
The Operations Manager management server, gateway server, and agent, all contain a process
called MonitoringHost.exe. MonitoringHost.exe is used to accomplish monitoring activities, such
as running a monitor or a task. For example, when an agent subscribes to the event log to read
events, it is the MonitoringHost.exe process that runs those activities. The account that a
MonitoringHost.exe process runs as is called the action account. The action account for the
MonitoringHost.exe process that is running on an agent is called the agent action account. The
action account used by the MonitoringHost.exe process on a management server is called the
management server action account. The action account used by the MonitoringHost.exe process
on a gateway server is called the gateway server action account.
When you validate or change the default action account, you must ensure that the account you
are using for your default Action Account is configured to be a Role member of the
ConfigServiceMonitoringUsers database role.
Service Accounts
The set of credentials of the System Center Configuration service and System Center Data
Access service account is used by the System Center Data Access service and System Center
Management Configuration service to update and read information in the operational database.
Operations Manager ensures that the credentials used for the Data Access Services (DAS)
service account are assigned to the Sdk_user role in the operational database. The System
Center Configuration service and System Center Data Access service account can be configured
as either a Local System account or as a domain account. A local User account is not supported.
If the management server and the operational database are on different computers, the System
Center Configuration service and System Center Data Access account have to be changed to a
domain account. For better security, we recommend that you use an account different from the
one used for the management server action account. To change these accounts, see How to
Change Credentials for the System Center Management Configuration service and System
Center Data Access service.
Note
For information about supported configurations for System Center 2012 – Operations
Manager, see Supported Configurations for Operations Manager for System Center
2012.
If you change the password for the credentials that you entered for the Data Warehouse Write
account, you have to make the same password changes for the following accounts:
Run As account called Data Warehouse Action account
Run As account called Data Warehouse Configuration Synchronization Reader account
Note
For information about supported configurations for System Center 2012 – Operations
Manager, see Supported Configurations for Operations Manager for System Center
2012.
If you change the password for the credentials that you entered for the Data Reader account, you
have to make the same password changes for the following accounts:
Report Server Execution Account
The SQL Server Reporting Services service account on the computer that is hosting SQL
Server Reporting Services (SSRS)
The IIS ReportServer$<INSTANCE> Application Pool account
Run As account called Data Warehouse Report Deployment account
Account Information
How to Change the Credentials for the Action Account
How to Change Credentials for the System Center Management Configuration service and
System Center Data Access service
How to Change IIS ReportServer Application Pool Account Password
How to Change the Reporting Server Execution Account Password
How to Change the Windows Service Account Password for the SQL Server Reporting
Service
How to Change the Run As Account Associated with a Run As Profile
See Also
Making Changes to an Operations Manager Environment
How to Change Credentials for the System Center Management Configuration service and
System Center Data Access service
How to Change Credentials for the System Center Management Configuration service and
System Center Data Access service
During the installation of System Center 2012 – Operations Manager, you are prompted for
credentials for the System Center Configuration service and System Center Data Access service.
If you want to change the password for the credentials that you provided or use a different set of
credentials, use the following procedure.
Note
The same credentials must be used for both services.
To change credentials or password for the System Center Configuration service and
System Center Data Access service
1. On the computer hosting the management server, on the Windows desktop, click Start,
and then click Run.
2. In the Run dialog box, type services.msc, and then click OK.
3. In the list of services, right-click System Center Data Access Service, and then click
Properties.
4. In the System Center Data Access Properties dialog box, click the Log On tab.
5. Enter new credentials or change the password of the existing credentials, and then click
OK.
6. In the list of services, right-click System Center Management Configuration, and then
click Properties.
7. In the System Center Management Configuration Properties dialog box, click the Log
On tab.
8. Enter new credentials or change the password of the existing credentials, and then click
OK.
9. Stop and restart both the System Center Data Access service and System Center
Management Configuration service.
See Also
Making Changes to an Operations Manager Environment
How to Change the Credentials for the Action Account
See Also
Account Information for Operations Manager
How to Change the Reporting Server Execution Account Password
How to Change the Windows Service Account Password for the SQL Server Reporting Service
How to Change the Reporting Server Execution Account Password
If the password changes for the account that you specified as the Data Reader Account during
the setup of the Reporting server, use the following procedure to change the Execution account
password on the Reporting server.
