SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Operations Manager 2007 R2
                 & Audit Collection services to monitor and audit
                 your AD-based security policies




Olivier MICHOT                                                      Nicolas LOUVIOT
Managing Director Operations                                    Technical Manager
Agenda


   Monitoring and Core IO
   Operations Manager 2007
   New features in SCOM 2007 R2
   AD and Security monitoring
   Audit Collection Services (ACS)
   Recommendations & guidelines
Monitoring and Core IO


Business value to you organization?
 Microsoft Core IO initiative: from Basic to Dynamic
 System Center Operations Manager provides key
   features to end-to-end services monitoring and real-
   time system health check.
Operations Manager 2007


 Enterprise monitoring solution for AD environments
 State, health and performance information
 Alerts according to some availability, performance,
  configuration or security situations being identified
 Management Packs provide
  best practice knowledge to discover,
  monitor, troubleshoot and Report
 Role-based security model
Operations Manager added-value

  Deliver value right away
        Easy installation & quick results
        Support for complex environments & prescriptive guidance
  Run operations more productively
        Proactive monitoring based upon pre-defined rule sets
        Notification of issues within the environment
        Allows creation of customized self healing processes
  Decrease overall workload
        Reduction of manual tasks & alerts consolidation
        Centralized management tool across the organization
Management packs
Microsoft Applications
    BizTalk Server
    Exchange Server
    Host Integration Server                     Windows
    Identity Integration Server                    Windows Operating Systems
    Internet Security and Acceleration Server      Active Directory
    Microsoft Operations Manager
    Project Server                                 DNS service
    Proxy Server                                   IIS versions
    SharePoint Server                              Server clusters
    SQL Server                                     Component Services (formerly MTS 2.0)
    Systems Management Server 2003 / 2.0           Message Queuing (MSMQ)
    …                                              Distributed Transaction Coordinator (MS DTC)
                                                   .NET Framework
3rd Party Platforms                                Windows Internet Name Service (WINS)
    eXc Software: IBM AS400, IBM z/OS, Unix,       Windows SharePoint Services
Linux                                              Network Load Balancing
    Metilinx: Linux/Unix                           Routing and Remote Access service
    3rd Party Devices                              Terminal Services
    JalaSOFT: Cisco Routers and Switches           File Replication Services
3rd Party Hardware                                 Advanced Deployment Services
    Dell OpenManage                                Group Policy
    HP Insight Manager
    IBM Director
Knowledge Base



   Knowledge is a key feature
   Facilitates rapid issue resolution
   Empowers front line operators
   Less escalation
   Faster resolution
OpsMgr Reporting & Analysis


   Microsoft SQL Server Reporting Services
   More than 100 predefined reports
   System monitoring and operations
   Capacity planning
   Performance analysis
   Application-specific monitoring
Reports


   Reports are interactive
   Easy navigation through views
   Interface can launch tasks
   Reports are run from the Console
   Support for scheduling reports
   Favorite reports
New features in SCOM 2007 R2

 User interface, performance and scalability
 Cross-platform monitoring
 Service Level Tracking
Cross-Platform Monitoring


 Extend end-to-end monitoring to distributed applications
  deployed across heterogeneous platforms and operating
  systems
 Monitor Windows Server, Linux and
                                            ERP Application
  Unix – all from a single console
 Setup non-Windows agents
                                       Databases   Servers      Web Servers




                                      Order DB     App1      OTW-IIS- OTW-
                                                               01     IIS-02
Service Level Tracking


 Define SLOs against state and
  performance data
 Extended service level reporting
  capabilities
 SharePoint integration for
  displaying service level
  performance within the
  organization
                                            “I need to track the availability of my
                                     Exchange service against my agreed service level goal
                                          of 99.99% during regular business hours”
Service Level Tracking




Demo
Audit Collection Services
& how it can help you monitoring and auditing your
AD-based security policies
Why Monitor AD and Security?

