{"id":19722,"date":"2023-08-16T16:46:34","date_gmt":"2023-08-16T20:46:34","guid":{"rendered":"https:\/\/kevinjustin.com\/blog\/?p=19722"},"modified":"2023-08-17T15:39:43","modified_gmt":"2023-08-17T19:39:43","slug":"ad-application-monitoring","status":"publish","type":"post","link":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/","title":{"rendered":"AD Application monitoring"},"content":{"rendered":"<figure id=\"attachment_19725\" aria-describedby=\"caption-attachment-19725\" style=\"width: 472px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19725\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder.jpg\" alt=\"Data from StarTrek the next generation - Mr. Tricorder makes me laugh!\" width=\"472\" height=\"298\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder.jpg 472w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder-300x189.jpg 300w\" sizes=\"auto, (max-width: 472px) 85vw, 472px\" \/><\/a><figcaption id=\"caption-attachment-19725\" class=\"wp-caption-text\">Data from StarTrek the next generation &#8211; Mr. Tricorder makes me laugh!<\/figcaption><\/figure>\n<p>&#8216;AD Application monitoring&#8217; &gt; web synthetics, artificial users &gt; android what image comes to mind?\u00a0 Is it a person, or a thing from a Sci-Fi movie? Perhaps Bishop from Aliens, Data from Star Trek.\u00a0 What does &#8216;AD Application monitoring&#8217; consist of?\u00a0 Currently that means a CRL validity check, and ADFS web synthetic (proving that ADFS is responding).\u00a0 My thanks to <a href=\"https:\/\/www.linkedin.com\/in\/jasonwindisch\/\" target=\"_blank\" rel=\"noopener\">Jason Windisch CSA<\/a>, for the supplied PowerShell!<\/p>\n<p>&nbsp;<\/p>\n<h4>Quick Download <a href=\"https:\/\/github.com\/theKevinJustin\/ADApplications\/\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/theKevinJustin\/ADApplications\/<\/a><\/h4>\n<h2><\/h2>\n<h2>Tailoring the pack to your environment<\/h2>\n<p>The purpose of the pack is to add scheduled workflow that acts like the user, identifies if the CRL&#8217;s are about to expire.\u00a0 Most times, monitoring stops at ICMP ping.\u00a0 Most times, there&#8217;s still an outage, as the network, and servers are responding.\u00a0 The next layer is IIS, Apache, etc.\u00a0 Sometimes the network team gets involved, checking a base IIS URL is configured.\u00a0 Most outages aren&#8217;t network, nor IIS wasn&#8217;t running.\u00a0 This is why we focus on the web application responding.\u00a0 Does the multi-prong tactical attack make sense?<\/p>\n<p>This pack delivers on-demand tasks, daily reports, and rules\/monitors to reflect health.\u00a0 Customize the watcher node, some URL&#8217;s, save, and import into SCOM!\u00a0 The purpose<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Assign watcher node(s)<\/strong><\/p>\n<p>Assign a watcher node by creating a registry key.<\/p>\n<p>What does that mean?\u00a0 \u00a0Watcher nodes are needed to provide user perspective.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Multiple site example<\/strong><\/p>\n<p>Issue:\u00a0 Users from sites 1,2,3 are having problems accessing web pages.\u00a0 To understand a user in site 2, leverage a server in site 2 to initiate the web request (<span style=\"color: #3366ff;\">invoke-webRequest<\/span> in PowerShell).<\/p>\n<p>Why:\u00a0 Differentiate user experience (per site).\u00a0 Answer the &#8216;did you know&#8217; &#8211; is the application responding from this site\/perspective.<\/p>\n<p>Unfortunately, the watcher node concept eludes most administrators.\u00a0 Mastering &#8216;user perspective&#8217; makes for an invaluable aid moving from reactive &#8216;fire fighting&#8217; to proactively being told before users.\u00a0 \u00a0Hopefully this explains the power where monitoring imitates user interactions for key web applications.<\/p>\n<p><strong>How:\u00a0<\/strong> Create registry key on whatever servers you want to initiate web monitor<\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"color: #3366ff;\">From PowerShell (as Admin), or Command Prompt (as admin)<\/span><\/p>\n<p style=\"margin: 0in; margin-left: .375in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"color: #3366ff;\">reg add &#8220;HKLM\\SOFTWARE\\ADApplications\\WatcherNode&#8221;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_19732\" aria-describedby=\"caption-attachment-19732\" style=\"width: 331px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-RegistryKey.