Implementing Microsoft Operations Manager 2000

Code: 2550
Course duration: 3 days
Price:

2550:Implementing Microsoft Operations Manager 2000

About this Course
The goal of this course to give students experience with Microsoft Operations Manager (MOM) 2000 and to show them how to implement it effectively.
Audience Profile
This course is intended for senior IT support professionals, consultants, network architects, and system engineers who are responsible for deploying and configuring Microsoft Operations Manager 2000.
This course provides students with the knowledge and skills necessary to deploy and implement Microsoft Operations Manager 2000. The course provides the necessary knowledge to implement product specific management agents and will skill students in configuring alert, event, and performance processing rules; monitoring common and complex network scenarios; creating a highly reliable monitoring system; and using predefined reports.
At Course Completion
At the end of the course, students will be able to:
  • Identify the features of MOM 2000 that support operations management.
  • Identify a MOM deployment that provides a distributed operations management solution.
  • Perform a custom installation according to specified configurations and prerequisites.
  • Install and configure agents.
  • Use MOM groups to apply processing rules for events.
  • Create alert, event, and performance processing rules.
  • Plan and configure MOM for complex situations.
  • Use predefined reports to view collected data and provide access to reports through a Web interface.

Course Outline

Module 1: Introduction to Operations Management

The following topics are covered in this module:
Lessons
  • Operations Management Overview
  • MOM 2000
  • MOM Events
At the end of this module, you will be able to define operations management, and describe the features of MOM 2000 that support operations management.
This includes:
  • Defining operations management.
  • Describing MOM 2000.
  • Defining business requirements for MOM 2000.
  • Describing the MOM 2000 feature set.
  • Describing events and event processing.
  • Describing management packs.
  • Comparing MOM and Microsoft Systems Management Server (SMS).
Module 2: MOM Components
The following topics are covered in this module:
Lessons
  • MOM Architecture
  • Business Logic Components
  • Data Components
  • Presentation Components
  • Configuration Groups
At the end of this module, you will be able to understand a MOM deployment that provides a distributed operations management solution.
This includes:
  • Describing the architecture of MOM.
  • Describing the components of MOM.
  • Describing configuration groups.

Module 3: Installing MOMThe following topics are covered in this module:

Lessons

  • System Requirements
  • MOM Service Accounts
  • Installation Scenarios
  • Post-Installation Tasks
  • Uninstalling MOM
At the end of this module, you will be able to perform a custom installation according to specified configurations and prerequisites.
This includes:
  • Identifying the hardware and software requirements of a MOM installation.
  • Identifying the service accounts required by a MOM installation.
  • Using the Verify Prerequisites tool to ensure that your system meets MOM's requirements.
  • Identifying the different types of MOM installation that are available.
  • Installing MOM.
  • Performing any post-installation steps required.
  • Describing the process for uninstalling MOM.
Module 4: Installing Agents
The following topics are covered in this module:
Lessons
  • Introduction to Agents
  • Installing Agents
  • Configuring Agents
At the end of this module, you will be able to install MOM Agents.
This includes:
  • Describing the function of agents.
  • Planning an agent installation.
  • Installing agents.
  • Pushing agents to monitored systems.
  • Configuring agents
  • Uninstalling agents
Module 5: Using MOM Groups
The following topics are covered in this module:
Lessons
  • Introduction to MOM Groups
  • MOM Providers
  • Processing Rules
  • Notification Groups
At the end of this module, you will be able to use MOM groups to apply processing rules for events.
This includes:
  • Defining and creating computer groups.
  • Defining and creating providers.
  • Defining and creating processing rules and processing rule groups.
  • Using notification groups to send e-mail.
Module 6: Processing Events
The following topics are covered in this module:
Lessons
  • MOM Event Processing Rules
  • Types of Event Processing Rules
  • Types of Responses for Event Rules
At the end of this module, you will be able to create event processing rules.
This includes:
  • Creating and managing event processing rules.
  • Using filtering to reduce the number of events processed.
  • Using event processing rules to respond to types of events.
  • Using custom scripts to respond to events.

Module 7: Alert Processing Rules

Lessons

  • MOM Alert Processing Rules
  • Creating Alert Rules
  • Responding to Alerts
At the end of this module, you will be able to create alert processing rules.
This includes:
  • Defining alert processing rules.
  • Creating alert processing rules.
  • Determining responses available to alerts.
Module 8: Performance Processing Rules
The following topics are covered in this module:
Lessons
  • MOM Performance Processing Rules
At the end of this module, you will be able to create Performance Processing Rules.
This includes:
  • Defining performance processing rules.
  • Creating measuring rules.
  • Creating threshold rules.

Module 9: Complex Configurations

The following topics are covered in this module:Lessons

  • Common Enterprise Management Scenarios
  • Highly Reliable Monitoring Systems
  • Database Maintenance
At the end of this module, you will be able to configure MOM in complex situations.
This includes:
  • Describing common enterprise management scenarios.
  • Creating highly reliable monitoring systems.
  • Maintaining the MOM database.

Module 10: Using Reports

The following topics are covered in this module:Lessons

  • Introduction to Reports
  • Long-term Availability of Data
At the end of this module, you will be able to use predefined reports to view collected data and provide access to reports through a Web interface.
This includes:
  • Describing reporting requirements.
  • Using predefined Access 2000 reports.
  • Creating HTML reports.

Course Reviews

No reviews found for this course.

Be the first to write a review