Oracle® Audit Vault and Database Firewall: Auditor's Guide Release 12.1.2
Oracle® Audit Vault and Database Firewall: Auditor's Guide Release 12.1.2
Oracle® Audit Vault and Database Firewall: Auditor's Guide Release 12.1.2
July 2017
Oracle Audit Vault and Database Firewall Auditor's Guide, Release 12.1.2
E27777-15
Copyright © 2012, 2017, Oracle and/or its affiliates. All rights reserved.
Contributing Authors: Maitreyee Chaliha, Tanmay Choudhury, Pat Huey, Sheila Moore
This software and related documentation are provided under a license agreement containing restrictions on
use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,
transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is
prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If
you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it
on behalf of the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software,
any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users
are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and
agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and
adaptation of the programs, including any operating system, integrated software, any programs installed on
the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to
the programs. No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management
applications. It is not developed or intended for use in any inherently dangerous applications, including
applications that may create a risk of personal injury. If you use this software or hardware in dangerous
applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other
measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages
caused by use of this software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of
their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks
are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD,
Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced
Micro Devices. UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content,
products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and
expressly disclaim all warranties of any kind with respect to third-party content, products, and services
unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its
affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of
third-party content, products, or services, except as set forth in an applicable agreement between you and
Oracle.
Contents
Preface ............................................................................................................................................................... xv
Audience..................................................................................................................................................... xv
Documentation Accessibility ................................................................................................................... xv
Related Documents ................................................................................................................................... xv
Conventions ............................................................................................................................................... xvi
iii
Understanding Audit Policies and Audit Data Collection .............................................................. 1-8
About Audit Policies and Audit Data Collection .......................................................................... 1-8
Requirements for Collecting Audit Data from Secured Targets ................................................. 1-9
Requirements for Oracle Database........................................................................................... 1-9
Requirements for SQL Server, Sybase ASE, and IBM DB2 Databases ............................. 1-10
Configuring Alerts and Notifications ............................................................................................... 1-10
Generating Reports ............................................................................................................................... 1-11
Creating Users and Managing Access ............................................................................................... 1-11
Logging in to Audit Vault Server Console....................................................................................... 1-11
Logging in to the Audit Vault Server Console ........................................................................... 1-11
Understanding the Tabs in the Audit Vault Server Console UI............................................... 1-11
Working with Lists of Objects in the UI....................................................................................... 1-12
iv
Creating or Modifying an Email Template .................................................................................... 3-5
Viewing Enforcement Point and Audit Trail Status ......................................................................... 3-7
Viewing Enforcement Point Status.................................................................................................. 3-7
Viewing Audit Trail Status ............................................................................................................... 3-7
Monitoring Jobs........................................................................................................................................ 3-7
v
Deploying Firewall Policies to Secured Targets ......................................................................... 4-16
6 Generating Reports
About the Reports in Audit Vault and Database Firewall............................................................... 6-1
Related Event Data Appendices ...................................................................................................... 6-2
Browsing the Built-In Reports............................................................................................................... 6-2
Downloading a Report in HTML or CSV Format.............................................................................. 6-3
Customizing the Built-in Reports ......................................................................................................... 6-3
About Customizing Built-in Reports............................................................................................... 6-3
Filtering and Controlling the Display of Data in a Report........................................................... 6-3
About Filtering and Display Settings in Reports ................................................................... 6-3
Filtering Data in a Report .......................................................................................................... 6-4
Hiding or Showing Columns in a Report................................................................................ 6-5
Formatting Data in a Report...................................................................................................... 6-6
vi
Resetting the Report Display Values to Their Default Settings ........................................... 6-9
Saving your Customized Reports ................................................................................................. 6-10
Accessing Your Saved Custom Reports....................................................................................... 6-10
Scheduling and Generating PDF or XLS Reports........................................................................... 6-11
About Scheduling and Creating PDF or XLS Reports ............................................................... 6-11
Creating a Report Schedule ........................................................................................................... 6-11
Viewing or Modifying Report Schedules .................................................................................... 6-13
Downloading Generated Reports in PDF or XLS Format ......................................................... 6-13
Notifying Users About Generated PDF or XML Reports.......................................................... 6-13
Annotating and Attesting Reports ..................................................................................................... 6-14
Creating and Uploading Your Own Custom Reports .................................................................... 6-15
Audit Report Descriptions .................................................................................................................. 6-15
About the Audit Reports................................................................................................................ 6-15
Activity Reports............................................................................................................................... 6-16
About the Activity Reports..................................................................................................... 6-16
Activity Overview Report....................................................................................................... 6-16
Data Access Report .................................................................................................................. 6-17
Data Modification Report ....................................................................................................... 6-17
Data Modification Before-After Values ................................................................................ 6-17
Database Schema Changes Report ........................................................................................ 6-17
All Activity Report................................................................................................................... 6-17
Failed Logins Report ............................................................................................................... 6-17
User Login and Logout Report .............................................................................................. 6-17
Entitlements Changes Report................................................................................................. 6-17
Audit Settings Changes Report.............................................................................................. 6-17
Secured Targets Startup/Shutdown Report ........................................................................ 6-17
Alert Reports.................................................................................................................................... 6-17
Stored Procedure Auditing Reports ............................................................................................. 6-18
Compliance Report Descriptions ....................................................................................................... 6-18
About the Compliance Reports..................................................................................................... 6-19
Associating Secured Targets with Compliance Report Categories ......................................... 6-19
Reports Included in Each Compliance Report Category .......................................................... 6-19
Specialized Database Firewall Report Descriptions ...................................................................... 6-20
About the Specialized Database Firewall Reports ..................................................................... 6-20
Database Firewall Policy Reports ................................................................................................. 6-21
Database Firewall F5 Reports ........................................................................................................ 6-21
7 Managing Entitlements
Managing and Viewing Entitlement Data .......................................................................................... 7-1
Working With Entitlement Snapshots and Labels ............................................................................ 7-2
About Entitlement Snapshots and Labels ...................................................................................... 7-2
Creating, Modifying, or Deleting Labels for Entitlement Snapshots ......................................... 7-2
Assigning Labels to Entitlement Snapshots ................................................................................... 7-3
Generating Entitlement Reports ........................................................................................................... 7-3
About Viewing Entitlement Reports with Snapshots and Labels............................................... 7-3
Viewing Entitlement Reports by Snapshot or Label ..................................................................... 7-3
Comparing Entitlement Data Using Snapshots or Labels............................................................ 7-4
vii
Entitlement Report Descriptions........................................................................................................... 7-4
About the Entitlement Reports ........................................................................................................ 7-5
User Accounts Reports ...................................................................................................................... 7-5
User Privileges Reports ..................................................................................................................... 7-5
User Profiles Reports ......................................................................................................................... 7-6
Database Roles Reports ..................................................................................................................... 7-6
System Privileges Reports................................................................................................................. 7-6
Object Privileges Reports .................................................................................................................. 7-7
Privileged Users Reports................................................................................................................... 7-7
8 Creating Alerts
About Alerts .............................................................................................................................................. 8-1
Creating and Configuring Alerts .......................................................................................................... 8-1
Creating Alert Status Values ............................................................................................................ 8-2
Creating or Modifying an Alert ....................................................................................................... 8-2
Defining Alert Conditions ................................................................................................................ 8-3
About Alert Conditions.............................................................................................................. 8-4
Creating an Alert Condition...................................................................................................... 8-4
Forwarding Alerts to Syslog (AVDF 12.1.2)................................................................................... 8-6
Monitoring Alerts............................................................................................................................... 8-6
Disabling, Enabling, or Deleting Alerts .......................................................................................... 8-7
Responding to an Alert ........................................................................................................................... 8-7
viii
Peer Association Events ....................................................................................................................... C-11
Role and Privilege Management Events........................................................................................... C-11
Service and Application Utilization Events ..................................................................................... C-12
System Management Events ............................................................................................................... C-12
Unknown or Uncategorized Events ................................................................................................... C-13
User Session Events .............................................................................................................................. C-14
ix
G IBM DB2 Audit Events
About the IBM DB2 for LUW Audit Events....................................................................................... G-1
Account Management Events................................................................................................................ G-1
Application Management Events......................................................................................................... G-2
Audit Command Events......................................................................................................................... G-3
Data Access Events.................................................................................................................................. G-3
Exception Events...................................................................................................................................... G-4
Invalid Record Events ............................................................................................................................ G-4
Object Management Events .................................................................................................................. G-4
Peer Association Events ......................................................................................................................... G-4
Role and Privilege Management Events............................................................................................. G-4
