O'Reilly logo

Microsoft Operations Management Suite Cookbook by Chiyo Odika

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How it works...

The preceding query returns a list of the various types of data in your workspace. A cursory review of the various data types could easily indicate which types of data are related to security, as shown in the following screenshot. However, the Security and Audit solution makes use of various other data types in the list, including (but not limited to) Wire Data, DnsEvents, W3CIISLog, and Update:

Figure 6.21

The Security and Audit solution works with data collected from Windows Security Event logs, firewall logs, and AppLocker logs on Windows machines. On cross-platform machines, OMS collects security data from Syslog.

Examples ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required