Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

SCOM 2007 "Outlook Web Access Logon Monitor"

Posted on 2008-10-08
3
Medium Priority
?
645 Views
Last Modified: 2012-05-05
Hi,
My SCOM 2007 OperationManagerDW DB is on SQL 2005. I'm trying to find out what SQL table is associated with "outlook web access logon montor". Is there a query that I can run to get this info? Thanks!
0
Comment
Question by:leo1044
3 Comments
 
LVL 4

Accepted Solution

by:
randy_knight earned 2000 total points
ID: 22674457
I don't know offhand but you might look at the WSDL for canned SSRS reports to get a clue.  I don't have SCOM Console on this box but if you can find a report that references it, look at the source code for the report and the SQL it calls.  

If that doesn't work, you could profile the DB with the SCOM DW on it while you run the report.


0

Featured Post

Veeam and MySQL: How to Perform Backup & Recovery

MySQL and the MariaDB variant are among the most used databases in Linux environments, and many critical applications support their data on them. Watch this recorded webinar to find out how Veeam Backup & Replication allows you to get consistent backups of MySQL databases.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, when I was asked to create a new SQL 2005 cluster, Microsoft released a new service pack for MS SQL 2005 what is Service Pack 3. When I finished the installation of MS SQL 2005 I found myself troubled why the installation of SP3 failed …
In this article I will describe the Backup & Restore method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question