See Also
Account Information for Operations Manager
How to Change IIS ReportServer Application Pool Account Password
How to Change the Windows Service Account Password for the SQL Server Reporting Service
How to Change the Windows Service Account Password for the SQL Server Reporting
Service
If the password changes for the account that you specified as the Data Reader account during
the setup of the Reporting server, use the following procedure to change the Windows service
account for the SQL Server Reporting Services password on the computer running SQL Server
Reporting Services (SSRS).
To change the Windows service account for the SQL Server Reporting Services
1. On the computer running SQL Server Reporting Services, on the Windows desktop, click
Start, point to Settings, and then click Run.
2. In the Run dialog box, type services.msc, and then click OK.
3. In Services, scroll down the list, right-click SQL Server Reporting Services
(<INSTANCE>), and then click Properties.
4. In the SQL Server Reporting Services (<INSTANCE>) Properties dialog box, click
Log On.
5. In the Password and Confirm Password boxes, type the new password, and then click
OK.
6. Close Services, and then close Administrative Tools.
See Also
Account Information for Operations Manager
How to Change IIS ReportServer Application Pool Account Password
How to Change the Reporting Server Execution Account Password
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box appears. In the Server name box,
type the name of the Operations Manager management server that you want the
Operations console to connect to.
3. In the Administration pane, expand Administration, expand Security, and then click
Run As Profiles.
4. In the Run As profiles pane, right-click Data Warehouse SQL Server Authentication
Account, and then click Properties.
5. In the Run As Profile - Data Warehouse SQL Server Authentication Account dialog
box, and then click the Run As Accounts tab.
6. Under Run As Accounts, click the targeted computer, and then click Edit.
7. In the Edit Alternate Run As Account dialog box, click the Run As Account list, select
the new Run As account that you want to associate with this Run As profile, and then
click OK.
8. In the Run As Profile - Data Warehouse SQL Server Authentication Account dialog
box, click OK.
See Also
Account Information for Operations Manager
Note
When you uninstall a stand-alone feature, the name that appears in Program
and Features reflects the name of the feature.
4. On the Getting Started, What do you want to do? page, click Remove a feature. The
Setup Wizard then identifies and lists all the features and roles that are installed on the
local computer.
5. Select the features that you want to remove, and then click Uninstall.
6. On the Complete, Component removal is complete page, click Close.
See Also
Making Changes to an Operations Manager Environment
See Also
Making Changes to an Operations Manager Environment
Note
Before editing the registry, follow your organization’s backup policies with regard
to the registry.
a. Log on to the management server with Administrator permissions.
b. Click Start, select Run, type regedit in the Open box, and then click OK to start
Registry Editor.
c. Under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\System Center\2010\
Common\Database, double-click the name DatabaseServerName, and then
change the value to the hostname of the SQL Server-based computer now hosting
the operational database, and then click OK to save your change.
Note
If you are using a named instance of SQL Server, be sure to use the
ServerName\Instance name format.
In the <Category> tag named “Cmdb”, change the value for ServerName to the name of the
new SQL server.
8. Update the operational database with the new database server name.
a. Open SQL Server Management Studio.
b. Expand Databases, OperationsManager, and Tables.
c. Right-click dbo. MT_Microsoft$SystemCenter$ManagementGroup , and then click
Edit Top 200 Rows.
d. Change the value in the
SQLServerName_6B1D1BE8_EBB4_B425_08DC_2385C5930B04 column to
reflect the name of the new SQL Server-based computer.
e. Save the change.
9. On the new server hosting the operational database, expand Security, then expand
Logins, and then add the data writer account.
For more information, see How to: Create a SQL Server Login.
10. Also in Logins, add the action account.
11. Also in Logins, add the Data Access Service (DAS) computer account, using the form
“domain\computername$”.
