{"id":295,"date":"2017-03-02T17:53:45","date_gmt":"2017-03-02T23:53:45","guid":{"rendered":"https:\/\/kevinjustin.com\/blog\/?p=295"},"modified":"2019-12-20T10:45:15","modified_gmt":"2019-12-20T14:45:15","slug":"why-not-to-use-local-system-for-your-core-scom-accounts","status":"publish","type":"post","link":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/","title":{"rendered":"Why not to use Local System for your core SCOM accounts"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-416\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/say-what-logo1.jpg\" alt=\"say-what-logo1\" width=\"1068\" height=\"624\" \/><\/p>\n<p>Stay with me here, this is for the SCOM management group installation<\/p>\n<p>&nbsp;<\/p>\n<p>So first, let&#8217;s research and figure out what the experts are doing, and what the install guides exist.<\/p>\n<p>Researching\u00a0expert published documentation helps us understand the options, and we can dive into some of the\u00a0reasons why.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>SCOM Security<\/strong><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-305\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/SCOM-KH-SecurityBlogCapture.PNG\" alt=\"scom-kh-securityblogcapture\" width=\"941\" height=\"723\" \/><\/p>\n<p>(KH\u00a0<a href=\"https:\/\/kevinholman.com\/2012\/02\/17\/security-in-operations-manager-some-perspectives-and-typical-customer-scenarios\/\">blog<\/a>\u00a0)<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>SQLRights and roles<\/strong><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-315\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/SCOM-SQL_accountRightsMapping.PNG\" alt=\"scom-sql_accountrightsmapping\" width=\"1843\" height=\"765\" \/><\/p>\n<p>(KH blog <a href=\"http:\/\/Mapping out Security Account rights\">here<\/a> to download the XLS (applies for 2012,2016 as well)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Experts separate out the various functions into dedicated ID&#8217;s<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>The reason for multiple ID&#8217;s is to lower the risk (less vulnerability if one ID is locked out, expired, disabled)<\/p>\n<p>&#8212; If you use one ID for all SCOM functions, and something happens to the ID, your SCOM environment stops working.<\/p>\n<p>&#8212; There&#8217;s always some associated risk with either scenario for LocalSystem or ID&#8217;s (decrypt RunAs ID&#8217;s <a href=\"https:\/\/www.nccgroup.trust\/uk\/about-us\/newsroom-and-events\/blogs\/2017\/february\/scomplicated-decrypting-scom-runas-credentials\/\">UK blog<\/a> )<\/p>\n<p>If that is a concern, here is some great advice from Kevin Holman<\/p>\n<ol type=\"1\">\n<li value=\"1\">Control who has access to SCOM<\/li>\n<li>Control who has access to the servers using RunAs accounts, that are monitored by SCOM.<\/li>\n<\/ol>\n<p>If you have lost control of local admin on a server, you are compromised, and I am not sure how gaining access to a RunAs account is no worse in some sense.<\/p>\n<p>By the way \u2013 this is the entire reason \u201cmore secure\u201d was introduced in SCOM 2007R2, to limit distribution of credentials only to servers that required it, to limit the potential for a local attack.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Another option (not recommended) is using\u00a0Local System<\/strong><\/p>\n<p>&#8212; Cannot login to system to verify access concerns (quite honestly is why someone might sanction this approach)<\/p>\n<p>&#8212; Scripts run as local system can be terminated, allowing a command window with Local System access<\/p>\n<p>&#8212; Depending on which services LocalSystem is used, this could grant elevated privileges (like a Domain Controller DC)<\/p>\n<p><a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ms677973(v=vs.85).aspx\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-465\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/LocalSystemAccount.PNG\" alt=\"localsystemaccount\" width=\"800\" height=\"347\" \/><\/a><\/p>\n<p>&#8212; If &#8216;Local System&#8217; was used for the core SCOM environment,\u00a0a change\u00a0made to the Local Security Policy, or group policy can\u00a0break the environment.<\/p>\n<p><strong>Local Security Policy snapshot<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-345\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/LocalSystem-LocalSecurityPolicy.PNG\" alt=\"localsystem-localsecuritypolicy\" width=\"796\" height=\"570\" \/><\/p>\n<p><strong>Security Options<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-335\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/LocalSystem-SecurityOptions-LocalSecurityPolicy.PNG\" alt=\"localsystem-securityoptions-localsecuritypolicy\" width=\"794\" height=\"568\" \/><\/p>\n<p><strong>Group Policy<\/strong><\/p>\n<p>Locking down protocol blog <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/technet-magazine\/cc160783(v=msdn.10)\">here<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-355\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/GPO-snapshot-technetWebsite.PNG\" alt=\"gpo-snapshot-technetwebsite\" width=\"798\" height=\"596\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Hope