 Active Directory is at the heart of Windows-based
  environment security
 Regulatory compliance impacts the whole organization
 AD problems can be extremely disruptive if left
  undetected:
        Slow login/login failures/password issues
        Group Policy & resource access problems
        Security issues
        Exchange Issues
 AD problems are trivial to fix when detected early, but
  rapidly become complex when ignored
 Replication issues can lead to security holes
 Business applications critically depend on AD
Active Directory Management Pack

 Active Directory MP Provides
   Core Active Directory monitoring rules
   Client side monitoring capabilities
   Replication and trust monitoring
   Active Directory health and state monitoring
 What it’s lacking…. security monitoring
   Changes to membership of key groups
   Enterprise Admins, Domain Admins, Schema Admins
   User accounts and Groups created / deleted / modified
   Password changes by non account owner
   Access to sensitive files/folders
   Changes to OU Permissions
Security Event Log


The security event log is important :
 Security privilege changes are logged
 Security threats are identified, e.g. hacking and virus
 Unauthorized use of resources are tracked
 Auditors and security officers can monitor for misuse
  for regulatory compliance
 Administrators can track activity, e.g. account lockouts
 Applications can create events when
  security fails within their scope
Limitations


But :
 It only keeps a certain amount of historical
  information
 Security event log is only as trustworthy as the
  administrators
 Analysis of distributed logs is difficult and
  time consuming
 Delegation to auditors or security officers is
  not possible
The solution is ACS


   Mean to collect records generated by an audit policy
   Delegation of auditing to non-IT staff
   Centrally stores Windows security event log
   Consolidation of logs provides normalized overview
   Dedicated (secured) database – Immutable collection policy
   Enables for forensic (legal) analysis using reports
   Solution for regulatory compliance such as SOX or CSSF
ACS Infrastructure Design
ACS & Ops Manager


 Fully integrated in SCOM infrastructure (free add-on)
 Out-of-the-box but customizable reports from Microsoft
 High Performance
      up to 2,500 events/sec (continuous load)
      up to 100,000 events/sec (short burst )
 High Scalability
      3,000 non-DC servers
      150 Domain Controllers
      20,000 workstations
Audit Collection Services


Demo
Recommendations


 Auditing is based upon user accounts

 Not use local administrator accounts (disable or use
  random passwords)
 Never use the built-in domain admin account (enforce
  using two-person strategy)
 Provide IT persons with 2 accounts:
      Standard account
      Admin account
 Delegate administration privileges
Deployment guidelines


 Define the range of events to audit
 Simulate the scenario activity in a lab to identify the
  Events and Event IDs generated i.e. modify Domain
  Admins group membership
 Create rules / monitors based on these events
 Verify that rules / monitors are working correctly
 Verify that your reports return relevant information
 Deploy your rules / monitors in production but limit
  distribution to mitigate risk
Resources

Microsoft:
SCOM 2007 Home:
http://www.microsoft.com/systemcenter/opsmgr/
SCOM Technet library Home:
http://technet.microsoft.com/en-us/library/bb310604.aspx
Management Packs Catalog:
http://pinpoint.microsoft.com/en-US/systemcenter/managementpackcatalog

Community:
http://www.systemcentercentral.com
http://scug.be
http://opsmgr.fr
SCOM 2007 & Audit Collection Services

Weitere ähnliche Inhalte

Was ist angesagt?

From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...Joris Faure
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Vignesh Ganesan I Microsoft MVP
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint ManagerGeorge Grammatikos
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through WebEric Inch
 
Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Albert Hoitingh
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...
Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...
Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...Joel Oleson
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewITJobZone.biz
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next levelRonny de Jong
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maioAntonioMaio2
 

Was ist angesagt? (20)

From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
EC-Council Products and career path
EC-Council Products and career pathEC-Council Products and career path
EC-Council Products and career path
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...
Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...
Microsoft 365 Tenant Administration: Understanding Microsoft 365 Administrati...
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 

Ähnlich wie SCOM 2007 & Audit Collection Services

Operations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 OverviewOperations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 OverviewAmit Gatenyo
 
Operations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 OverviewOperations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 OverviewAmit Gatenyo
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewAmit Gatenyo
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007Amit Gatenyo
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesAmit Gatenyo
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twppptMizuhashi Yuki
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012Amit Gatenyo
 
Overview Of Microsoft Private Cloud
Overview Of Microsoft Private CloudOverview Of Microsoft Private Cloud
Overview Of Microsoft Private CloudLai Yoong Seng
 
