Set the Run As Account for Lync Server

System Center Advisor leverages the System Center Operations Manager agent and management pack technology as the foundation for the Advisor agent on-premise software. Advisor builds upon management packs for workloads to provide value-add services. For workloads, such as Lync Server, that require workload-specific privileges to run management packs in a different security context, such as a domain account, you need to provide credential information either by configuring a System Center Operations Manager Run As account or through the management interface, a PowerShell cmdlet script, that is shipped with Advisor v1.1 and later. The account needs to be a member of both the local Administrators and the Lync RTCUniversalUserAdmins security groups.

Use the following steps to set the account if you are connecting to Advisor by using Operations Manager.

  1. Open the Operations console, and then click Administration.

  2. Click Profiles, under Run As Configuration, and open the properties of System Center Advisor Lync Run As Account.

  3. Go to the Run As Accounts page, and then click Add.

  4. Select a Windows Run As account that is a member of both the Local Administrators and the Lync RTCUniversalUserAdmins security groups.

    Note

    The Run As account type must be Windows.

  5. Click Save.

Use the following steps to set the account if your agents are connecting to Advisor by using the Advisor gateway.

  1. On the gateway, open a PowerShell window.

  2. Run the following cmdlet to add the Advisor PowerShell snap-in (if you have not already added it):

    add-pssnapin microsoftadvisorsnapin
    
  3. Run the following. When prompted, provide the credential for the member of the Local Administrators and the RTCUniversalUserAdmins security groups for the action.

    $credential = get-credential
    
  4. Run the Set-SCAdvisorActionAccount cmdlet to set the credentials for the agents. For example, if the agent computer names are Agent1.contoso.com, Agent2.contoso.com, and Agent3.contoso.com, run the following:

    Set-SCAdvisorActionAccount -ActionAccountName Microsoft.KnowledgeServices.ElevatedAccount -Credential $credential -Action Add -AllowedComputer @("Agent1.contoso.com”, “Agent2.contoso.com”, “Agent3.contoso.com”)
    

    Tip

    You can use run Get-SCAdvisorActionAccount -validateCredential to view the action accounts you just set.

  5. Restart the Advisor gateway service

  6. Restart the Advisor agent service on the computer you specified in the previous step, and then the agent will monitor your server using the elevated credentials.