Creating SNMP monitoring Management Packs for System Center 2012 Operations Manager [SNMP MP Chap 1] #scom #sysctr

One of the more asked questions regarding Operations Manager network monitoring is: how can I “certify” my own generic devices? As you may know Operations Manager distinguishes network device3s in two broad families: certified and generic. Certified devices are, basically, “known” devices for which specific monitors and rules have been defined, generic devices are “unknown” so only the standard port monitoring and snmp and icmp availability is implemented. For example for generic devices CPU usage is not collected and as a direct consequence they’re not displayed ion the top 10 CPU devices in network summary dashboard. Just to be clear there are cases where even certified devices do not expose CPU usage via SNMP, in this case event certified ones are not present in such dashboard.

To my knowledge at the time of this writing the differences between generic and certified devices are:

generics don’t have vendor and model (it can be easily added, most vendor publish the device model in SNMP)

generics don’t have CPU and memory monitoring, thus you don’t have the device in the top 10 cpu usage devices in the generic dashboard. (If the device exposes the CPU counter it can be easily added.)

generics don’t have the discovery of sensors and fans. Currently this is not a significant difference since they’re not monitored in any case. Adding this can be challenging depending on how they’re exposed in SNMP. The snmp modules in OpsMgr are not engineered for discovery scenarios and heterogeneous table management can be tricky, but I will present a couple of solutions for it.

generics don’t have trap based discovery, this can be a curse rather than a benefit. (see

From the previous list you can correctly conclude that discovery works for all devices (certified and generic). If the device implements RFC standards for SNMP port monitoring then all the ports are discovered and when applicable connected to other managed devices (network or computer), this means all the tricky work needed for creating the network topology and understanding the links between devices is done regardless of certified or generic status for the device.

Returning to the original question “how can I certify my own generic devices?”, the answer is: no you cannot certify your own generic devices, but you can bring them on par with certified ones if they expose the management capabilities via SNMP.

To add some more details, which devices are certified and which are generic is defined in the network discovery module, this happens to be code Microsoft licensed from EMC under the SMARTS agreement, the configuration of this code is not documented and it is not supported to bring in any mod. This means your devices will remain GENERIC in console even if they can be better monitored than certified ones. Actually a device can be forced to CERTIFIED via a custom discovery rule, but this property will be overwritten every time the network discovery runs and, in my opinion, will just add confusion. Certified or Generic is the OpsMgr certification level so leave it alone and let’s focus on monitoring.

This is the first in a serie of articles on SNMP device monitoring, I don’t know how many of them yet, and I don’t know where the code will be posted, there are several possibilities here: I can use technet gallery, I can open a codeplex project or I can just publish the snippets without the full sourcecode. I can even consider, with some help, to merge the xSNMP modules and integrate them for OpsMgr 2012. It really depends on the community feedback I will get.

This first chapter will set the basics, the references and the table of contents for future chapters.

Table of contents

Chapter 1 – Creating SNMP monitoring Management Packs for System Center 2012 Operations Manager (this article)

Chapter 2 – Discovery: identifying the device.

Chapter 3 – Memory and processor monitoring. Bringing the generic device almost on par.

Chapter 4 – Device components discovery.

Chapter 5 – Device components advanced discovery and extending the OpsMgr SNMP module with powershell.

The basics

The basic process for adding a new device is all around knowingly how the device responds to SNMP queries; this is typically documented in vendor published or standard MIB files. Without this first step there’s nothing that can be done. Once we get there it’s pretty straightforward to use the SNMP modules of Operations Manager 2012 to broaden the manageability of the devices. This typically implies performing a targeted discovery to uniquely identify the device, this is normally achieved via the sysObjectID of the device. Once we can uniquely identify the device we can target all the further monitors and rules to our specific device type.