Managing IT as A Service with System Center
Managing IT as A Service with System CenterManaging IT as A Service with System Center
Managing IT as A Service with System CenterLai Yoong Seng
 
Ws08 R2 Itpro Session 1 Technical Overview Part1
Ws08 R2 Itpro Session 1 Technical Overview Part1Ws08 R2 Itpro Session 1 Technical Overview Part1
Ws08 R2 Itpro Session 1 Technical Overview Part1chenley
 
Monitoring your data center with scom
Monitoring your data center with scomMonitoring your data center with scom
Monitoring your data center with scomMojammel Hossain
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringAmit Gatenyo
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xguest879489
 
Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006guest879489
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xguest879489
 
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90Microsoft TechNet
 
Introduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxIntroduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxEverestMedinilla2
 

Ähnlich wie SCOM 2007 & Audit Collection Services (20)

Operations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 OverviewOperations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 Overview
 
Operations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 OverviewOperations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 Overview
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft Technologies
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
 
SMS
SMSSMS
SMS
 
SMS
SMSSMS
SMS
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
Overview Of Microsoft Private Cloud
Overview Of Microsoft Private CloudOverview Of Microsoft Private Cloud
Overview Of Microsoft Private Cloud
 
Managing IT as A Service with System Center
Managing IT as A Service with System CenterManaging IT as A Service with System Center
Managing IT as A Service with System Center
 
Ws08 R2 Itpro Session 1 Technical Overview Part1
Ws08 R2 Itpro Session 1 Technical Overview Part1Ws08 R2 Itpro Session 1 Technical Overview Part1
Ws08 R2 Itpro Session 1 Technical Overview Part1
 
Monitoring your data center with scom
Monitoring your data center with scomMonitoring your data center with scom
Monitoring your data center with scom
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
 
Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
 
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
 
Introduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxIntroduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptx
 