Service and Application Utilization Events ....................................................................................... G-5
System Management Events ................................................................................................................. G-6
Unknown or Uncategorized Events ..................................................................................................... G-9
User Session Events ................................................................................................................................ G-9
Target Type Values ............................................................................................................................... G-10
List 1 .................................................................................................................................................. G-10
List 2 .................................................................................................................................................. G-11
List 3 .................................................................................................................................................. G-12
Index
x
List of Figures
1–1 Audit Vault and Database Firewall Architecture................................................................... 1-4
3–1 Jobs Page ...................................................................................................................................... 3-8
6–1 Associating Secured Targets With Compliance Report Categories.................................. 6-19
xi
List of Tables
3–1 Tags Available for Alert Notification Email Templates ....................................................... 3-6
3–2 Tags Available for Report Notification Email Templates .................................................... 3-6
5–1 Fields Under Apply Audit Settings in the Audit Settings Page.......................................... 5-2
5–2 Columns in the Statement Audit Settings Page..................................................................... 5-6
5–3 Columns in the Object Audit Settings Page ........................................................................... 5-8
5–4 Columns in the Privilege Audit Settings Page ................................................................... 5-10
5–5 Columns in the Fine-Grained Audit Settings Page............................................................ 5-14
5–6 Columns in the Capture Rule Page ...................................................................................... 5-16
6–1 Stored Procedure Auditing Reports..................................................................................... 6-18
6–2 Compliance Reports Included for each Compliance Category........................................ 6-19
6–3 Database Firewall Policy Reports ......................................................................................... 6-21
6–4 Database Firewall F5 Reports................................................................................................ 6-21
8–1 Available Fields for Alert Conditions ..................................................................................... 8-4
A–1 AVSYS.SECURED_TARGET Table ........................................................................................ A-2
A–2 AVSYS.SECURED_TARGET_TYPE Table ............................................................................ A-2
A–3 AVSYS.AUDIT_TRAIL Table.................................................................................................. A-3
A–4 AVSYS.EVENT_LOG Table..................................................................................................... A-3
A–5 AVSYS.ALERT_STORE Table ................................................................................................. A-5
A–6 AVSYS.ALERT_EVENT_MAP Table..................................................................................... A-6
A–7 AVSYS.ALERT_NOTE Table .................................................................................................. A-6
A–8 AVSYS.UE_DBA_APPLICATION_ROLES........................................................................... A-7
A–9 AVSYS.UE_DBA_COL_PRIVS................................................................................................ A-8
A–10 AVSYS.UE_DBA_PROFILES................................................................................................... A-8
A–11 AVSYS.UE_DBA_ROLES......................................................................................................... A-9
A–12 AVSYS.UE_DBA_ROLE_PRIVS ............................................................................................. A-9
A–13 AVSYS.UE_DBA_SYS_PRIVS ............................................................................................... A-10
A–14 AVSYS.UE_DBA_TAB_PRIVS .............................................................................................. A-10
A–15 AVSYS.UE_DBA_USERS ....................................................................................................... A-11
A–16 AVSYS.UE_ROLE_SYS_PRIVS ............................................................................................. A-12
A–17 AVSYS.UE_ROLE_TAB_PRIVS ............................................................................................ A-12
A–18 AVSYS.UE_SYS_DBA_OPER_USERS ................................................................................. A-13
A–19 AVSYS.SPA_OBJECTS ........................................................................................................... A-13
A–20 AVSYS.SPA_EDITS................................................................................................................. A-14
A–21 AVSYS.FW_CLUSTER ........................................................................................................... A-14
A–22 AVSYS.FW_CLUSTER_COMPONENT .............................................................................. A-15
B–1 Audit Record Fields.................................................................................................................. B-1
C–1 Oracle Database Account Management Audit Events ........................................................ C-2
C–2 Oracle Database Application Management Audit Events .................................................. C-2
C–3 Oracle Database Audit Command Audit Events ................................................................. C-4
C–4 Oracle Database Data Access Audit Events.......................................................................... C-4
C–5 Database Vault Audit Events in Oracle Database 11g......................................................... C-5
C–6 Database Vault Audit Events in Oracle Database 12c ......................................................... C-5
C–7 Oracle Database Exception Audit Event ............................................................................... C-8
C–8 Oracle Database Invalid Record Audit Event....................................................................... C-9
C–9 Oracle Database Object Management Audit Events............................................................ C-9
C–10 Oracle Database Peer Association Audit Events................................................................ C-11
C–11 Oracle Database Role and Privilege Management Audit Events .................................... C-11
C–12 Oracle Database Service and Application Utilization Audit Events ............................... C-12
C–13 Oracle Database System Management Audit Events ........................................................ C-12
C–14 Oracle Database Unknown or Uncategorized Audit Events............................................ C-14
C–15 Oracle Database User Session Audit Events....................................................................... C-14
D–1 Sybase ASE Account Management Audit Events ................................................................ D-2
D–2 Sybase ASE Application Management Audit Events .......................................................... D-2
xii
D–3 Sybase ASE Audit Command Audit Events ......................................................................... D-2
D–4 Sybase ASE Data Access Audit Events .................................................................................. D-3
D–5 Sybase ASE Exception Audit Events...................................................................................... D-3
D–6 Sybase ASE Object Management Audit Events.................................................................... D-4
D–7 Sybase ASE Role and Privilege Management Audit Events .............................................. D-4
D–8 Sybase ASE Service and Application Utilization Audit Events ......................................... D-5
D–9 Sybase ASE System Management Audit Events .................................................................. D-6
D–10 Sybase ASE Unknown or Uncategorized Audit Events...................................................... D-7
D–11 Sybase ASE User Session Audit Events................................................................................. D-8
E–1 SQL Server Account Management Events ............................................................................ E-2
E–2 SQL Server Application Management Audit Events........................................................... E-3
E–3 SQL Server Audit Command Audit Events.......................................................................... E-3
E–4 SQL Server Audit Command Events Logged in Windows Event Viewer ....................... E-4
E–5 SQL Server Data Access Audit Event .................................................................................... E-4
E–6 SQL Server Exception Audit Events ...................................................................................... E-4
E–7 SQL Server Exception Events Logged in the Windows Event Viewer ............................. E-4
E–8 SQL Server Object Management Audit Events .................................................................... E-5
E–9 SQL Server Role and Privilege Management Audit Events ............................................... E-7
E–10 SQL Server Service and Application Utilization Audit Events.......................................... E-8
E–11 SQL Server System Management Audit Events ................................................................... E-9
E–12 Uncategorised Events............................................................................................................. E-10
E–13 SQL Server User Session Audit Events................................................................................ E-12
F–1 SQL Audit Events ..................................................................................................................... F-1
F–2 Event Log Events ...................................................................................................................... F-5
G–1 IBM DB2 Account Management Audit Events..................................................................... G-2
G–2 IBM DB2 Application Management Audit Events............................................................... G-2
G–3 IBM DB2 Audit Command Audit Events.............................................................................. G-3
G–4 IBM DB2 Data Access Audit Events....................................................................................... G-3
G–5 IBM DB2 Object Management Audit Events ........................................................................ G-4
G–6 IBM DB2 Role and Privilege Management Audit Events ................................................... G-5
G–7 IBM DB2 Service and Application Utilization Audit Events.............................................. G-5
G–8 IBM DB2 System Management Audit Events....................................................................... G-6
G–9 IBM DB2 Unknown or Uncategorized Audit Events .......................................................... G-9
G–10 IBM DB2 User Session Audit Events...................................................................................... G-9
H–1 MySQL Audit Events ............................................................................................................... H-1
I–1 Solaris Audit Events ................................................................................................................... I-1
J–1 Windows Audit Events ............................................................................................................. J-1
K–1 Linux Audit Events................................................................................................................... K-1
L–1 ACFS Security Objects Audit Events ...................................................................................... L-1
L–2 ACFS File System Objects Audit Events................................................................................. L-3
M–1 Directory Service Audit Trail Events ..................................................................................... M-1
M–2 Security Audit Trail Events .................................................................................................. M-13
xiii
xiv
Preface
Oracle Audit Vault and Database Firewall Auditor's Guide explains how an auditor uses
Oracle Audit Vault and Database Firewall (referred to as Oracle AVDF).
This preface contains the following topics:
■ Audience
■ Documentation Accessibility
■ Related Documents
■ Conventions
Audience
This document is intended for security managers, audit managers, and database
administrators (DBAs) who are involved in the configuration of Oracle Audit Vault
and Database Firewall.
Documentation Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle
Accessibility Program website at
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.
Related Documents
For more information, see the following documents in the Oracle Other Product One
Release 7.0 documentation set or in the Oracle Other Product Two Release 6.1
documentation set:
■ Oracle Audit Vault and Database Firewall Release Notes
■ Oracle Audit Vault and Database Firewall Administrator's Guide
■ Oracle Audit Vault and Database Firewall Installation Guide
■ Oracle Audit Vault and Database Firewall Developer's Guide
xv
Conventions
The following text conventions are used in this document:
Convention Meaning
boldface Boldface type indicates graphical user interface elements associated
with an action, or terms defined in text or the glossary.
italic Italic type indicates book titles, emphasis, or placeholder variables for
which you supply particular values.
monospace Monospace type indicates commands within a paragraph, URLs, code
in examples, text that appears on the screen, or text that you enter.
xvi
Quick Reference for Common Tasks
Topics
■ About this Quick Reference
■ Secured Targets
■ User Accounts and Access Rights
■ Status and Job Monitoring
■ Email Notifications
■ Firewall Policies
■ Audit Policies (for Oracle Databases)
■ Reports
■ Entitlements
■ Alerts
Secured Targets
xvii
"Setting Access Rights for Secured Targets and Groups" on page 2-7
Email Notifications
Firewall Policies
xviii
"Configuring Global Firewall Policy Settings" on page 4-14
Reports
xix
Entitlements
Alerts
xx
1
Introducing Oracle Audit Vault and Database
1
Firewall
Topics
■ Downloading the Latest Version of This Manual
■ System Features
■ Component Architecture
■ The Auditor’s Role
■ Understanding Secured Targets
■ Understanding Firewall Policies
■ Understanding Audit Policies and Audit Data Collection
■ Configuring Alerts and Notifications
■ Generating Reports
■ Creating Users and Managing Access
■ Logging in to Audit Vault Server Console
System Features
Topics
■ About Oracle Audit Vault and Database Firewall
■ Supported Secured Targets
■ Auditing Features
■ Administrative Features
■ Integrations With Third-Party Products
Auditing Features
Oracle AVDF auditing features allow an auditor to configure and manage the
following:
■ Firewall policies
■ Audit policies for Oracle Database
Administrative Features
Oracle AVDF administrative features allow an administrator to configure and manage
the following:
■ Secured Targets, their host computers, and their audit trail collection
■ Audit Vault Agent deployment
■ Database Firewalls in the database network
■ Audit data lifecycle, archiving, and purging
■ High Availability
■ Third party integrations
■ Access rights to secured targets and groups (super administrators only)
See Oracle Audit Vault and Database Firewall Administrator's Guide for detailed
information on administrative functions.
Component Architecture
Topics
■ How Oracle AVDF Components Work Together
■ The Audit Vault Server
■ The Database Firewall
■ The Audit Vault Agent
■ SQL statements
■ Database objects
■ Fine-grained auditing
■ Capture rules for redo log activity
Once you have configured the audit policies for an Oracle Database, you can then
provision them to the database. You will then be able to see, in the Audit Vault Server
console, if those policies are changed by a database administrator at the database.
For details, see "Creating Audit Policies for Oracle Databases" on page 5-1.
Topics
■ Requirements for Oracle Database
■ Requirements for SQL Server, Sybase ASE, and IBM DB2 Databases
Topics
■ Ensuring That Auditing Is Enabled in the Secured Target Database
■ Using Recommended Audit Settings in the Secured Target Database
Ensuring That Auditing Is Enabled in the Secured Target Database Before Oracle AVDF can
collect audit data from the secured target databases, auditing must be enabled in those
databases. A database administrator can check the type of auditing your database uses
by logging in to SQL*Plus and running the appropriate command.
For example, to check if standard auditing is enabled:
SQL> SHOW PARAMETER AUDIT_TRAIL
This output shows that standard auditing is enabled and audit records are being
written to the database audit trail.