In summary:

1.       Get the device SNMP tree

2.       Get a unique identifier for the device, this typically is the sysObjectID

3.       Define a new class for the device inherited from System.Network.node

4.       Write a discovery rule to identify the device (remember the first discovery is performed in any case by the OpsMgr standard modules)

5.       Target any further discovery, rule or monitor to the device class

The tools

To obtain the full device SNMP tree you need tools to perform queries and have a graphical representation of MIB files. The following is my short list:

MIB Browser: Manage Engine

SNMP Query Utilities and SNMP extensions:

SNMP Simulator:

Online MIB definitions:,,

Jalasoft Xian SNMP Simulator: and a good howto guide for the tool here

vNext mib2mp a commercial solution to automatically build Operations Manager management pack starting from MIB files:

The OpsMgr module types and classes

The key management packs for network monitoring are:

·         System.SNMP.Library – defines basic SNMP types and data sources

·         System.NetworkManagement.Library – defines all the classes for certified devices and advanced data sources

·         System.NetworkManagement.Monitoring – defines actual monitoring for certified devices

You can find the documentation for relevant modules on MSDN (see references) but the above management pack are really useful to understand how network monitoring works and to get samples to build your own code.

Since we’re going to write our own management packs for specific devices, it’s fundamental to remember which are the base classes that we need to inherit from. For network management we have two base classes:

·         System.NetworkManagement.Node – this is the actual device, our device class will inherit from Node

·         System.NetworkManagement.LogicalDevice – this is a generic device component (such as processor, or fan) we can use this to model our device, in several cases we have more specialized classes such as System.NetworkManagement.Processor or System.NetworkManagement.Memory that can be used for specific and standard components

While the base properties of the Node class are already discovered for us, remember the first discovery is up to OpsMgr standard modules (we’re just going to implement a specialized discovery), the LogicalDevice class has a couple of key properties:

          Key – it must be unique within the hosting device, the network monitor standard is <abbreviation>-<device address>/<index> (MEM- When possibile we will instead use the component OID so it can be direclty used in rules and monitors.

          Index – it’s the device Index in the SNMP tree, useful when there is more than one component of that type per device to build the full SNMP OID. We’ll see plenty of such examples in code.



          <PropertyID=DescriptionType=stringKey=falseCaseSensitive=trueLength=256MinLength=0 />

          <PropertyID=IndexType=stringKey=falseCaseSensitive=trueLength=256MinLength=0 />

          <PropertyID=KeyType=stringKey=trueCaseSensitive=trueLength=256MinLength=0 />


Resources and references

MIB Catalog:

Migrating Operations Manager 2007 R2 Network Monitoring

SNMP Event Wizard in OpsMgr on

SNMP Modules reference on MSDN

– Daniele

This posting is provided “AS IS” with no warranties, and confers no rights.

  1. #1 by Franco Rizzo on August 10, 2016 - 8:31 am

    Hi Daniele, really great article. I have implemented network monitoring for around 500 vpn firewalls. Monitoring is working fine but at some point the management server memory is completely used by the monitoringhost process. usually it goes up to 12G of ram and would continue to grow if possible. Did you already had this issue ? sorry if this is not the best place to put this question let me know.

  2. #3 by Steve on May 9, 2016 - 3:24 pm

    Great job! Looking forward to anything else you can post on SNMP.

  3. #4 by Dave on March 3, 2014 - 10:50 pm

    Looking forward to new chapters as well. I’ve been banging my head on SCOM & networking since I inherited the product last fall, but your blog never rose to the top of the Goog until today. Fantastic info.

    • #5 by Daniele Grandini on March 5, 2014 - 8:04 am

      Hi Dave, glad I’ve been useful. What do you think is missing?

      – Daniele

  4. #6 by Bryan on February 17, 2014 - 10:38 pm

    Do you have chapter 5 written or posted anywhere?

    • #7 by Daniele Grandini on February 18, 2014 - 7:33 am

      Hi Bryan,
      no chapter 5 isn’t born yet, I had very few hits and feedbacks on the topic so it shifted in the priority list. Right now I don’t have a timeline for it.

      – Daniele

  5. #8 by Stan on October 1, 2013 - 7:35 pm

    I like it!!!

  6. #9 by Steve Burkett on May 21, 2013 - 2:05 pm

    Absolutely looking forward to more on this subject Daniele! SCOM definitely needs beefing up in the network device monitoring area, especially with xSNMP not working under 2012.

  1. SCOM Network Monitoring and MIB File | SCOM, Powershell & Azure
  2. Q&A from Operations Manager Evolution: Taking Your Environment to the Next Level with Operations Manager (#SCOM, #SYSCTR) | Catapult Systems

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: