Book Image

Microsoft Operations Management Suite Cookbook

By : Chiyo Odika
Book Image

Microsoft Operations Management Suite Cookbook

By: Chiyo Odika

Overview of this book

Microsoft Operations Management Suite Cookbook begins with an overview of how to hit the ground running with OMS insights and analytics. Next, you will learn to search and analyze data to retrieve actionable insights, review alert generation from the analyzed data, and use basic and advanced Log search queries in Azure Log Analytics. Following this, you will explore some other management solutions that provide functionality related to workload assessment, application dependency mapping, automation and configuration management, and security and compliance. You will also become well versed with the data protection and recovery functionalities of OMS Protection and Recovery, and learn how to use Azure Automation components and features in OMS. Finally you will learn how to evaluate key considerations for using the Security and Audit solution, and working with Security and Compliance in OMS. By the end of the book, you will be able to configure and utilize solution offerings in OMS, understand OMS workflows, how to unlock insights, integrate capabilities into new or existing workflows, manage configurations, and automate tasks and processes.
Table of Contents (11 chapters)

Understanding Security and Audit data

Recall that, as part of the Security and Compliance solution offering in OMS, the Security and Audit solution is designed to provide you with a unified view of all security-related issues detected in your environment. The solution therefore weaves together data from disparate but related sources and solutions in your workspace, and leverages information from the intelligent security graph to unlock insights and enable you to prevent, detect, and remediate security threats in your environment. You can explore Security and Audit data by using the built-in solution visualizations, which enable you to interact with the underlying queries and resulting security records. You can also perform query operations using the query language to query security-related data in your OMS workspace.

...