How to Cheat at Managing Microsoft Operations Manager 2005
- Anthony Piltzecker, Tony Piltzecker is an independent consultant based in Boston, MA, and author of a number of books published by Syngress. Tony's background includes positions as Systems Practice Manager for Presidio Networked Solutions, IT Manager for SynQor Inc., Network Architect for Planning Systems, Inc., and Senior Networking Consultant with Integrated Information Systems. Tony has also been published in over 20 magazines, and has spoken at various events on topics ranging from IT security to unified communications.
Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever find them, thereby enabling administrators to lower their costs of operations and simplify management of their Windows Server System infrastructure. MOM can notify system administrators of overloaded processors, depleted memory, or failed network connections affecting their Windows servers long before these problems bother users.Microsoft Operations Manager (MOM) 2005 delivers open and scalable enterprise-class operational management by providing comprehensive event management, proactive monitoring and alerting, reporting and trend analysis, and system and application specific knowledge and tasks to improve the manageability of Windows Server System environments, including Windows, Exchange, SQL, IIS, Active Directory etc.View full description
- Published: March 2006
- Imprint: SYNGRESS
- ISBN: 978-1-59749-251-5
Table of ContentsChapter 1 Designing a Secure Network Framework Chapter 2 Securing Servers Based on Function Chapter 3 Designing a Secure Public Key Infrastructure Chapter 4 Securing the Network Management Process Chapter 5 Securing Network Services and Protocols Chapter 6 Securing Internet Information Services Chapter 7 Securing VPN and Extranet Communications Chapter 8 Securing Active Directory Chapter 9 Securing Network Resources Chapter 10 Securing Network Clients Self Test Appendix