For fine-grained auditing, you can query the AUDIT_TRAIL column of the DBA_AUDIT_
POLICIES data dictionary view to find the audit trail types that are set for the
fine-grained audit policies on the database.
Using Recommended Audit Settings in the Secured Target Database After your database
administrator checks that auditing is enabled, Oracle recommends that the following
areas of the database have auditing enabled:
■ Database schema or structure changes. Use the following AUDIT SQL statement
settings:
– AUDIT ALTER ANY PROCEDURE BY ACCESS;
– AUDIT ALTER ANY TABLE BY ACCESS;
– AUDIT ALTER DATABASE BY ACCESS;
Requirements for SQL Server, Sybase ASE, and IBM DB2 Databases
Ensure that auditing is enabled in these databases. You also should ensure that they
are correctly configured to send audit data to the Audit Vault Server. A database
administrator can check these requirements for you. For more information, check the
documentation for these databases and Oracle Audit Vault and Database Firewall
Administrator's Guide.
Generating Reports
As an Oracle AVDF auditor, you can generate various audit reports for the secured
targets to which you have access. You can schedule, print, and/or email the reports to
others, in PDF or XLS format. Reports include information on audit data, entitlements,
and stored procedures. You can also generate compliance reports to meet regulations
associated with credit card, financial, data protection, and health care-related data.
Oracle AVDF also lets you browse and customize report data interactively, and upload
your own custom reports created with third party tools.
For details, see:
■ "Generating Reports" on page 6-1
■ "Managing Entitlements" on page 7-1
where host is the server where you installed Audit Vault Server.
For example:
https://192.0.2.1/console
2. In the Login page, enter your user name and password, and then click Login.
The Home page appears.
■ View five types of graphical summaries (pie charts and bar graphs) of alert activity
and event activity over the specified time period. These graphical summaries
include:
– Recently Raised Alerts
This area displays alerts raised within the period you selected. You can view
specific alert levels by clicking See all Warning Alerts or See All Critical
Alerts.
– Attestation Actions
See report attestation actions you need to take within your selected time range.
– Top Five Audit Sources by Number of Alerts
Click a bar in this bar graph to find more detailed critical and warning alert
information that shows a severity level for a particular source.
– Failed Logins
See failed logins within your selected time range.
■ Filter: Filter the list by column or by row using regular expressions with the
available operators. When done, click Apply.
■ Format: Format the list by selecting from the following options:
– Sort
– Control Break
– Highlight
– Chart
– Group By
Fill in the criteria for each option as needed and click Apply.
■ Save Report: Save the current view of the list. Enter a name and description
and click Apply.
■ Reset: Reset the list to the default view.
■ Download: Download the list. Select the download format (CSV or HTML)
and click Apply.
Topics
■ About Managing Secured Targets
■ Viewing and Changing Settings for a Secured Target
■ Creating and Modifying Secured Target Groups
■ Managing Compliance for Secured Target Databases
■ Setting Access Rights for Secured Targets and Groups
Viewing a List of Enforcement Points for All Your Secured Target Databases
To list enforcement points configured for all your database secured targets:
1. Log into the Audit Vault Server console as an auditor, and click the Settings tab or
the Secured Targets tab.
2. From the Quick Links menu, click Enforcement Points.
3. Click the name of the enforcement point to see its details.
To view audit settings for Oracle databases from the secured target page:
1. Log into the Audit Vault Server console as an auditor, and click the Secured
Targets tab.
2. Select a secured target from the list.
3. Click the arrow to expand the Audit Policy section in this secured target. If the
secured target is not an Oracle database you will not see an Audit Policy section.
The Retrieve Audit Settings button allows you to retrieve this Oracle Database’s
audit settings at this point in time. See "Retrieving Audit Settings from an Oracle
Database" on page 5-2.
Audit policies for this secured target are listed in a table showing audit type,
number of settings in use and the number needed, and the number of problems
flagged. You can click the link for each audit type to go to the Audit Settings page
(Policy tab), and from there, modify the settings. See "Specifying Which Audit
Settings Are Needed" on page 5-3.
For detailed information on audit policies, see "Creating Audit Policies for Oracle
Databases" on page 5-1.
Topics
■ Managing User Accounts and Access
■ Creating Templates and Distribution Lists for Email Notifications
■ Viewing Enforcement Point and Audit Trail Status
■ Monitoring Jobs
Topics
■ About Managing User Access
■ Controlling Access by User
■ Controlling Access by Secured Target or Group
■ Modify a user account to grant or revoke access to one or more secured targets or
groups.
sends an email to two administrators warning them about misuse of the application
account.
To accomplish this, you must create an email distribution list that defines who will
receive the email, and then create an email template that contains a message. You
select the template to be used for email notification when you define the alert rule.
Table 3–2 lists the available tags for report notification templates.
Monitoring Jobs
You can see the status of various jobs that run on the Audit Vault Server, such as report
generation, and user entitlement or audit policy retrieval from secured targets.
To see the status of jobs in the Audit Vault Server:
1. Log in to the Audit Vault Server as an Auditor.
2. Click the Settings tab.
3. In the System menu, click Jobs.
A list of jobs is displayed, showing the job type, ID, timestamp, status, and
associated user name.
4. To see details for an individual job, click the icon to the left of that job. See
Figure 3–1 below.
Topics
■ Overview of Database Firewall Policies
■ Creating a Firewall Policy
■ Defining a Firewall Policy
■ Using Profiles to Customize a Firewall Policy
■ Publishing and Deploying Firewall Policies
3. Publish the policy to make it available for applying to secured targets. See
"Publishing a Firewall Policy" on page 4-16.
4. Assign the policy to selected secured targets. "Deploying Firewall Policies to
Secured Targets" on page 4-16.
Creating Exceptions
Topics
■ Creating Exceptions
■ The Order of Applying Exceptions
About Exceptions
An exception determines the action, logging level, and threat severity to use when
certain session data is encountered. For example, an exception could specify rules for
statements that originate (or do not originate) from selected client IP addresses or
database user names.
Exceptions override all other policy rules. For example, you may want to override the
normal policy rules if SQL statements originate from an administrator, or if they
originate from anywhere other than a specific IP address.
You can define many exceptions and control the order in which they are evaluated.
Each Exception has its own Action, Logging, and Threat Severity settings.
In order to create an Exception, you must first define the sets of session factors to be
used in defining it. See "Defining Session Filters to Use in Profiles and Exceptions" on
page 4-5.
Creating Exceptions
To create an Exception:
1. In the Audit Vault Server console, select the Policy tab.
2. From the Policy menu, click Firewall Policy.
3. In the Firewall Policies page, click the name of the policy you want.
4. In the Exception Rules section, select Add Exception.
5. At the top of the Exception Rule page, select the filtering criteria for this exception:
■ IP Address Set: Select to Include or Exclude, then select an IP address set.
■ DB User Set: Select to Include or Exclude, then select an database user set.
■ OS User Set: Select to Include or Exclude, then select an OS user set.
■ DB Client Set: Select to Include or Exclude, then select a database client set.
For example, if you select to Include an IP Address Set, and Exclude a DB User
Set, then this exception rule will only apply to SQL from the selected IP Address
Set, but will not apply to SQL from database users in the selected DB User Set.
6. In the bottom section of the Exception Rule page, assign the Action, Logging
Level, and Threat Severity to apply to SQL matching this rule’s filtering criteria.
7. (Optional) Select Escalate action after a certain number of instances? if you want
to apply a different action after SQL matches this rule a number of times. Then
enter the following:
a. Threshold: Enter the number of times SQL must match this rule before the
escalation action is taken.
b. Threshold Action: Select Warn or Block as the action taken after the Threshold
is met.
Topics
■ About Analyzed SQL
■ Defining Policy Rules for Analyzed SQL
■ Analyzing SQL Encrypted with Oracle Network Encryption
A list of SQL clusters and their details and policy status is displayed. The SQL
Statement column shows a sample statement from each cluster.
You can filter the list using the Actions menu. See "Working with Lists of Objects
in the UI" on page 1-12.
5. (Optional) Select one of the following in the Reports drop-down list:
■ Primary Report: Displays all SQL clusters from traffic to your secured targets.
If a cluster has a defined rule, a Yes appears in the In Policy column.
■ SQL Statements in Policy: Displays only the SQL clusters for which you have
defined rules in this policy.
6. Select one or more clusters, and then click Set Policy.
7. In the Set Policy Controls dialog, select the Action, Logging Level, and Threat
Severity to apply to SQL statements of this cluster type.
8. (Optional) Select Escalate action after a certain number of instances? if you want
to apply a different action after a statement matches this cluster a number of times.
Then enter the following:
a. Threshold: Enter the number of times a SQL statement must match this
cluster before the escalation action is taken.
b. Threshold Action: Select Warn or Block as the action taken after the threshold
is met.
c. Substitute Statement: (Optional) If you selected Block for the Threshold
Action, enter a statement to substitute for the SQL matching this cluster. See
"Blocking SQL and Creating Substitute Statements" on page 4-11 for advice.
9. (Optional) Enter a Note.
10. Click Save.
The In Policy column now has a Yes for the statement(s) for which you defined
this rule. In the Policy Overview page, the Analyzed SQL section keeps a count of
the total number of clusters that have policy rules defined, and the associated
actions.
Topics
■ About Novelty Policies
■ Creating Novelty Policies
■ Novelty Policy Examples
■ The Order of Applying Novelty Policies
The new Novelty Policy is listed in the appropriate Novelty Policies (Any or All)
section.
Topics
■ About the Default Rule
■ Default Rule Settings in Relation to Other Policies
■ Defining the Default Rule
■ Creating substitute SQL statements: You must be sure that the results of the
substitute statement can be handled by your client applications.
The following is an example of a good substitute statement you can use for an
Oracle Database secured target. This statement is harmless and does not return
any values or affect performance.
SELECT 100 FROM DUAL
Topics
■ Creating Login and Logout Policies for Database Users
■ Masking Sensitive Data
■ Setting a Policy for Invalid SQL
■ Configuring Global Firewall Policy Settings
a. Threshold: Enter the number of times invalid SQL must be seen before the
escalation action is taken.
b. Threshold Action: Select Warn or Block as the action taken after the Threshold
is met.
c. Substitution: (Optional) If you selected Block for the Threshold Action, enter
a statement to substitute for the invalid SQL. See "Blocking SQL and Creating
Substitute Statements" on page 4-11 for advice.
About Profiles
Within a firewall policy, a profile lets you define a different set of policy rules based on
the session data associated with SQL statements.
To define the profile, you use the session filters you defined in the Policy Controls
section of the firewall policy. see "Defining Session Filters to Use in Profiles and
Exceptions" on page 4-5.
These session filters filter SQL statements based on:
■ IP addresses
■ Database user login names
■ Client program names (for example, SQL*Plus)
■ Operating system user names
A profile is different from an exception, though they are both defined using the above
session factors. Whereas an exception lets you bypass all the rules for Analyzed SQL in
your normal policy, a profile lets you define rules for any cluster in the Analyzed SQL
based on the session factors.
For example, you can create a profile if you want to define a completely different set of
rules for Analyzed SQL originating from a certain set of database users. When a user
in this database user set accesses the database, this profile’s policy rules are used
instead of your normal policy rules.
A SQL statement can match more than one profile. In this case, the Database Firewall
uses the most severe action, logging level, and threat severity of all matching profiles.
Creating a Profile
In order to create a profile, there must be sets of factors defined to use for filtering
purposes. See "Defining Session Filters to Use in Profiles and Exceptions" on page 4-5.
To create a Profile:
1. Log in to the Audit Vault Server console as an auditor, and select the Policy tab.
2. In the Firewall Policies page, click the name of the policy you want.
3. In the Policy Controls section of the page, click Profiles.
The Policy Profiles page appears, listing existing profiles. You can click a profile
name to edit it.
4. Click Create New Profile.
5. In the Create Profile dialog, enter the following:
■ Profile Name: Enter a name for the profile.
■ IP Address Set: Select one of the available IP address sets, or leave it
unselected.
■ DB User Set: From the list, select from the available database user sets, or
leave it unselected.
■ OS User Set: From the list, select from the available operating system user
sets, or leave it unselected.
■ DB Client Set: From the list, select from the available client program sets, or
leave it unselected.
Note: Client program names and OS user names are provided by the
client and therefore, depending on the environment, may not be
reliable.
Topics
■ About Audit Policies
■ Retrieving and Modifying Audit Settings from an Oracle Database
■ Creating Additional Audit Policy Settings for an Oracle Database
■ Provisioning Audit Policies to an Oracle Database
Note: Although Oracle AVDF can collect data from the v$unified_
audit_trail in Oracle Database 12c, Oracle AVDF cannot retrieve or
provision unified audit policies.
Table 5–1 Fields Under Apply Audit Settings in the Audit Settings Page
Column Description
Target Name Name of the secured target
In Use Number of audit settings in use in the secured target
Needed Number of audit settings you (the auditor) specified as needed
Problem The difference between the audit settings in use at the database and the
number specified as needed in your Oracle AVDF audit policy for this
database.
If this number is greater than zero, new audit settings may have been
created at the database since you last provisioned the audit policy from
Oracle AVDF. You may also have selected more audit settings as needed
or not needed since you last provisioned the audit policy.
To resolve the problem, you can specify whether new audit settings are
needed and/or provision the policy again. This brings the number in the
Problem column back to zero.
Last Retrieved The time that the audit information for the selected database was last
retrieved
As Provisioned The time that the audit settings were last provisioned to the database
from Oracle AVDF
Note: Audit trails and audit policy management are not supported for Oracle
Database 9i.
4. Click the Retrieve Audit Settings button.
To check the status of the retrieval, click the Settings tab, then under the System
menu, click Jobs. When the audit settings retrieval is complete, the Audit Settings
page is refreshed with new data.
3. Select the checkboxes for each audit setting you determine is needed, then click
Set as Needed.
4. To remove audit settings, select the checkboxes for the ones you want to remove,
then click Set as Not Needed.
5. To create new audit settings for this audit type (for example, Statement), click
Create. See "Creating Additional Audit Policy Settings for an Oracle Database" on
page 5-4.
Topics
■ About SQL Statement Auditing
■ Defining SQL Statement Audit Settings
■ Understanding the Statement Audit Settings Page
■ Statements Audit Type - Select the SQL statements to audit by double clicking
a statement type to move it to the box on the right. You can use the double
arrows to move all statements to the right or back to the left.
7. Click Save.
The new audit settings are added to the Statement Audit Settings page.
Topics
■ About Schema Object Auditing
■ Defining Schema Object Audit Settings
■ Understanding the Object Audit Settings Page
For example, object auditing can audit all SELECT and DML statements permitted by
object privileges, such as SELECT or DELETE statements on a given table. The GRANT and
REVOKE statements that control those privileges are also audited.
Object auditing lets you audit the use of powerful database commands that enable
users to view or delete very sensitive and private data. You can audit statements that
reference tables, views, sequences, standalone stored procedures or functions, and
packages.
Oracle Database sets schema object audit options for all users of the database. You
cannot set these options for a specific list of users.
Topics
■ About Privilege Auditing
Topics
■ About Fine-Grained Auditing
■ Defining Fine-Grained Audit Settings
■ Understanding the Fine-Grained Audit Settings Page
Auditing Specific Columns and Rows When you define the fine-grained audit policy, you
can target one or more specific columns, called a relevant column, to be audited if a
condition is met. This feature enables you to focus on particularly important, sensitive,
or privacy-related data to audit, such as the data in columns that hold credit card
numbers, patient diagnoses, Social Security numbers, and so on. A relevant-column
audit helps reduce the instances of false or unnecessary audit records, because the
audit is triggered only when a particular column is referenced in the query.
You further can fine-tune the audit to specific columns and rows by adding a condition
to the audit policy. For example, suppose you enter the following fields in the Create
Fine Grained Audit page:
■ Condition: department_id = 50
■ Columns: salary, commission_pct
This setting audits anyone who tries to select data from the salary and commission_
pct columns of employees in Department 50.
If you do not specify a relevant column, then Oracle Database applies the audit to all
the columns in the table; that is, auditing occurs whenever any specified statement
type affects any column, whether or not any rows are returned.
Using Event Handlers in Fine-Grained Auditing In a fine-grained audit policy, you can
specify an event handler to process an audit event. The event handler provides
flexibility in determining how to handle a triggering audit event. For example, it could
write the audit event to a special audit table for further analysis, or it could send a
pager or an email alert to a security administrator. This feature enables you to
fine-tune audit responses to appropriate levels of escalation.
For additional flexibility in implementation, you can employ a user-defined function
to determine the policy condition, and identify a relevant column for auditing (audit
column). For example, the function could allow unaudited access to any salary as long
as the user is accessing data within the company, but specify audited access to
executive-level salaries when they are accessed from outside the company.
more than one column, select All or Any as the condition that triggers this
policy.
See "Auditing Specific Columns and Rows" on page 5-11 for more information
about relevant columns.
■ Conditions - (Optional) Enter a Boolean condition to filter row data. For
example, department_id = 50 .
If this field is blank or null, auditing occurs regardless of condition.
■ Handler Schema - (Required if you specify an event handler function) Enter
the name of the schema account in which the event handler was created. For
example: SEC_MGR
See "Using Event Handlers in Fine-Grained Auditing" on page 5-12.
■ Handler Package - (Required if you specify an event handler function) Enter
the name of the package in which the event handler was created. For example:
OE_FGA_POLICIES
■ Handler Function - (Optional) Enter the name of the event handler. For
example: CHECK_OE_VIOLATIONS
7. Click Save.
The fine-grained audit policy is created.
Topics
■ About Capture Rules Redo Log File Auditing
■ Defining a Capture Rule for Redo Log File Auditing
■ Understanding the Capture Rule Settings Page
Note: In the secured target database, ensure that the table that you
plan to use for the redo log file audit is not listed in the DBA_STREAMS_
UNSUPPORTED data dictionary view.
Topics
Report Descriptions
■ Audit Report Descriptions
■ Compliance Report Descriptions
■ Specialized Database Firewall Report Descriptions
For descriptions of the Entitlement reports, see "Entitlement Report Descriptions" on
page 7-4.
Auditors can view data and modify reports for secured targets to which they have
been granted access by a super auditor. However, an auditor can also send a report to
other auditors for attestation regardless of the access rights of the other auditors.
You can specify email recipients for scheduled reports once they are generated, as well
as create email templates for report notifications. See "Creating or Modifying an Email
Template" on page 3-5.
Topics
■ About Filtering and Display Settings in Reports
■ Filtering Data in a Report
■ Hiding or Showing Columns in a Report
■ Formatting Data in a Report
■ Resetting the Report Display Values to Their Default Settings
Topics
■ About Filtering Data in Reports
■ Filtering All Rows Based on Data from a Selected Column
■ Filtering Column and Row Data Using the Search Bar
■ Filtering Row Data Using an Expression
About Filtering Data in Reports You can filter the report to show all rows based on a
particular column, or a subset of rows, using an expression.
You can create multiple filters as needed. For example, if you want to filter all SYS
users who are being audited for the SUPER USER LOGON event, you would create one
filter to catch all SYS users, and then a second filter to catch all SUPER USER LOGON
events. If two or more of the filters for a report are enabled, then the report uses both
or all of them (as in an AND operation). You can toggle specific filters on or off,
depending on the results that you want.
Filtering Column and Row Data Using the Search Bar You can use the Search bar to search
for row data in one or all columns in the report (for example, all rows that contain the
letters SYS, such as SYS and SYSTEM, in all columns).
To search for row data in one or all columns:
1. Log in to the Audit Vault Server as an auditor, click the Reports tab, and access the
report that you want.
2. If you want to focus the search on a specific column, in the Search bar, use the
Search icon to select from the drop-down list of available columns.
By default, the search applies to all columns.
3. In the Search bar text area, enter all or part of the row text you want to search for.
4. Click Search.
Filtering All Rows Based on Data from a Selected Column This filtering method lets you filter
data in all rows based on a selected column (for example, all rows that contain SYS in
the User column).
To filter all rows based on data from a selected column:
1. Log in to the Audit Vault Server as an auditor, click the Reports tab, and access the
report that you want.
2. Click the Actions menu, and select Filter.
The Filter dialog box appears. The existing filter definitions for the current user
session are shown below the Filter dialog box.
3. For Filter Type, select Column.
4. In the Column drop-down list, select the column on which you want to base the
filter.
You can select from columns that are displayed in the report or other columns.
5. Click Apply.
The existing filter definitions for the current user session are shown above the
report columns.
6. To enable or disable the display of the filtered data, select its corresponding check
box. To remove a filter, click its Remove Filter icon.
