Book Image

Microsoft Operations Management Suite Cookbook

By : Chiyo Odika
Book Image

Microsoft Operations Management Suite Cookbook

By: Chiyo Odika

Overview of this book

Microsoft Operations Management Suite Cookbook begins with an overview of how to hit the ground running with OMS insights and analytics. Next, you will learn to search and analyze data to retrieve actionable insights, review alert generation from the analyzed data, and use basic and advanced Log search queries in Azure Log Analytics. Following this, you will explore some other management solutions that provide functionality related to workload assessment, application dependency mapping, automation and configuration management, and security and compliance. You will also become well versed with the data protection and recovery functionalities of OMS Protection and Recovery, and learn how to use Azure Automation components and features in OMS. Finally you will learn how to evaluate key considerations for using the Security and Audit solution, and working with Security and Compliance in OMS. By the end of the book, you will be able to configure and utilize solution offerings in OMS, understand OMS workflows, how to unlock insights, integrate capabilities into new or existing workflows, manage configurations, and automate tasks and processes.
Table of Contents (11 chapters)

Introduction

Growing and ever-changing security threats are some of the toughest challenges that organizations face today. As threat actors and defenders adapt to the exponential growth of business data, and advances in technology and security-related capabilities, the need for organizations to implement a coherent cybersecurity strategy is greater than ever. As IT security and operations team grapple with the challenges of managing and securing highly complex, cross-platform, and hybrid cloud systems that are increasingly subject to a rising number of sophisticated cyber attacks, organizations are coming to terms with the reality that a security strategy that revolves around traditional, perimeter-based defenses alone is no longer a sound strategy. This outdated strategy should be supplanted by cybersecurity that is cloud-enabled and based on, among other things, real-time analysis...