12. For the DAS computer account, add the following user mappings:
ConfigService
db_accessadmin
db_datareader
db_datawriter
db_ddladmin
db_securityadmin
sdk_users
sql_dependency_subscriber
Note
If an account has not existed before in the SQL instance in which you are adding
it, the mapping will be picked up by SID automatically from the restored
operations database. If the account has existed in that SQL instance before, you
receive an error indicating failure for that login, although the account appears in
Logins. If you are creating a new login, ensure the User Mapping for that login
and database are set to the same values as the previous login:
DW Data Writer: apm_datareader, apm_datawriter, db_datareader,
dwsynch_users
Action account: db_datareader, db_datawriter, db_ddladmin, dbmodule_users
DAS/Configuration account: ConfigService, db_accessadmin, db_datareader,
db_datawriter, db_ddladmin, db_securityadmin, sdk_users,
sql_dependency_subscriber
If DAS/Configuration uses the LocalSystem account, specify computer account in
form <domain>\<computername>$.
13. Execute the following SQL commands on new Operations database instance:
sp_configure ‘show advanced options’,1
reconfigure
sp_configure ‘clr enabled’,1
reconfigure
14. Run the following SQL query:
SELECT is_broker_enabled FROM sys.databases WHERE
name='OperationsManager'
15. If the result of the preceding query was an is_broker_enabled value of 1, skip this step.
Otherwise, run the following SQL queries:
ALTER DATABASE OperationsManager SET SINGLE_USER WITH ROLLBACK
IMMEDIATE
ALTER DATABASE OperationsManager SET ENABLE_BROKER
ALTER DATABASE OperationsManager SET MULTI_USER
16. Start the Operations Manager services (System Center Data Access, System Center
Management, and System Center Management Configuration) on all the management
servers in the management group.
See Also
Making Changes to an Operations Manager Environment
How to Move the Data Warehouse Database
Caution
This procedure can result in data loss if it is not performed correctly and within a
reasonable length of time of the failure. Ensure that you follow all steps precisely, without
unnecessary delays between the steps.
This procedure requires Microsoft SQL Server configuration. You need to back up a database,
restore a database, update a database table, add new Logins, and modify User Mapping settings
for Logins. For more information, see SQL Server documentation.
Note
Before editing the registry, follow your organization’s backup policies with regard
to the registry.
a. Log on to the management server with Administrator permissions.
b. Click Start, select Run, type regedit in the Open box, and then click OK to start
Registry Editor.
c. Under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Operations
Manager\3.0\Reporting, double-click the name DefaultSDKServiceMachine, and
then change the value to the hostname of the SQL Server-based computer now
hosting the operational database, and then click OK to save your change.
d. Double-click the name DWDBInstance, and then change the value to the hostname
of the SQL Server-based computer now hosting the operational database, and then
click OK to save your change.
e. Close the Registry Editor.
7. Start the System Center Data Access Service on the management server associated with
the reporting server.
8. On the management server associated with the reporting server, change the connection
string.
a. Open a browser and go to the reporting webpage,
http://localhost/reports_instancename.
b. Click Show Details and then click Data Warehouse Main.
c. Change the Connection String to contain the new data warehouse server name,
and then click Apply.
d. Close the browser.
9. On the server hosting the operational database, update the OperationsManager
database table.
a. Open SQL Server Management Studio.
b. Expand Databases, OperationsManager, and Tables.
c. Right-click dbo. MT_Microsoft$SystemCenter$DataWarehouse, and then click
Edit Top 200 Rows.
d. Change the value in the
MainDatabaseServerName_2C77AA48_DB0A_5D69_F8FF_20E48F3AED0F
column to reflect the name of the new SQL Server.
e. Close SQL Server Management Studio.
10. On the new data warehouse server, update the member database.
a. Open SQL Server Management Studio.
b. Expand Databases, OperationsManagerDW, and Tables.
c. Right-click dbo. MemberDatabase, and then click Edit Top 200 Rows.
d. Change the value in the ServerName column to reflect the name of the new SQL
Server.
e. Close SQL Server Management Studio.
11. On the new server hosting the operational database, expand Security, then expand
Logins, and then add the data writer account.
For more information, see How to: Create a SQL Server Login.
12. Also in Logins, add the data reader account.
13. Also in Logins, add the Data Access Service computer account, using the form “domain\
computername$”.