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19732\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-RegistryKey.jpg\" alt=\"AD Applications regedit registry key validation\" width=\"331\" height=\"445\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-RegistryKey.jpg 331w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-RegistryKey-223x300.jpg 223w\" sizes=\"auto, (max-width: 331px) 85vw, 331px\" \/><\/a><figcaption id=\"caption-attachment-19732\" class=\"wp-caption-text\">AD Applications regedit registry key validation<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Example of XML snippet from AD Applications management pack<\/p>\n<figure id=\"attachment_19728\" aria-describedby=\"caption-attachment-19728\" style=\"width: 2418px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-WatcherNodeRegKeyDiscovery.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19728\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-WatcherNodeRegKeyDiscovery.jpg\" alt=\"AD Applications Watcher Node - create specific registry key\" width=\"2418\" height=\"369\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-WatcherNodeRegKeyDiscovery.jpg 2418w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-WatcherNodeRegKeyDiscovery-1536x234.jpg 1536w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-WatcherNodeRegKeyDiscovery-2048x313.jpg 2048w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-WatcherNodeRegKeyDiscovery-1200x183.jpg 1200w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-WatcherNodeRegKeyDiscovery-300x46.jpg 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-WatcherNodeRegKeyDiscovery-768x117.jpg 768w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADApplications-WatcherNodeRegKeyDiscovery-1024x156.jpg 1024w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><figcaption id=\"caption-attachment-19728\" class=\"wp-caption-text\">AD Applications Watcher Node &#8211; create specific registry key<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Set up CRL Validity check and ADFS synthetic<\/h2>\n<p>Next, configure the URL&#8217;s for the customer environment for the &#8216;AD Application monitoring&#8217; management pack.<\/p>\n<p><a style=\"font-weight: bold; background-color: transparent; text-align: inherit;\" href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Update-Modules.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19730\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Update-Modules.jpg\" alt=\"Update AD Applications module types for monitor\/rules for CRL and ADFS synthetics\" width=\"1846\" height=\"216\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Update-Modules.jpg 1846w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Update-Modules-1536x180.jpg 1536w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Update-Modules-1200x140.jpg 1200w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Update-Modules-300x35.jpg 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Update-Modules-768x90.jpg 768w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Update-Modules-1024x120.jpg 1024w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><\/p>\n<p>Update AD Applications module types for monitor\/rules for CRL and ADFS synthetics<\/p>\n<p><strong>Configure the CRL validity check array<\/strong><\/p>\n<p>From your favorite XML editor (notepad++ pictured)<\/p>\n<p>Find\/Replace ##FQDN##, ##CRLstring##, numbers to customer environment<\/p>\n<figure id=\"attachment_19729\" aria-describedby=\"caption-attachment-19729\" style=\"width: 1006px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/CRL-Array.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19729\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/CRL-Array.jpg\" alt=\"CRL Validity check, create your array length as needed for customer environment\" width=\"1006\" height=\"190\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/CRL-Array.jpg 1006w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/CRL-Array-300x57.jpg 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/CRL-Array-768x145.jpg 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><figcaption id=\"caption-attachment-19729\" class=\"wp-caption-text\">CRL Validity check, create your array length as needed for customer environment<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Configure the ADFS synthetic request(s)<\/strong><\/p>\n<p>From your favorite XML editor (notepad++ pictured)<\/p>\n<p>Find\/Replace $server, ##FederationFQDN##, if necessary, update ADFS URL string if different (the \/adfs\/ls\/idpiniatedsignon.aspx portion) to customer environment<\/p>\n<figure id=\"attachment_19731\" aria-describedby=\"caption-attachment-19731\" style=\"width: 1827px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADFS-URL-for-invoke-webRequest.