this helps you decide the &#8216;how to&#8217; set up your environment<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Related documentation<\/strong><\/p>\n<p><a href=\"https:\/\/kevinholman.com\/2019\/03\/14\/scom-2019-quickstart-deployment-guide\/\" target=\"_blank\" rel=\"noopener noreferrer\">2019 Kevin Holman Deployment Guide<\/a><\/p>\n<p><a href=\"https:\/\/kevinholman.com\/2016\/10\/22\/opsmgr-2016-quickstart-deployment-guide\/\" target=\"_blank\" rel=\"noopener noreferrer\">2016 Kevin Holman Deployment Guide<\/a><\/p>\n<p><a href=\"https:\/\/kevinholman.com\/2013\/10\/18\/scom-2012-r2-quickstart-deployment-guide\/\" target=\"_blank\" rel=\"noopener noreferrer\">2012 R2 Kevin Holman Deployment Guide<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/system-center\/scom\/plan-mgmt-group-design?view=sc-om-2019\" target=\"_blank\" rel=\"noopener noreferrer\">Planning 2019 SCOM deployment Guide<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/system-center\/scom\/plan-mgmt-group-design?view=sc-om-2016\" target=\"_blank\" rel=\"noopener noreferrer\">Planning 2016 SCOM deployment Guide<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/system-center\/system-center-2012-R2\/hh298609(v=sc.12)\" target=\"_blank\" rel=\"noopener noreferrer\">2012 Technet Deployment Guide<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/system-center\/operations-manager-2007-r2\/bb418758(v=technet.10)\" target=\"_blank\" rel=\"noopener noreferrer\">2007R2 Technet Deployment Guide<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stay with me here, this is for the SCOM management group installation &nbsp; So first, let&#8217;s research and figure out what the experts are doing, and what the install guides exist. Researching\u00a0expert published documentation helps us understand the options, and we can dive into some of the\u00a0reasons why. &nbsp; SCOM Security (KH\u00a0blog\u00a0) &nbsp; &nbsp; SQLRights &hellip; <a href=\"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Why not to use Local System for your core SCOM accounts&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[51,133,162,163,195,196,210,316,320,342,454],"class_list":["post-295","post","type-post","status-publish","format-standard","hentry","category-best-practice","tag-authentication","tag-domain","tag-faststart","tag-fasttrack","tag-install","tag-installation","tag-local-system","tag-provision","tag-quickstart","tag-scom","tag-training"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why not to use Local System for your core SCOM accounts - Kevin Justin&#039;s Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why not to use Local System for your core SCOM accounts - Kevin Justin&#039;s Blog\" \/>\n<meta property=\"og:description\" content=\"Stay with me here, this is for the SCOM management group installation &nbsp; So first, let&#8217;s research and figure out what the experts are doing, and what the install guides exist. Researching\u00a0expert published documentation helps us understand the options, and we can dive into some of the\u00a0reasons why. &nbsp; SCOM Security (KH\u00a0blog\u00a0) &nbsp; &nbsp; SQLRights &hellip; Continue reading &quot;Why not to use Local System for your core SCOM accounts&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"Kevin Justin&#039;s Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-02T23:53:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-20T14:45:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/say-what-logo1.jpg\" \/>\n<meta name=\"author\" content=\"Kevin Justin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Justin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/\"},\"author\":{\"name\":\"Kevin Justin\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/213cdc5c6c3f2a1d9e8417c07440972d\"},\"headline\":\"Why not to use Local System for your core SCOM accounts\",\"datePublished\":\"2017-03-02T23:53:45+00:00\",\"dateModified\":\"2019-12-20T14:45:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/\"},\"wordCount\":409,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/say-what-logo1.jpg\",\"keywords\":[\"authentication\",\"domain\",\"faststart\",\"fasttrack\",\"install\",\"installation\",\"local system\",\"provision\",\"quickstart\",\"SCOM\",\"Training\"],\"articleSection\":[\"Best Practice\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/\",\"name\":\"Why not to use Local System for your core SCOM accounts - Kevin Justin&#039;s Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/say-what-logo1.jpg\",\"datePublished\":\"2017-03-02T23:53:45+00:00\",\"dateModified\":\"2019-12-20T14:45:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/213cdc5c6c3f2a1d9e8417c07440972d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/say-what-logo1.jpg\",\"contentUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/say-what-logo1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2017\\\/03\\\/02\\\/why-not-to-use-local-system-for-your-core-scom-accounts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why