14. For the Data Access Service (DAS) computer account, add the following user mappings:
db_datareader
OpsMgrReader
apm_datareader
Note
If an account has not existed before in the SQL instance in which you are adding
it, the mapping will be picked up by SID automatically from the restored data
warehouse database. If the account has existed in that SQL instance before, you
receive an error indicating failure for that login, although the account appears in
Logins. If you are creating a new login, ensure the User Mapping for that login
and database are set to the same values as the previous login:
DW Data Writer: db_owner, OpsMgrWriter, apm_datareader, apm_datawriter
DW Data Reader: db_datareader, OpsMgrReader, apm_datareader
DAS/Config account: db_datareader, OpsMgrReader, apm_datareader
If DAS/Config uses the LocalSystem account, specify computer account in form
“<domain>\<computername>$”.
15. Start the Operations Manager services (System Center Management, System Center
Data Access, and System Center Management Configuration) on all the management
servers in the management group.
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box appears. In the Server name box,
type the name of the Operations Manager management server that you want the
Operations console to connect to.
3. In the Administration pane, click Management Servers.
4. Right-click the desired management server, and then click Delete.
5. In the Confirm Delete Management Server dialog box, click Yes.
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box appears. In the Server name box,
type the name of the Operations Manager management server that you want the
Operations console to connect to.
3. In the Administration pane, expand Administration, expand Device Management, and
then click Agent Managed.
4. In the Agent Managed pane, select the computers for which you want to change the
primary management server, right-click them, and then select Change Primary
Management Server.
Note
The Change Primary Management Server option is unavailable if Active
Directory Domain Services was used to assign any of the selected computers to
the management group.
5. In the Change Management Server dialog box, select the desired management server
in the list, and then click OK. The change takes effect on the agent after its next update
interval.
If you are changing the primary management server for a Linux or UNIX computer, the certificate
that was used to access the Linux or UNIX computer must also be copied to the new
management server. You do not have to copy the certificate if you are changing the primary
management server for computers that are running Windows.
Configure a Network Device to Use a Different Operations Manager 2012 Proxy Agent
Use the following procedure to change the Operations Manager proxy agent for network devices.
The proxy agent can be any agent-managed computer in the management group. It must have
Simple Network Management Protocol (SNMP) installed, an optional Windows element, and be
able to connect to the devices that use SNMP.
Note
When you run the Operations console on a computer that is not a management
server, the Connect To Server dialog box appears. In the Server name box,
type the name of the Operations Manager management server that you want the
Operations console to connect to.
3. In the Administration pane, expand Administration, expand Device Management, and
then click Network Devices.
4. In the Network Devices pane, select the network devices for which you want to change
the proxy agent, right-click them, and then select Change Proxy Agent.
5. In the Change Proxy Agent dialog box, select the computer that you want to be the new
proxy agent, and then click OK.
Note
The Change Primary Management Server option will be unavailable if Active
Directory Domain Services was used to assign any of the selected computers to
the management group.
5. In the Change Management Server dialog box, select the new management server from
the list, and then click OK. The change takes effect on the agent after its next update
interval.
Alternatively, this configuration can be changed on the agent-managed computer itself using
either of the following two procedures.
1. Log on to the agent-managed computer with an account that is a member of the
Administrators security group for the computer.
2. In Add or Remove Programs, click Change for System Center Operations Manager
2012 Agent.
Note
The Agent Setup Wizard can also be run by double-clicking MOMAgent.msi,
which is located on the Operations Manager installation media.
3. In the System Center 2012 – Operations Manager Agent Setup Wizard, click Next.
4. On the Program Maintenance page, select Modify, and then click Next.
5. On the Management Group Configuration page, leave Specify Management Group
information selected, and then click Next.
6. In the next Management Group Configuration page, do the following:
a. Type the name of the Management Server.
b. Type in a value for Management Server Port, or leave the default 5723.
c. Click Next.
7. On the Ready to Install page, review the settings, and then click Install to display the
Installing the System Center 2012 - Operations Manager Agent page.
8. When the Completing the System Center 2012 - Operations Manager Agent Setup
wizard page displays, click Finish.
Note
Microsoft Windows Installer public properties must be uppercase, such as
PROPERTY=value. For more information about Windows Installer, see Windows
Installer in the Microsoft Developer Network library.
If the Domain Name System (DNS) and Active Directory names for the
management server differ, the MANAGEMENT_SERVER_AD_NAME property
also needs to be set to the fully qualified Active Directory Domain Services name.
