alphaspirit - Fotolia
Operations Management Suite, one of Microsoft's newer management tools, promises to help IT administrators troubleshoot issues both with the on-premises infrastructure, as well as in Azure and other cloud platforms.
Once Microsoft's Operations Management Suite (OMS) is connected and running on selected systems, either through System Center or standalone agents, administrators can use Microsoft OMS to analyze the voluminous log data generated by managed systems in the on-premises environment or in the cloud. Customizable analysis and reporting provides real-time results that help with root-cause analysis and troubleshooting. Additionally, Microsoft OMS can provide long-term historical insights for strategic planning for infrastructure growth and optimization.
OMS data lets administrators monitor operating system resources, identify overprovisioned virtual machines, locate systems with missing updates, find malware, forecast future resource usage, report unauthorized system changes -- or deviations from established best practices -- and spot suspicious activities around systems and storage.
Microsoft OMS has detailed search capabilities; administrators can search logs for keywords or critical values to reveal potential problem areas or opportunities for improvement. Microsoft OMS log analysis features are designed around "solution packs," which provide defined rules and process algorithms that address specific analytical tasks or products.
There are about a dozen Microsoft solution packs. For example, the OMS Assessment Solution works to assess the risk and health of Active Directory environments at regular intervals, and then provides a prioritized list of recommendations for specific deployments. As another example, the OMS Malware Assessment Solution helps identify servers that are infected -- or at a risk of infection -- and makes recommendations for attention. Third-party vendors may also eventually create and release solution packs that further expand Microsoft OMS by addressing specific products or technologies.
Set limits on resources with Active Directory in Azure
How to maintain control over audit logs
Resolving Windows file share copy errors
Dig Deeper on Windows administration tools
Related Q&A from Stephen J. Bigelow
Microsoft Hyper-V on Windows comes with advanced protection schemes, including several virtualization-based security features the company introduced ... Continue Reading
The BitLocker encryption technology continues to evolve from its roots as a Windows Vista feature to protect resources both in the local data center ... Continue Reading
Some enterprises avoid the public cloud due to its multi-tenant nature and data security concerns. Learn what data separation is and how it can keep ... Continue Reading