Microsoft Office Tutorials and References
In Depth Information
Tuning the Office 365 management pack and reducing false alarms
5. Select the credential distribution method, as shown in Figure 6-12. In this exercise,
we have chosen Less secure, which distributes the run-as account to all managed
systems. This allows any system to act as an Office 365 watcher node.
6. Click Create.
If you would like to use the More secure option, refer to the System Center 2012
Operations Manager documentation on TechNet for further explanation about how
to deploy the Run As accounts in this way. See “Distribution and Targeting for Run
As Accounts and Profiles” at
aspx .
Figure 6-12 Office 365 MP Run As Account Distribution Security page.
Search JabSto ::

Custom Search