To change the proxy agent for agentless-managed computers and network devices
1. Log on to a management server computer with an account that is a member of the
Operations Manager Administrators role for the Operations Manager management group.
2. In the Operations console, click the Administration button.
3. In the Administration pane, expand Administration, expand Device Management, and
then click Agentless Managed. If you are working with a network device, select Device
Management and then Network Devices.
4. In the Agentless Managed pane, select the agentless-managed computers for which you
want to change the proxy agent, right-click them, and then select Change Proxy Agent.
Or if you are working with a network device, in the Network Devices pane, select the
network devices for which you want to change the proxy agent, right-click them, and then
select Change Proxy Agent.
5. In the Change Proxy Agent dialog box, select the computer you want to be the new
proxy agent, and then click OK.
The final steps in removing a gateway server from a management group are straightforward:
Log on to the gateway server with an account that has administrative rights.
In Add or Remove Programs, select System Center Operations Manager 2012 Gateway,
and then click Remove.
In the Operations console, in the Administration view, under Device Management,
Management Servers, select the gateway server, right-click it, and then click Delete.
Manager to Microsoft.
See Also
Maintaining the System Center 2012 - Operations Manager Infrastructure
Important
The CEIP reports do not contain contact information about you or your organization, such
as names or an address.
The CEIP reports forwarded from your organization to Microsoft are combined with CEIP reports
from other organizations and individual customers to help Microsoft solve issues and improve the
Microsoft products and features that customers use most often. For more information about the
CEIP, see the CEIP page.
Use the following procedure to configure CEIP settings. The management server must have
access to the Internet to participate in the program.
Important
CEIP is a component of the Client Monitoring feature of Operations Manager. Client
Monitoring must be enabled on at least one management server and managed
computers to participate in the CEIP. For information about enabling the Client Monitoring
feature of Operations Manager, see Client Monitoring Using Agentless Exception
Monitoring. After a management server has been configured for client monitoring, all
agents that are participating in CEIP should be configured via Group Policy to send their
CEIP data to that management server.
Note
You can click Tell me more about the program to view information about the
CEIP program, including the privacy statement.
See Also
Sending Data to Microsoft
Note
Before configuring operational data reports, make sure that Operations Manager
Reporting is installed, and that the management server has access to the Internet so that
reports can be sent to Microsoft.
See Also
Sending Data to Microsoft
Error Reporting
When error reporting is enabled for System Center 2012 – Operations Manager features, if an
error occurs, information about the error is anonymously reported to Microsoft. For more
information about the privacy statement for the Microsoft Error Reporting Service, see Microsoft
Online Crash Analysis. This information is used with error reports from other Microsoft customers
to help identify and resolve common issues with Operations Manager.
Note
This setting enables error reporting only for Operations Manager features. For
information about enabling the Client Monitoring feature of Operations Manager, which
includes error reporting for the specified computers, see Client Monitoring Using
Agentless Exception Monitoring.
Note
Click Tell me more about error reporting if you want to view the privacy
statement for the Microsoft Error Reporting Service.
6. When you have made the selection that you want, click OK.
Error Transmission settings let you specify which error reports are sent to Microsoft and the
additional diagnostic data that is included with the error reports.
To find the Error Transmission tab of the Global Management Server Group Settings
- Privacy dialog box
1. Log on to the computer with an account that is a member of the Operations Manager
Administrators role for the Operations Manager management group.
2. In the Operations console, click the Administration button.
3. In the Administration pane, expand Administration, and then click Settings.
4. In the Settings pane, expand Type: General, right-click Privacy, and then click
Properties.
5. In the Global Management Server Group Settings - Privacy dialog box, click the Error
Transmission tab.
Note
Click Read the privacy statement to view the privacy statement.
1. On the Error Transmission tab of the Global Management Server Group Settings -
Privacy dialog box, click Filter.
2. In the Error Forwarding Filters dialog box, select one or more of the options for sources
of errors that you do not want forwarded to Microsoft, such as that come from specific
computers.
3. In the Criteria description box, click specific, and provide the values for the criteria of
errors that you do not want forwarded to Microsoft, such as computer.contoso.com.
4. Click OK twice.
See Also
Sending Data to Microsoft