Month: March 2024
SCOM MS TLS1.2 drivers

Courtesy of Brook Hudson, who provided clarification for encrypting SCOM data –
Question – Can we update the OLE DB Driver from 18.6.5 to 18.6.7 and the ODBC driver from 17.10.3 to 17.10.5.1 without breaking anything?
This configuration applies to SCOM2016 forward –
MS OLE DB Driver 18.6.7: https://go.microsoft.com/fwlink/?linkid=2242656
ODBC Driver 17.10.5.1: https://go.microsoft.com/fwlink/?linkid=2249004
I did NOT have success with this for SCOM2019 and SCOM2022 –
If the SQL endpoint is secured with encryption, then the following drivers can be used.
MS OLE DB Driver 19.3.2: https://aka.ms/downloadmsoledbsql
ODBC Driver 18.3.2.1: https://aka.ms/downloadmsodbcsql
If you want to use these newer drivers then SQL encryption is required, more information about enabling SQL Encryption: Configure SQL Server Database Engine for encryption – SQL Server | Microsoft Learn – https://learn.microsoft.com/en-us/sql/database-engine/configure-windows/configure-sql-server-encryption?view=sql-server-ver15
The SQL team noted that the newer versions are defaulting Encrypt to be Yes/Mandatory. That is why the new drivers were having an issue. Setting up a certificate in the SQL endpoint would have allowed the connection to work:
Enable encrypted connections – SQL Server | Microsoft Docs
Certificate Management (SQL Server Configuration Manager) – SQL Server | Microsoft Docs
OLE DB Driver 19.0 for SQL Server Released – Microsoft Tech Community
ODBC Driver 18.0 for SQL Server Released – Microsoft Tech Community
IMPORTANT:
Update: Hotfixes released for ODBC and OLE DB drivers for SQL Server – Microsoft Community Hub
ServiceNow Event integration
SNOW prerequisites
Update incident script and begin testing.
$ServiceNowURL=”https://##SERVICENOWURL##/api/now/table/em_event”
# Test New-SNOWEvent.ps1
ServiceNow Incident Integration
SNOW prerequisites
Update incident script and begin testing.
$ServiceNowURL=”https://##ServiceNowURL##/api/now/table/incident”
#$Proxy = “##CustomerProxyURL##”
$CallerID = “##GUID##”
# Test New-SNOWIncident.ps1
SCOM maintenance schedules
From PowerShell on SCOM MS
Example Output
OMI vulnerabilities for SCOM/LogAnalytics

Thank you Aris for reaching out with questions on these new vulnerabilities!
New OMI vulnerabilities for SCOM/Log Analytics Agents posted. The vulnerabilities apply to OMI component on non-windows servers with SCOM2019, SCOM2022, or Log Analytics agents. The vulnerabilities apply to non-windows server operating systems. See hotfix details below to resolve.
OMI vulnerabilities for SCOM/LogAnalytics CVE details
CVE-2024-21134 https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21334
The vulnerability exists due to a use-after-free error in the Open Management Infrastructure (OMI). A remote attacker can execute arbitrary code on the target system.
CVE-2024-21330 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21330
The vulnerability exists due to application does not properly impose security restrictions in the Open Management Infrastructure (OMI), which leads to security restrictions bypass and privilege escalation.
SCOM Download links
2019 https://www.microsoft.com/en-us/download/details.aspx?id=58208
2022 https://www.microsoft.com/en-in/download/details.aspx?id=104213
Update OMI on for SCOM/Log Analytics agents
Leverage Holman’s Monitoring UNIX quick start guide(s) if you need a ‘how to’ or refresher to update your SCOM management groups with the latest packs, and how to update the agent on non-windows/UNIX servers.
SCOM2022 https://kevinholman.com/2022/12/12/monitoring-unix-linux-with-scom-2022/
SCOM2016,2019 https://kevinholman.com/2016/11/11/monitoring-unix-linux-with-opsmgr-2016/