SCOM Security Monitoring in Action: Detecting an Attacker

Disclaimer: Due to changes in the MSFT corporate blogging policy, I’m moving all of my content to the following location. Please reference all future content from that location. Thanks. This is a fun little story today, but I got to see first hand how our security management pack works during a real, non-simulated attack.  I…

3