not to use Local System for your core SCOM accounts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\",\"name\":\"Kevin Justin&#039;s Blog\",\"description\":\"Operational monitoring tools including System Center, Azure Monitor\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/213cdc5c6c3f2a1d9e8417c07440972d\",\"name\":\"Kevin Justin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c2a0d1189dd1ad7f305cf08aa9c5e2d4cc8fc26fde7ca573d3fd7e75520334e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c2a0d1189dd1ad7f305cf08aa9c5e2d4cc8fc26fde7ca573d3fd7e75520334e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c2a0d1189dd1ad7f305cf08aa9c5e2d4cc8fc26fde7ca573d3fd7e75520334e?s=96&d=mm&r=g\",\"caption\":\"Kevin Justin\"},\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/author\\\/kejustin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why not to use Local System for your core SCOM accounts - Kevin Justin&#039;s Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/","og_locale":"en_US","og_type":"article","og_title":"Why not to use Local System for your core SCOM accounts - Kevin Justin&#039;s Blog","og_description":"Stay with me here, this is for the SCOM management group installation &nbsp; So first, let&#8217;s research and figure out what the experts are doing, and what the install guides exist. Researching\u00a0expert published documentation helps us understand the options, and we can dive into some of the\u00a0reasons why. &nbsp; SCOM Security (KH\u00a0blog\u00a0) &nbsp; &nbsp; SQLRights &hellip; Continue reading \"Why not to use Local System for your core SCOM accounts\"","og_url":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/","og_site_name":"Kevin Justin&#039;s Blog","article_published_time":"2017-03-02T23:53:45+00:00","article_modified_time":"2019-12-20T14:45:15+00:00","og_image":[{"url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/say-what-logo1.jpg","type":"","width":"","height":""}],"author":"Kevin Justin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Justin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/#article","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/"},"author":{"name":"Kevin Justin","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/213cdc5c6c3f2a1d9e8417c07440972d"},"headline":"Why not to use Local System for your core SCOM accounts","datePublished":"2017-03-02T23:53:45+00:00","dateModified":"2019-12-20T14:45:15+00:00","mainEntityOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/"},"wordCount":409,"commentCount":0,"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/say-what-logo1.jpg","keywords":["authentication","domain","faststart","fasttrack","install","installation","local system","provision","quickstart","SCOM","Training"],"articleSection":["Best Practice"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/","url":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/","name":"Why not to use Local System for your core SCOM accounts - Kevin Justin&#039;s Blog","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/#primaryimage"},"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/say-what-logo1.jpg","datePublished":"2017-03-02T23:53:45+00:00","dateModified":"2019-12-20T14:45:15+00:00","author":{"@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/213cdc5c6c3f2a1d9e8417c07440972d"},"breadcrumb":{"@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/#primaryimage","url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/say-what-logo1.jpg","contentUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2017\/03\/say-what-logo1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/kevinjustin.com\/blog\/2017\/03\/02\/why-not-to-use-local-system-for-your-core-scom-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kevinjustin.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why not to use Local System for your core SCOM accounts"}]},{"@type":"WebSite","@id":"https:\/\/kevinjustin.com\/blog\/#website","url":"https:\/\/kevinjustin.com\/blog\/","name":"Kevin Justin&#039;s Blog","description":"Operational monitoring tools including System Center, Azure Monitor","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kevinjustin.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/213cdc5c6c3f2a1d9e8417c07440972d","name":"Kevin Justin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4c2a0d1189dd1ad7f305cf08aa9c5e2d4cc8fc26fde7ca573d3fd7e75520334e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4c2a0d1189dd1ad7f305cf08aa9c5e2d4cc8fc26fde7ca573d3fd7e75520334e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c2a0d1189dd1ad7f305cf08aa9c5e2d4cc8fc26fde7ca573d3fd7e75520334e?s=96&d=mm&r=g","caption":"Kevin Justin"},"url":"https:\/\/kevinjustin.com\/blog\/author\/kejustin\/"}]}},"_links":{"self":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":2,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":6543,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/295\/revisions\/6543"}],"wp:attachment":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}