Filtering Row Data Using an Expression This method lets you select all rows that meet a
WHERE condition, such as all users who are not user SYS. You can create the expression
for all columns, even those that are not shown in the current report.
To filter row data using an expression:
1. Log in to the Audit Vault Server as an auditor, click the Reports tab, and access the
report that you want.
2. From the Actions menu, select Filter.
The Filter dialog box appears. The existing filter definitions for the current user
session are shown below the Filter dialog box.
3. For Filter Type, select Row.
The Filter Expression fields appears along with Columns and Function/Operators
fields to help you build the expression
4. Use the Columns, Function/Operators, and Filter Expression fields to build your
filter expression:
■ Columns: Select the name(s) of the column(s) from the list to use them in the
expression. When you select a column, its abbreviation appears in the Filter
Expression field.
■ Functions/Operators: Select function(s) and/or operator(s) from the list to
build your expression.
■ Filter Expression: If you have built an expression from the available columns,
functions and operators, enter any parameters needed to complete your
expression. If you type the expression, remember that it is case-sensitive. In
most cases, use uppercase letters.
5. Click Apply.
Oracle AVDF filters the display of row data based on the expression you created,
and adds the filter definition above the report columns.
6. To enable or disable the display of the filtered data, select its corresponding check
box. To remove a filter, click its Remove Filter icon.
3. Move column names under the Do Not Display or Display in Report boxes:
■ Select the column names to move and then click the left or right arrow
between the column name boxes.
■ Move all columns left or right by using the >> and << buttons.
■ Use the top button (the arrows in a circle) to reset the columns to their original
locations in the two boxes.
4. To set the order of displayed columns, in the Display in Report box, select the
column name, then click the up or down arrow on the right side of the box to
reorder the column’s position in the list.
5. Click Apply.
Topics
■ Sorting Row Data for All Columns
■ Highlighting Rows in a Report
■ Charting Data in a Report
■ Adding Control Breaks to a Report
Sorting Row Data for All Columns To sort row data for all columns:
1. Access the report that you want.
2. Select the Actions menu (gear) icon on the Search bar.
3. In the Actions Menu, select Sort.
The Sort dialog box appears under the Search bar.
4. Enter the following information:
■ Column: For up to six columns, select the columns to sort. By default, the first
sort column is Event Time, which is sorted in descending order.
■ Direction: Select either Ascending or Descending.
■ Null Sorting: Select the Null sorting rule for each column (Default, Nulls
Always Last, or Nulls Always First). The default is to not sort nulls.
5. Click Apply.
Highlighting Rows in a Report You can highlight specific rows in a report by assigning
them colors. This enables anyone viewing the report to quickly find areas that are of
particular interest.
To highlight rows in the report:
1. Access the report that you want.
2. Select the Actions menu (gear) icon on the Search bar.
3. In the Actions menu, select Highlight.
The Highlight dialog box appears under the Search bar.
4. Enter the following information:
■ Name: Enter a name for this highlight instance. (Optional)
■ Sequence: Enter a sequence number to determine the order in which the
highlight filter rules are to be applied when two or more highlight filter rules
are in effect. The default value is 10.
■ Enabled: Select Yes to enable the highlight or select No to disable it.
■ Highlight Type: Select Row to highlight a row or select Cell to highlight a cell.
■ Background Color: Select a background color for the row or cell. Click a color
to display color options, or click the colored icon to the right of the color
selection field to display a color selection box from which to choose a different
color. Alternatively, you can manually enter the HTML code for a color.
■ Text Color: Select a text color for the row or cell using the same method you
used for the background color. (Optional)
■ Highlight Condition: Edit the highlight filter rule expression by identifying
the column, the operator, and the expression for each of the three fields in the
highlight condition.
– Column: Select any column name, including hidden columns.
– Operator: Select an operator from a list of standard Oracle Database
operators, such as =, !=, NOT IN, and BETWEEN.
– Expression: Enter the comparison expression (without quotation marks)
based on a known value for that column name to complete the filter
expression.
For example, entering the filter expression EVENT=SUPER USER LOGON fil-
ters for all values in the Event column that contain the value SUPER USER
LOGON.
5. Click Apply.
Charting Data in a Report You can select from four chart styles to chart data in a report.
After you create the chart, you can access it whenever you access the report.
To chart data in a report:
1. Access the report that you want.
2. Select the Actions menu (gear) icon on the Search bar, and then select Chart.
The Chart dialog box appears under the Search bar.
3. Enter the following information:
■ Chart style: Select from one of the four chart styles: Horizontal Column,
Vertical Column, Pie, and Line.
■ Label: Select from the list of columns for this report. You can include hidden
columns as well as displayed columns.
■ Value: Select from the list of columns for this report, including hidden
columns. If you select Count from the Function list, then you do not need to
select a value.
■ Function: Select an aggregate function (Sum, Average, Minimum, Maximum,
or Count) on which to aggregate the data values.
■ Sort: Select ascending or descending sorting for values and labels.
■ Axis Title for Label: Enter a name for the axis title.
■ Axis Title for Value: Enter a name for the axis value.
4. Click Apply.
The chart appears, with the Edit Chart and View Report links under the Search
bar.
Adding Control Breaks to a Report You can create a break group based on selected
column(s). This pulls the column(s) out of the report as a master record and groups all
rows with the same value for the selected column under that master record. This is
useful for filtering by multiple column values.
For example, you may have an Activity Overview report that displays several columns
of data. If you want to see that data broken up by the Client IP Address and Secured
Target Name columns, you would add control breaks for those columns. The resulting
report would have data broken up into smaller tables for each unique combination of
Client IP Address and Secured Target Name.
To add a control break in a column:
1. Access the report that you want.
2. From the Actions drop-down list, select Format, then select Control Break.
3. Select the column(s) to which you want to add a control break.
You can select up to six columns in the order that you want the data to be broken
up.
4. Click Apply.
Using the Group By Function to Format a Report The Group By dialog lets you group data
by up to three columns in a report, and specify up to three functions to perform on any
column, and display the resulting values as additional columns in the custom report.
For example, suppose you want to create a custom report to show the number of
events of a certain status (for example SUCCESS or FAILURE) for each secured target
and client IP address combination. Using Group By, you can create a custom report to
group unique secured targets together in the first column, client IP addresses for each
secured target together in the second column, and display Event Status in the third
column. You then specify a function to count distinct values in the Event Status
column for each secured target and client IP address combination.
The resulting custom report will contain four columns: Secured Target, Client IP, Event
Status, and the final column will show the results of the function, for example, the
number of events with SUCCESS status for that secured target and IP address.
3. In the Group By Column section, from the first drop-down list, select a data
column for grouping data in column 1 of your custom report.
For example, if you select Secured Target Name, column 1 of your report will have
secured targets grouped together. Optionally, select data groupings for columns 2
and 3 of your report.
4. Optionally, in the Functions section, specify up to three functions to operate on
specific data columns:
a. Under Functions, select a function, such as Count Distinct.
b. Under Column, select any data column in the default report.
c. Optionally, under Label, enter a column heading for the new column created
by the result of this function.
d. Optionally, under Format Mask, select the format of the data in the new
column created by the result of this function.
e. Optionally, select the Sum check box if you want to add a Sum row at the
bottom of your custom report to add the values in the new column.
5. Optionally, in the sorting section, define the sort order for your custom report
columns.
6. Click Apply.
3. At the top of the Create/Edit Scheduled Job page, in the Schedule Report section,
select the Report Format (PDF or XLS).
You can optionally change the Category Name and Report Name fields.
4. In the Report Filters section, enter or select:
■ Row Limit
■ Event Time
■ Secured Target Name (or All) - This appears if applicable to the report.
5. In the Schedule section, select how you want to schedule the report:
■ Immediately - Run the report immediately
■ Specify Schedule - Select a run time, timezone, run date, and how often to
repeat the schedule.
■ Select Schedule - (See Note) Select an existing schedule for the report by
selecting a Schema where the schedule is stored, and the name of the
Schedule from the drop-down lists.
1. Log in to the Audit Vault console as an auditor, and click the Reports tab.
2. Under Report Workflow, click Generated Reports.
A list of generated reports appears.
3. Select the report you want and click the Notify.
4. Fill the fields as follows:
■ For the Send field, select either Notification to send an email with a link to the
report, or Attachment to send an email with the report attached as an XLS or
PDF file.
■ From the Template drop-down list, select a report notification template.
■ From the Distribution List drop-down list, if applicable, select a distribution
list.
■ If you want to send the report to additional recipients, enter their email
addresses in the To email and Cc fields. Enter full email addresses separated
by commas.
5. Click Notify.
■ Activity Reports
■ Alert Reports
■ Entitlement Reports (see "Managing and Viewing Entitlement Data" on page 7-1)
■ Stored Procedure Audit Reports
This section contains information about Activity, Alert, and Stored Procedure Reports.
Activity Reports
Topics
■ About the Activity Reports
■ Activity Overview Report
■ Data Access Report
■ Data Modification Report
■ Data Modification Before-After Values
■ Database Schema Changes Report
■ All Activity Report
■ Failed Logins Report
■ User Login and Logout Report
■ Entitlements Changes Report
■ Audit Settings Changes Report
■ Secured Targets Startup/Shutdown Report
See Also: "Related Event Data Appendices" on page 6-2 for related
data access audit events in a specific secured target type
Alert Reports
Alert reports are accessed from the Reports tab, by clicking Audit Reports.
The alert reports track critical and warning alerts. An alert is raised when data in audit
records matches a predefined alert rule condition. Alerts are grouped by associated
secured target, by event category, and by the severity level of the alert (either warning
or critical).
There are three alert reports:
■ All Alerts Report - This report shows all alerts, both critical and warning alerts,
issued within a specified period of time.
■ Critical Alerts Report - This report shows critical alerts issued within a specified
period of time.
■ Warning Alerts Report - This report shows warning alerts issued within a
specified period of time.
See Also:
■ "Creating and Configuring Alerts" on page 8-1 for information
about creating and configuring alerts
■ "Responding to an Alert" on page 8-7 for information about
responding to an alert
This takes you to the Groups page under the Secured Targets tab, and allows you to
add a secured target as a member of a compliance group in Oracle AVDF. See
"Managing Compliance for Secured Target Databases" on page 2-6 for detailed
instructions on assigning secured targets to compliance groups.