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19731\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADFS-URL-for-invoke-webRequest.jpg\" alt=\"Update ADFS URL for invoke-webRequest, ADFS default URL in specified example\" width=\"1827\" height=\"420\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADFS-URL-for-invoke-webRequest.jpg 1827w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADFS-URL-for-invoke-webRequest-1536x353.jpg 1536w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADFS-URL-for-invoke-webRequest-1200x276.jpg 1200w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADFS-URL-for-invoke-webRequest-300x69.jpg 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADFS-URL-for-invoke-webRequest-768x177.jpg 768w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/ADFS-URL-for-invoke-webRequest-1024x235.jpg 1024w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><figcaption id=\"caption-attachment-19731\" class=\"wp-caption-text\">Update ADFS URL for invoke-webRequest, ADFS default URL in specified example<\/figcaption><\/figure>\n<p>Save pack<\/p>\n<p>Import and enjoy!<\/p>\n<p>&nbsp;<\/p>\n<h4>Documentation<\/h4>\n<p><a href=\"https:\/\/monitoringguys.com\/2015\/05\/04\/urlgenie-management-pack-for-scom-an-easy-powerful-solution-for-bulk-website-monitoring\/\" target=\"_blank\" rel=\"noopener\">URLGenie<\/a> for advanced website monitoring<\/p>\n<p>PowerShell <a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/module\/microsoft.powershell.utility\/invoke-webrequest?view=powershell-7.3\" target=\"_blank\" rel=\"noopener\">invoke-webRequest<\/a><\/p>\n<p>Addendum logic <a href=\"https:\/\/kevinjustin.com\/blog\/2023\/08\/17\/why-addendum-packs\/\" target=\"_blank\" rel=\"noopener\">blog<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8216;AD Application monitoring&#8217; &gt; web synthetics, artificial users &gt; android what image comes to mind?\u00a0 Is it a person, or a thing from a Sci-Fi movie? Perhaps Bishop from Aliens, Data from Star Trek.\u00a0 What does &#8216;AD Application monitoring&#8217; consist of?\u00a0 Currently that means a CRL validity check, and ADFS web synthetic (proving that ADFS &hellip; <a href=\"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;AD Application monitoring&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[637,2,567,5,7,545,530],"tags":[21,25,26,717,719,51,716,342,718],"class_list":["post-19722","post","type-post","status-publish","format-standard","hentry","category-active-directory","category-administration","category-authoring","category-best-practice","category-mp-management-pack","category-powershell","category-scom","tag-ad","tag-addendum","tag-adds","tag-adfs","tag-alert","tag-authentication","tag-crl","tag-scom","tag-web-synthetic"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AD Application monitoring - Kevin Justin&#039;s Blog<\/title>\n<meta name=\"description\" content=\"Update the AD Application monitoring pack to configure CRL validity checks, and ADFS URL checks adding additional monitoring layers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AD Application monitoring - Kevin Justin&#039;s Blog\" \/>\n<meta property=\"og:description\" content=\"Update the AD Application monitoring pack to configure CRL validity checks, and ADFS URL checks adding additional monitoring layers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"Kevin Justin&#039;s Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-16T20:46:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-17T19:39:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder.jpg\" \/>\n<meta name=\"author\" content=\"WordPress Administrator\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WordPress Administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/\"},\"author\":{\"name\":\"WordPress Administrator\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\"},\"headline\":\"AD Application monitoring\",\"datePublished\":\"2023-08-16T20:46:34+00:00\",\"dateModified\":\"2023-08-17T19:39:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/\"},\"wordCount\":560,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Data-MrTricorder.jpg\",\"keywords\":[\"AD\",\"addendum\",\"ADDS\",\"ADFS\",\"alert\",\"authentication\",\"CRL\",\"SCOM\",\"web synthetic\"],\"articleSection\":[\"Active Directory\",\"Administration\",\"Authoring\",\"Best Practice\",\"MP Management Pack\",\"PowerShell\",\"SCOM\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/\",\"name\":\"AD Application monitoring - Kevin Justin&#039;s Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Data-MrTricorder.jpg\",\"datePublished\":\"2023-08-16T20:46:34+00:00\",\"dateModified\":\"2023-08-17T19:39:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\"},\"description\":\"Update the AD Application monitoring pack to configure CRL validity checks, and ADFS URL checks adding additional monitoring layers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Data-MrTricorder.jpg\",\"contentUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Data-MrTricorder.