SCOM 2007 & Audit Collection Services

  • 1. Operations Manager 2007 R2 & Audit Collection services to monitor and audit your AD-based security policies Olivier MICHOT Nicolas LOUVIOT Managing Director Operations Technical Manager
  • 2. Agenda  Monitoring and Core IO  Operations Manager 2007  New features in SCOM 2007 R2  AD and Security monitoring  Audit Collection Services (ACS)  Recommendations & guidelines
  • 3. Monitoring and Core IO Business value to you organization?  Microsoft Core IO initiative: from Basic to Dynamic  System Center Operations Manager provides key features to end-to-end services monitoring and real- time system health check.
  • 4. Operations Manager 2007  Enterprise monitoring solution for AD environments  State, health and performance information  Alerts according to some availability, performance, configuration or security situations being identified  Management Packs provide best practice knowledge to discover, monitor, troubleshoot and Report  Role-based security model
  • 5. Operations Manager added-value  Deliver value right away  Easy installation & quick results  Support for complex environments & prescriptive guidance  Run operations more productively  Proactive monitoring based upon pre-defined rule sets  Notification of issues within the environment  Allows creation of customized self healing processes  Decrease overall workload  Reduction of manual tasks & alerts consolidation  Centralized management tool across the organization
  • 6. Management packs Microsoft Applications BizTalk Server Exchange Server Host Integration Server Windows Identity Integration Server Windows Operating Systems Internet Security and Acceleration Server Active Directory Microsoft Operations Manager Project Server DNS service Proxy Server IIS versions SharePoint Server Server clusters SQL Server Component Services (formerly MTS 2.0) Systems Management Server 2003 / 2.0 Message Queuing (MSMQ) … Distributed Transaction Coordinator (MS DTC) .NET Framework 3rd Party Platforms Windows Internet Name Service (WINS) eXc Software: IBM AS400, IBM z/OS, Unix, Windows SharePoint Services Linux Network Load Balancing Metilinx: Linux/Unix Routing and Remote Access service 3rd Party Devices Terminal Services JalaSOFT: Cisco Routers and Switches File Replication Services 3rd Party Hardware Advanced Deployment Services Dell OpenManage Group Policy HP Insight Manager IBM Director
  • 7. Knowledge Base  Knowledge is a key feature  Facilitates rapid issue resolution  Empowers front line operators  Less escalation  Faster resolution
  • 8. OpsMgr Reporting & Analysis  Microsoft SQL Server Reporting Services  More than 100 predefined reports  System monitoring and operations  Capacity planning  Performance analysis  Application-specific monitoring
  • 9. Reports  Reports are interactive  Easy navigation through views  Interface can launch tasks  Reports are run from the Console  Support for scheduling reports  Favorite reports
  • 10. New features in SCOM 2007 R2  User interface, performance and scalability  Cross-platform monitoring  Service Level Tracking
  • 11. Cross-Platform Monitoring  Extend end-to-end monitoring to distributed applications deployed across heterogeneous platforms and operating systems  Monitor Windows Server, Linux and ERP Application Unix – all from a single console  Setup non-Windows agents Databases Servers Web Servers Order DB App1 OTW-IIS- OTW- 01 IIS-02
  • 12. Service Level Tracking  Define SLOs against state and performance data  Extended service level reporting capabilities  SharePoint integration for displaying service level performance within the organization “I need to track the availability of my Exchange service against my agreed service level goal of 99.99% during regular business hours”
  • 14. Audit Collection Services & how it can help you monitoring and auditing your AD-based security policies
  • 15. Why Monitor AD and Security?  Active Directory is at the heart of Windows-based environment security  Regulatory compliance impacts the whole organization  AD problems can be extremely disruptive if left undetected:  Slow login/login failures/password issues  Group Policy & resource access problems  Security issues  Exchange Issues  AD problems are trivial to fix when detected early, but rapidly become complex when ignored  Replication issues can lead to security holes  Business applications critically depend on AD
  • 16. Active Directory Management Pack  Active Directory MP Provides  Core Active Directory monitoring rules  Client side monitoring capabilities  Replication and trust monitoring  Active Directory health and state monitoring  What it’s lacking…. security monitoring  Changes to membership of key groups  Enterprise Admins, Domain Admins, Schema Admins  User accounts and Groups created / deleted / modified  Password changes by non account owner  Access to sensitive files/folders  Changes to OU Permissions
  • 17. Security Event Log The security event log is important :  Security privilege changes are logged  Security threats are identified, e.g. hacking and virus  Unauthorized use of resources are tracked  Auditors and security officers can monitor for misuse for regulatory compliance  Administrators can track activity, e.g. account lockouts  Applications can create events when security fails within their scope
  • 18. Limitations But :  It only keeps a certain amount of historical information  Security event log is only as trustworthy as the administrators  Analysis of distributed logs is difficult and time consuming  Delegation to auditors or security officers is not possible
  • 19. The solution is ACS  Mean to collect records generated by an audit policy  Delegation of auditing to non-IT staff  Centrally stores Windows security event log  Consolidation of logs provides normalized overview  Dedicated (secured) database – Immutable collection policy  Enables for forensic (legal) analysis using reports  Solution for regulatory compliance such as SOX or CSSF
  • 21. ACS & Ops Manager  Fully integrated in SCOM infrastructure (free add-on)  Out-of-the-box but customizable reports from Microsoft  High Performance  up to 2,500 events/sec (continuous load)  up to 100,000 events/sec (short burst )  High Scalability  3,000 non-DC servers  150 Domain Controllers  20,000 workstations
  • 23. Recommendations  Auditing is based upon user accounts  Not use local administrator accounts (disable or use random passwords)  Never use the built-in domain admin account (enforce using two-person strategy)  Provide IT persons with 2 accounts:  Standard account  Admin account  Delegate administration privileges
  • 24. Deployment guidelines  Define the range of events to audit  Simulate the scenario activity in a lab to identify the Events and Event IDs generated i.e. modify Domain Admins group membership  Create rules / monitors based on these events  Verify that rules / monitors are working correctly  Verify that your reports return relevant information  Deploy your rules / monitors in production but limit distribution to mitigate risk
  • 25. Resources Microsoft: SCOM 2007 Home: http://www.microsoft.com/systemcenter/opsmgr/ SCOM Technet library Home: http://technet.microsoft.com/en-us/library/bb310604.aspx Management Packs Catalog: http://pinpoint.microsoft.com/en-US/systemcenter/managementpackcatalog Community: http://www.systemcentercentral.com http://scug.be http://opsmgr.fr