Table 6–2 (Cont.) Compliance Reports Included for each Compliance Category
Report Name Description
Data Modification Details of audited data modifications for a specified period of
time
Database Schema Changes Details of audited DDL activity for a specified period of time
All Activity Details of all captured audit events for a specified period of time
Failed Logins Details of audited failed user logins for a specified period of
time
User Login and Logout Details of audited successful user logins and logouts for a
specified period of time
Entitlements Changes Details of audited entitlement related activity for a specified
period of time
Audit Settings Changes Details of observed user activity targeting audit settings for a
specified period of time
Secured Target Details of observed startup and shutdown events for a specified
Startup/Shutdown period of time
Stored Procedure Activity Digest of all audited operations on stored procedures for a
Overview specified period of time
Stored Procedure Details of audited stored procedure modifications for a specified
Modification History period of time
Created Stored Procedures Stored procedures created within a specified period of time
Deleted Stored Procedures Stored procedures deleted within a specified period of time
New Stored Procedures Latest state of stored procedures created within a specified
period of time
Topics
■ Managing and Viewing Entitlement Data
■ Working With Entitlement Snapshots and Labels
■ Generating Entitlement Reports
■ Entitlement Report Descriptions
Note: For Oracle Database 12c secured targets, if you are not using
multitenant container databases (CDBs), entitlement data appears as
for earlier versions of Oracle Database. If you are using CDBs, each
pluggable database (PDB) or CDB is configured as a separate secured
target in the Audit Vault Server, and entitlement data appears
accordingly in snapshots and reports.
The general steps for managing and viewing entitlement data are:
1. Retrieve the entitlement data from the secured target to create a snapshot of the
data at that point in time. See:
■ "Retrieving User Entitlement Data for Oracle Database Secured Targets" on
page 2-4
2. Optionally, create labels to organize the entitlement snapshots into meaningful
groups, and assign the labels to snapshots. See:
■ "Creating, Modifying, or Deleting Labels for Entitlement Snapshots" on
page 7-2
■ "Assigning Labels to Entitlement Snapshots" on page 7-3
3. View entitlement reports, using snapshots and labels to filter and compare data.
See:
See Also:
■ "Generating Entitlement Reports" on page 7-3 for information
about generating and viewing entitlement report data
■ "Filtering and Controlling the Display of Data in a Report" on
page 6-3 and "Customizing the Built-in Reports" on page 6-3 for
information about creating user-defined reports from entitlement
reports
created, user name, privilege, schema owner, table name, column name, type of access
(direct access or if through a role, the role name), whether the user privilege was
created with the ADMIN option, whether the user can grant the privilege to other users,
and who granted the privilege.
In Oracle AVDF 12.1.2: You can select these additional columns relating to Oracle 12c
secured targets:
■ Hierarchy: Privilege is with hierarchy option
■ Type: Object type (table, view, sequence, etc.)
■ Common: Whether this user is common to the PDB and CDB. Y indicates a
common user, N indicates the user is local to the PDB, and null indicates the
database is neither a PDB nor a CDB.
■ Container: Container name. This is null if the database is not a PDB or CDB.
In Oracle AVDF 12.1.2: You can select these additional columns relating to Oracle 12c
secured targets:
■ Common: Whether this user is common to the PDB and CDB. Y indicates a
common user, N indicates the user is local to the PDB, and null indicates the
database is neither a PDB nor a CDB.
■ Container: Container name. This is null if the database is not a PDB or CDB.
For Oracle Database version 12c, the above two roles identify privileged users, in
addition to the following roles:
SYSASM
SYSBACKUP
SYSDG
SYSKM
In Oracle AVDF 12.1.2: You can select these additional columns relating to Oracle 12c
secured targets:
■ Common: Whether this user is common to the PDB and CDB. Y indicates a
common user, N indicates the user is local to the PDB, and null indicates the
database is neither a PDB nor a CDB.
■ Container: Container name. This is null if the database is not a PDB or CDB.
Topics
■ About Alerts
■ Creating and Configuring Alerts
■ Responding to an Alert
About Alerts
You can create and configure alerts on events for secured targets, and for third-party
plug-ins that have been developed using the Oracle AVDF SDK. These events may be
collected by the Audit Vault Agent or the Database Firewall. Alerts are independent of
audit policies or firewall policies.
Alerts are rule-based. That is, if the rule definition is matched (for example, User A
fails to log in to Client Host B after three tries), then an alert is raised. An alert can be
applied to multiple secured targets, such as four Oracle databases. In this case, the rule
can include more than one event and the event comes from different secured targets.
For example, User A failed to log in to secured target X and User A also failed to log in
to secured target Y.
You can specify an alert severity and associate the alert with the audit events described
in Appendix C through Appendix G. Also, if a secured target is monitored by a
Database Firewall, you can configure alerts based on audit records sent by the firewall,
in addition to the alerts specified in the firewall policy (see "Creating Database
Firewall Policies" on page 4-1.)
When you configure an alert, you can set up an email to be automatically sent to a
user, such as a security officer, or to a distribution list. You can also configure
templates to be used for email alert notification.
Alerts are raised when the audit data reaches the Audit Vault Server, not when the
event that raises the alert occurs. The time lag between when the event occurs and
when the alert is raised depends on several factors, including how frequently the audit
trails are retrieved. The timestamp of an alert event indicates the time that the event
occurred (for example, the time that User A tries to log in). The timestamp for the alert
indicates when the alert was raised.
Topics
■ About Alert Conditions
■ Creating an Alert Condition
The above fields must be preceded by a colon (for example :USER_NAME) when used in
the condition. Using these fields, you can build your condition as described below.
Use Wildcards
You can use the following wildcards:
■ % (to match zero or more characters)
■ _ (to match exactly one character)
The user and target parameters may list zero or more users or targets related to this
alert.
Example:
Apr 16 23:22:31 avs08002707d652 logger: [AVDFAlert@111 name="w_1"
severity="Warning" url="https://192.0.2.10/console/f?p=7700..."
time="2014-04-16T22:55:30.462332Z" target="cpc_itself" user="JDOE" desc=" "]
Monitoring Alerts
Oracle AVDF raises an alert when data in a single audit record matches an alert rule
condition. Auditors can view recently raised alerts in the dashboard on the Audit
Vault Server console’s Home page. Alerts are grouped by the time that the alerts are
raised, and by the severity level of the alert (warning or critical). From here, you can
drill down to reports.
You can also schedule alert reports from the Audit Vault Server Reports tab. For
details, see:
■ "Alert Reports" on page 6-17
■ "Scheduling and Generating PDF or XLS Reports" on page 6-11
Responding to an Alert
After you have created alerts and when they are generated, you or other auditors can
respond to them. You can change the alert status (for example, closing it), or notify
other users of the alert.
To respond to an alert:
1. Log in to the Audit Vault Server console as an auditor.
2. Access the alert by using one of the following methods:
■ From the Dashboard page, select the alert from the Recently Raised Alerts list.
■ From the Reports tab, expand the Alert Reports section, then select All Alerts,
Critical Alerts, or Warning Alerts. See "Filtering and Controlling the Display
of Data in a Report" on page 6-3 to adjust the data in the report.
3. In one of the Alerts pages, select the check boxes for the alerts to which you want
to respond.
4. Take any of the following actions:
■ Notify another auditor of the alert. Click the Notify button. In the Manual
Alert Notification page, select the notification template. Then you must select
a distribution list and/or enter email addresses in the To or Cc fields. Separate
multiple email addresses with a comma. Click the Add to List button to
compile the listing, and then click the Notify button to send the notification.
■ Details. Select the page icon under the Details column for the report, and
under the Notes area, enter a note to update the status of the alert.
■ Set the alert status. From the Set Status to list, select New or Closed, or a
user-defined status value if available, and then click the Apply button. When
an alert is first generated, it is set to New.
Database Schemas
Topics
■ About Oracle Audit Vault and Database Firewall Schemas
■ Metadata for Activity Reports
■ Data for Event Reports
■ Data for Alert Reports
■ Data for Entitlement Reports
■ Data for SPA Reports
■ Data for Database Firewall Reports
Table A–2 describes the AVSYS.SECURED_TARGET_TYPE table, which has one row for
each secured target type. Columns are in alphabetical order.
Table A–3 describes the AVSYS.AUDIT_TRAIL table, which has one row for each audit
trail. Columns are in alphabetical order.
Table A–6 describes the AVSYS.ALERT_EVENT_MAP table, which maps each alert instance
to its related events. When an alert instance is related to multiple events, each event
has a different RECORD_ID. Columns are in alphabetical order.
Table A–7 describes the AVSYS.ALERT_NOTE table, which stores notes for alert instances.
Each alert instance can have multiple notes. Columns are in alphabetical order.
Table A–11 describes the AVSYS.UE_DBA_ROLES table, which stores information about
Oracle Database roles. The table has one row for each role. Columns are in alphabetical
order.
Table A–15 describes the AVSYS.UE_DBA_USERS table, which has a row for every Oracle
Database user. Columns are in alphabetical order.
Table A–20 describes the AVSYS.SPA_EDITS table, which stores data about, and the
content of, stored procedure edits.
Topics
■ About the Oracle Database Audit Events
■ Account Management Events
■ Application Management Events
■ Audit Command Events
■ Data Access Events
■ Database Vault Events
■ Exception Events
■ Invalid Record Events
■ Object Management Events
■ Peer Association Events
■ Role and Privilege Management Events
■ Service and Application Utilization Events
■ System Management Events
■ Unknown or Uncategorized Events
■ User Session Events
Table C–3 lists the Oracle Database audit command audit events and the equivalent
Oracle AVDF events.