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/08\\\/16\\\/ad-application-monitoring\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AD Application monitoring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\",\"name\":\"Kevin Justin&#039;s Blog\",\"description\":\"Operational monitoring tools including System Center, Azure Monitor\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\",\"name\":\"WordPress Administrator\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"caption\":\"WordPress Administrator\"},\"sameAs\":[\"https:\\\/\\\/kevinjustin.com\"],\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/author\\\/wordpress_admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AD Application monitoring - Kevin Justin&#039;s Blog","description":"Update the AD Application monitoring pack to configure CRL validity checks, and ADFS URL checks adding additional monitoring layers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"AD Application monitoring - Kevin Justin&#039;s Blog","og_description":"Update the AD Application monitoring pack to configure CRL validity checks, and ADFS URL checks adding additional monitoring layers.","og_url":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/","og_site_name":"Kevin Justin&#039;s Blog","article_published_time":"2023-08-16T20:46:34+00:00","article_modified_time":"2023-08-17T19:39:43+00:00","og_image":[{"url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder.jpg","type":"","width":"","height":""}],"author":"WordPress Administrator","twitter_card":"summary_large_image","twitter_misc":{"Written by":"WordPress Administrator","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/#article","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/"},"author":{"name":"WordPress Administrator","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508"},"headline":"AD Application monitoring","datePublished":"2023-08-16T20:46:34+00:00","dateModified":"2023-08-17T19:39:43+00:00","mainEntityOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/"},"wordCount":560,"commentCount":0,"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder.jpg","keywords":["AD","addendum","ADDS","ADFS","alert","authentication","CRL","SCOM","web synthetic"],"articleSection":["Active Directory","Administration","Authoring","Best Practice","MP Management Pack","PowerShell","SCOM"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/","url":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/","name":"AD Application monitoring - Kevin Justin&#039;s Blog","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder.jpg","datePublished":"2023-08-16T20:46:34+00:00","dateModified":"2023-08-17T19:39:43+00:00","author":{"@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508"},"description":"Update the AD Application monitoring pack to configure CRL validity checks, and ADFS URL checks adding additional monitoring layers.","breadcrumb":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/#primaryimage","url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder.jpg","contentUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/08\/Data-MrTricorder.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/kevinjustin.com\/blog\/2023\/08\/16\/ad-application-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kevinjustin.com\/blog\/"},{"@type":"ListItem","position":2,"name":"AD Application monitoring"}]},{"@type":"WebSite","@id":"https:\/\/kevinjustin.com\/blog\/#website","url":"https:\/\/kevinjustin.com\/blog\/","name":"Kevin Justin&#039;s Blog","description":"Operational monitoring tools including System Center, Azure Monitor","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kevinjustin.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508","name":"WordPress Administrator","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","caption":"WordPress Administrator"},"sameAs":["https:\/\/kevinjustin.com"],"url":"https:\/\/kevinjustin.com\/blog\/author\/wordpress_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/19722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/comments?post=19722"}],"version-history":[{"count":11,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/19722\/revisions"}],"predecessor-version":[{"id":19747,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/19722\/revisions\/19747"}],"wp:attachment":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/media?parent=19722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/categories?post=19722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/tags?post=19722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}