Microsoft Advanced Threat Analytics support in OMS Security

Summary: Introducing Microsoft Advanced Threat Analytics support in OMS Security. Currently, OMS Security offers basic integration with Microsoft Advanced Threat Analytics. This integration is based on the event logs that Microsoft Advanced Threat Analytics provides. The advantage of these capabilities is that you can see suspicious activities that Microsoft Advanced Threat Analytics triggers along with other…


OMS Security malware assessment adds support for more antimalware vendors

FAST FACT: OMS Security is adding support for Symantec Endpoint Protection and Trend Micro Deep Security to its Antimalware assessment solution. This service update adds support for assessing whether servers are protected by anti-malware solutions from these vendors and whether these solutions are operational. The OMS Antimalware dashboard now reflects this new feature. ======================================== Microsoft Operations Management…


Investigating Suspicious Activity in a Hybrid Cloud with OMS Security

Monitoring devices in a hybrid environment is imperative to your secure posture. The intent of having a tight secure posture is to close the gap between discovering a threat and taking an action to properly have countermeasures in place. Monitoring will play a big role in the detection phase of your secure posture as shown in…


Keep on improving OMS Security advanced detections – now available for European customers

Summary: OMS Security advanced detections will automatically be enabled for all OMS Security customers who have workspaces in Europe. Since we introduced the advanced detection capability in OMS Security last August, we have seen it in action for thousands of customers. It scans more than seven billion events per day and analyzes them to generate…


Filter the security events the OMS Security collects

OMS Security collects all events from Windows Security, App Locker, and Firewall event logs. As OMS is a big data service, it can handle a large amount of data, and customers don’t need to carefully sift through their events to decide which ones to save. But, we have heard from customers that in some cases,…


Moving from SCOM Audit Collection Services to OMS Security

Many customers are using System Center Operations Management Audit Collection Services to audit their systems and produce compliance reports. In the last few months, we have seen many of them looking to do the same in a cloud delivery model. Cloud has many advantages for audit scenarios because it inherently solves problems related to storage…


Add your Cisco ASA logs to OMS Security

Summary: Forward your Cisco ASA logs to OMS via the Linux agent, and use OMS to analyze the logs. Hello, this is Meir Mendelovich from the OMS team, and today I want to talk about forwarding your Cisco ASA logs to OMS via the Linux agent. OMS Security and Audit solution provides security insights about many…


Use OMS Security to assess the Security Configuration Baseline

Summary: Learn about the security baseline assessment capability in OMS Security & Audit. The most important defense against malicious attackers is to ensure that the server’s operating system is well hardened and using available built-in security capabilities. Server operating systems are delivered with a wide range of security measures. Some of them are enabled by default, and…


What is OMS Security Threat Intelligence and why do I need it?

Organizations were used to protect their system from adversaries by enhancing their own defense mechanisms. While each organization can fight them alone, threat intelligence offers a way to use knowledge that is gathered by other organizations and security researchers to make the defense more effective. OMS Security and Audit solution now provides you threat intelligence…

6

Operations Management Suite (OMS) Adds Security Analytics to Power Threat Detection

SUMMARY: OMS adds Security Analytics to Power Threat Detection for the Security and Audit solution The OMS Security and Audit solution includes many tools to secure your organization and detect threats. It has access to all of this security data across your environment, provides insight into your security posture, and correlates data with threat intelligence….

3