Table C–6 (Cont.) Database Vault Audit Events in Oracle Database 12c
command_
Source Event Event Description class target_type
OLS ATTEMPT TO OLS Attempt To Upgrade Label UPDATE LABEL
UPGRADE LABEL AUDIT Audit SECURITY
ENABLE DV ENFORCEMENT Enable DV Enforcement Audit ENABLE DV
AUDIT ENFORCEMENT
DISABLE DV Disable DV Enforcement Audit DISABLE DV
ENFORCEMENT AUDIT ENFORCEMENT
REALM CREATION AUDIT Realm Creation Audit CREATE REALM
REALM UPDATE AUDIT REALM UPDATE AUDIT UPDATE REALM
REALM RENAME AUDIT Realm Rename Audit RENAME REALM
REALM DELETION AUDIT Realm Deletion Audit DELETE REALM
ADD REALM AUTH AUDIT Add Realm Auth Audit ADD REALM AUTH
DELETE REALM AUTH Delete Realm Auth Audit DELETE REALM AUTH
AUDIT
UPDATE REALM AUTH Update Realm Auth Audit UPDATE REALM AUTH
AUDIT
ADD REALM OBJECT Add Realm Object Audit ADD REALM OBJECT
AUDIT
UPDATE REALM OBJECT Update Realm Object Audit UPDATE REALM OBJECT
AUDIT
DELETE REALM OBJECT Delete Realm Object Audit DELETE REALM OBJECT
AUDIT
ENABLE EVENT AUDIT Enable Event Audit ENABLE EVENT
DISABLE EVENT AUDIT Disable Event Audit DISABLE EVENT
RULE SET CREATION Rule Set Creation Audit CREATE RULE SET
AUDIT
RULE SET UPDATE AUDIT Rule Set Update Audit UPDATE RULE SET
RULE SET RENAME AUDIT Rule Set Rename Audit RENAME RULE SET
RULE SET DELETION Rule Set Deletion Audit DELETE RULE SET
AUDIT
ADD RULE TO RULE SET Add Rule to Rule Set Audit ADD RULE SET
AUDIT
DELETE RULE FROM RULE Delete Rule from Rule Set Audit DELETE RULE SET
SET AUDIT
RULE CREATION AUDIT Rule Creation Audit CREATE RULE
RULE UPDATE AUDIT Rule Update Audit UPDATE RULE
RULE RENAME AUDIT Rule Rename Audit RENAME RULE
RULE DELETION AUDIT Rule Deletion Audit DELETE RULE
COMMANDRULE CREATION Command Rule Creation Audit CREATE COMMANDRULE
AUDIT
COMMANDRULE UPDATE Command Rule Update Audit UPDATE COMMANDRULE
AUDIT
COMMANDRULE DELETION Command Rule Deletion Audit DELETE COMMANDRULE
AUDIT
Table C–6 (Cont.) Database Vault Audit Events in Oracle Database 12c
command_
Source Event Event Description class target_type
AUTHORIZE DATAPUMP Authorize Datapump User Audit AUTHORIZE DATAPUMP USER
USER AUDIT
UNAUTHORIZE DATAPUMP Unauthorize Datapump User REVOKE DATAPUMP USER
USER AUDIT Audit
AUTHORIZE JOB USER Authorize Job User Audit AUTHORIZE JOB USER
AUDIT
UNAUTHORIZE JOB USER Unauthorize Job User Audit REVOKE JOB USER
AUDIT
FACTOR_TYPE CREATION Factor Type Creation Audit CREATE FACTOR TYPE
AUDIT
FACTOR_TYPE DELETION Factor Type Deletion Audit DELETE FACTOR TYPE
AUDIT
FACTOR_TYPE UPDATE Factor Type Update Audit UPDATE FACTOR TYPE
AUDIT
FACTOR_TYPE RENAME Factor Type Rename Audit RENAME FACTOR TYPE
AUDIT
FACTOR CREATION AUDIT Factor Creation Audit CREATE FACTOR
FACTOR DELETION AUDIT Factor Deletion Audit DELETE FACTOR
FACTOR UPDATE AUDIT Factor Update Audit UPDATE FACTOR
FACTOR RENAME AUDIT Factor Rename Audit RENAME FACTOR
ADD FACTOR LINK AUDIT Add Factor Link Audit ADD FACTOR LINK
DELETE FACTOR LINK Delete Factor Link Audit DELETE FACTOR LINK
AUDIT
ADD POLICY FACTOR Add Policy Factor Audit ADD POLICY FACTOR
AUDIT
DELETE POLICY FACTOR Delete Policy Factor Audit DELETE POLICY FACTOR
AUDIT
CREATE IDENTITY AUDIT Create Identity Audit CREATE IDENTITY
DELETE IDENTITY AUDIT Delete Identity Audit DELETE IDENTITY
UPDATE IDENTITY AUDIT Update Identity Audit UPDATE IDENTITY
CHANGE IDENTITY Change Identity Factor Audit UPDATE IDENTITY
FACTOR AUDIT FACTOR
CHANGE IDENTITY VALUE Change Identity Value Audit UPDATE IDENTITY
AUDIT VALUE
CREATE IDENTITY MAP Create Identity Map Audit CREATE IDENTITY MAP
AUDIT
DELETE IDENTITY MAP Delete Identity Map Audit DELETE IDENTITY MAP
AUDIT
CREATE POLICY LABEL Create Policy Label Audit CREATE LABEL POLICY
AUDIT
DELETE POLICY LABEL Delete Policy Label Audit DELETE LABEL POLICY
AUDIT
CREATE MAC POLICY Create Mac Policy Audit CREATE MAC POLICY
AUDIT
Table C–6 (Cont.) Database Vault Audit Events in Oracle Database 12c
command_
Source Event Event Description class target_type
UPDATE MAC POLICY Update MAC Policy Audit UPDATE MAC POLICY
AUDIT
DELETE MAC POLICY Delete MAC Policy Audit DELETE MAC POLICY
AUDIT
CREATE ROLE AUDIT Create Role Audit CREATE ROLE
DELETE ROLE AUDIT Delete Role Audit DELETE ROLE
UPDATE ROLE AUDIT Update Role Audit UPDATE ROLE
RENAME ROLE AUDIT Rename Role Audit RENAME ROLE
CREATE DOMAIN Create Domain Identity Audit CREATE DOMAIN
IDENTITY AUDIT IDENTITY
DROP DOMAIN IDENTITY Drop Domain Identity Audit DROP DOMAIN
AUDIT IDENTITY
ENABLE ORADEBUG AUDIT Enable ORADEBUG Audit ENABLE ORADEBUG
DISABLE ORADEBUG Disable ORADEBUG Audit DISABLE ORADEBUG
AUDIT
COMMAND FAILURE AUDIT Command Failure Audit FAIL COMMAND
AUTHORIZE PROXY USER Authorize Proxy User Audit AUTHORIZE PROXY USER
AUDIT
UNAUTHORIZE PROXY Unauthorize Proxy User Audit REVOKE PROXY USER
USER AUDIT
ENABLE DV DICTIONARY Enable DV Dictionary Accounts ENABLE DV DICTIONARY
ACCOUNTS AUDIT Audit ACCOUNT
DISABLE DV DICTIONARY Disable DV Dictionary Accounts DISABLE DV DICTIONARY
ACCOUNTS AUDIT Audit ACCOUNT
AUTHORIZE DDL AUDIT Authorize DDL Audit AUTHORIZE DDL
UNAUTHORIZE DDL AUDIT Unauthorize DDL Audit REVOKE DDL
AUTHORIZE TTS AUDIT Authorize Transportable AUTHORIZE TRANSPORTABLE
Tablespace Audit TABLESPACE
UNAUTHORIZE TTS AUDIT Unauthorize Transportable REVOKE TRANSPORTABLE
Tablespace Audit TABLESPACE
Exception Events
Exception events track audited error and exception activity, such as network errors.
Table C–7 lists the Oracle Database exception audit events and the equivalent Oracle
AVDF event.
Table C–11 Oracle Database Role and Privilege Management Audit Events
command_
Source Event Event Description class target_type
ALTER ROLE Alter Role ALTER ROLE
CREATE ROLE Create Role CREATE ROLE
DROP ROLE Drop Role DROP ROLE
GRANT OBJECT Grant Object GRANT OBJECT
GRANT ROLE Grant Role GRANT ROLE
ERROR OBJECT Object Exists Errors1 FAIL OBJECT
Table C–11 (Cont.) Oracle Database Role and Privilege Management Audit Events
command_
Source Event Event Description class target_type
SET USER Set User or Program Unit Label1 SET USER
PROGRAM UNIT PROGRAM UNIT LABEL
LABEL
PRIVILEGED Privileged Operation EXECUTE SYSTEM
OPERATION PRIVILEGE
PRIVILEGED ACTION Privileged Action1 PRIVILEGED ACTION
1
OBJECT EXISTS ERRORS, SET USER OR PROGRAM UNIT LABEL, and PRIVILEGED ACTION are Oracle Label
Security events.
Table C–12 Oracle Database Service and Application Utilization Audit Events
command_
Source Event Event Description class target_type
CALL METHOD Call Method CALL METHOD
EXECUTE PROCEDURE Execute Procedure EXECUTE PROCEDURE
EXECUTE PL/SQL PL/SQL Execute EXECUTE PL/SQL
Table C–14 lists the Oracle Database unknown or uncategorized audit events and the
equivalent Oracle AVDF events.
Topics
■ About the Sybase ASE Audit Events
■ Account Management Events
■ Application Management Events
■ Audit Command Events
■ Data Access Events
■ Exception Events
■ Invalid Record Events
■ Object Management Events
■ Peer Association Events
■ Role and Privilege Management Events
■ Service and Application Utilization Events
■ System Management Events
■ Unknown or Uncategorized Events
■ User Session Events
Exception Events
Exception events track audited error and exception activity, such as network errors.
Table D–5 lists Sybase ASE exception events and the equivalent Oracle AVDF events.
Table D–7 Sybase ASE Role and Privilege Management Audit Events
command_
Source Event Event Description class target_type
GRANT COMMAND Grant Command GRANT OBJECT
REVOKE COMMAND Revoke Command REVOKE OBJECT
ROLE CHECK PERFORMED Role Check Performed VALIDATE ROLE
Table D–7 (Cont.) Sybase ASE Role and Privilege Management Audit Events
command_
Source Event Event Description class target_type
ROLE LOCK Role Lock LOCK ROLE
ROLE TOGGLING Role Toggling SET ROLE
USER-DEFINED FUNCTION Alter Role Function Executed ALTER ROLE
COMMAND
Create Role Function Executed CREATE ROLE
Drop Role Function Executed DROP ROLE
Grant Role Function Executed GRANT ROLE
Revoke Role Function REVOKE ROLE
Executed
Table D–8 Sybase ASE Service and Application Utilization Audit Events
command_
Source Event Event Description class target_type
AD HOC AUDIT RECORD Ad Hoc Audit Record INSERT AUDIT RECORD
ALL COMMANDS All Commands Execution EXECUTE COMMAND
EXECUTION OF STORED Stored Procedure Execution EXECUTE PROCEDURE
PROCEDURE
EXECUTION OF TRIGGER Trigger Execution EXECUTE TRIGGER
RPC IN RPC In REMOTE CALL PROCEDURE
RPC OUT RPC Out REMOTE CALL PROCEDURE
TRUSTED PROCEDURE Trusted procedure execution EXECUTE PROCEDURE
EXECUTION
TRUSTED TRIGGER Trusted trigger execution EXECUTE TRIGGER
EXECUTION
Topics
■ About the Microsoft SQL Server Audit Events
■ Account Management Events
■ Application Management Events
■ Audit Command Events
■ Data Access Events
■ Exception Events
■ Invalid Record Events
■ Object Management Events
■ Peer Association Events
■ Role and Privilege Management Events
■ Service and Application Utilization Events
■ System Management Events
■ Unknown or Uncategorized Events
■ User Session Events
■ Target Type Values
Table E–4 lists the Microsoft SQL Server audit command events that are logged in the
Windows Event Viewer.
Table E–4 SQL Server Audit Command Events Logged in Windows Event Viewer
Source Event Severity
OP ALTER TRACE: START 10
OP ALTER TRACE: STOP 10
Exception Events
Exception events track audited error and exception activity, such as background job
errors. Table E–6 lists the Microsoft SQL Server exception events and the equivalent
Oracle AVDF events.
Table E–7 lists the Microsoft SQL Server exception events that are logged in the
Windows Event Viewer.
Table E–7 SQL Server Exception Events Logged in the Windows Event Viewer
command_
Source Event Severity class target_type
OP ERROR: COMMIT 10 ERROR Any from List 1
OP ERROR: DB OFFLINE 10 ERROR Any from List 1
OP ERROR: MIRRORING ERROR 16 ERROR Any from List 1
OP ERROR: .NET FATAL ERROR 16 ERROR Any from List 1
OP ERROR: .NET USER CODE 16 ERROR Any from List 1
OP ERROR: PROCESS VIOLATION 16 ERROR Any from List 1
Table E–7 (Cont.) SQL Server Exception Events Logged in the Windows Event Viewer
command_
Source Event Severity class target_type
OP ERROR: RECOVER 21 ERROR Any from List 1
OP ERROR: RESTORE FAILED 21 ERROR Any from List 1
OP ERROR: ROLLBACK 10 ERROR Any from List 1
OP ERROR: SERVER SHUT DOWN 21 ERROR Any from List 1
OP ERROR: STACK OVER FLOW 16 ERROR Any from List 1
Table E–9 lists the Microsoft SQL Server role and privilege management events and the
equivalent Oracle AVDF events.
Table E–9 SQL Server Role and Privilege Management Audit Events
command_
Source Event Event Description class target_type
ADD DB USER:ADD Audit Add DB User ALTER DATABASE
Event
ADD DB USER:DROP ALTER DATABASE
ADD DB USER:GRANT DATABASE ACCESS GRANT ROLE
ADD DB USER:GRANTDBACCESS GRANT ROLE
ADD DB USER:REVOKE DATABASE ACCESS REVOKE ROLE
ADD DB USER:REVOKEDBACCESS REVOKE ROLE
ADD LOGIN TO SERVER ROLE:ADD Audit Add Login to GRANT ROLE
Server Role Event
ADD LOGIN TO SERVER ROLE:DROP REVOKE ROLE
ADD MEMBER TO DB ROLE:ADD Audit Add Member GRANT ROLE
to DB Role Event
ADD MEMBER TO DB ROLE:CHANGE GROUP ALTER ROLE
ADD MEMBER TO DB ROLE:DROP REVOKE ROLE
ADD ROLE:ADD Audit Add Role CREATE ROLE
Event
ADD ROLE:DROP DROP ROLE
APP ROLE CHANGE PASSWORD Audit App Role ALTER Any from List 1
Change Password
Event
DATABASE OBJECT GDR:DENY Audit Database ALTER Any from List 1
Object GDR Event
DATABASE OBJECT GDR:GRANT ALTER
DATABASE OBJECT GDR:REVOKE ALTER
DATABASE PRINCIPAL MANAGEMENT:ALTER: ROLE Audit Database ALTER Any from List 1
Principal
DATABASE PRINCIPAL MANAGEMENT:CREATE: ROLE CREATE
Management Event
DATABASE PRINCIPAL MANAGEMENT:DROP: ROLE DROP
LOGIN GDR:DENY Audit Login GDR DENY Any from List 1
Event
LOGIN GDR:GRANT GRANT
LOGIN GDR:REVOKE REVOKE
OBJECT DERIVED PERMISSION:CREATE Audit Object CREATE Any from List 1
Derived Permission
OBJECT DERIVED PERMISSION:ALTER ALTER
Event
OBJECT DERIVED PERMISSION:DROP DROP
OBJECT DERIVED PERMISSION:DUMP BACKUP
OBJECT DERIVED PERMISSION:LOAD RESTORE
SCHEMA OBJECT GDR:GRANT Audit Schema GRANT OBJECT
Object GDR Event
SCHEMA OBJECT GDR:REVOKE REVOKE OBJECT
SCHEMA OBJECT GDR:DENY DENY OBJECT
OBJECT PERMISSION Audit Object CHECK Any from List 1
Derived Permission
Event
SERVER OBJECT GDR:GRANT Audit Server Object ALTER Any from List 1
GDR Event
SERVER OBJECT GDR:REVOKE ALTER
SERVER OBJECT GDR:DENY ALTER
Table E–9 (Cont.) SQL Server Role and Privilege Management Audit Events
command_
Source Event Event Description class target_type
SERVER SCOPE GDR:DENY Audit Server Scope DENY Any from List 1
GDR Event
SERVER SCOPE GDR:GRANT GRANT
SERVER SCOPE GDR:REVOKE REVOKE
DATABASE SCOPE GDR:GRANT Audit Database GRANT Any from List 1
Scope GDR Event
STATEMENT GDR:REVOKE REVOKE
STATEMENT GDR:DENY DENY
STATEMENT PERMISSION Audit Statement VALIDATE Any from List 1
Permission Event
Table E–10 SQL Server Service and Application Utilization Audit Events
command_
Source Event Event Description class target_type
BROKER CONVERSATION:INVALID SIGNATURE Audit Broker Conversation EXECUTE Any from List 1
BROKER CONVERSATION:NO CERTIFICATE
BROKER CONVERSATION:NO SECURITY HEADER
BROKER CONVERSATION:RUN AS TARGET FAILURE
BROKER:MESSAGE UNDELIVERABLE:SEQUENCED Broker:Message Undeliverable TRANSACTION MESSAGE
MANAGEMENT
BROKER:MESSAGE UNDELIVERABLE:UNSEQUENCED Broker:Message Undeliverable
TRANSACTION
MESSAGE
MANAGEMENT
BROKER:MESSAGE UNDELIVERABLE:CORRUPTED Broker:Corrupted Message
RECEIVE
MESSAGE
Any from List 1
BROKER:ACTIVATION:ABORTED Broker:Activation - The ABORT Any from List 1
activation stored procedure
exited with an error.
BROKER:QUEUE DISABLED Broker:Queue Disabled DISABLE Any from List 1
List 1
Log Events
Topics
■ SQL Audit Events
■ Event Log Events
Microsoft SQL Server SQL Audit and Event Log Events F-1
SQL Audit Events
Microsoft SQL Server SQL Audit and Event Log Events F-3
SQL Audit Events
Microsoft SQL Server SQL Audit and Event Log Events F-5
Target Type Values
List 1
Microsoft SQL Server SQL Audit and Event Log Events F-7
Target Type Values
Microsoft SQL Server SQL Audit and Event Log Events F-9
Target Type Values
Topics
■ About the IBM DB2 for LUW Audit Events
■ Account Management Events
■ Application Management Events
■ Audit Command Events
■ Data Access Events
■ Exception Events
■ Invalid Record Events
■ Object Management Events
■ Peer Association Events
■ Role and Privilege Management Events
■ Service and Application Utilization Events
■ System Management Events
■ Unknown or Uncategorized Events
■ User Session Events
■ Target Type Values
Exception Events
Exception events track audited error and exception activity, such as network errors.
These events do not have any event names.
Table G–6 IBM DB2 Role and Privilege Management Audit Events
command_
Source Event Event Description class target_type
ADD_DEFAULT_ROLE Add Default Role CREATE NULL
ALTER_DEFAULT_ROLE Alter Default Role ALTER NULL
ALTER_OBJECT Alter Object ALTER Any from List 2
ALTER SECURITY POLICY Alter security policy ALTER NULL
CHECKING_FUNCTION Checking Function VALIDATE Any from List 1
CHECKING_MEMBERSHIP_IN_ Checking Membership In VALIDATE NULL
ROLES Roles
CHECKING_OBJECT Checking Object VALIDATE Any from List 1
CHECKING_TRANSFER Checking Transfer VALIDATE NULL
CREATE_OBJECT Create Object CREATE Any from List 2
DROP_DEFAULT_ROLE Drop Default Role DROP NULL
DROP_OBJECT Drop Object DROP Any from List 2
GRANT Grant GRANT Any from List 3
GRANT_DB_AUTH Grant DB Auth GRANT NULL
GRANT_DB_AUTHORITIES Grant DB Authorities GRANT NULL
GRANT_DBADM Grant DBADM GRANT NULL
IMPLICIT_GRANT Implicit Grant GRANT Any from List 3
IMPLICIT_REVOKE Implicit Revoke REVOKE Any from List 3
REVOKE Revoke REVOKE Any from List 3
REVOKE_DB_AUTH Revoke DB Auth REVOKE NULL
REVOKE_DB_AUTHORITIES Revoke DB Authorities SYSTEM NULL
REVOKE_DBADM Revoke DBADM REVOKE NULL
Table G–7 IBM DB2 Service and Application Utilization Audit Events
command_
Source Event Event Description class target_type
EXECUTE Execute EXECUTE NULL
EXECUTE_IMMEDIATE Execute Immediate EXECUTE NULL
TRANSFER Transfer GRANT NULL
List 1
List 2
List 3
This appendix maps audit event names used in MySQL to their equivalent values in
the command_class and target_type fields in the Oracle AVDF audit record. You can
use the audit events mapped here to create custom audit reports using other Oracle
Database reporting products or third-party tools. See also "Oracle Audit Vault and
Database Firewall Database Schemas" on page A-1 for Oracle AVDF data warehouse
details that may be useful in designing your own reports.
Table H–1 lists the MySQL audit events and the equivalent Oracle AVDF events.
This appendix maps audit event names used in the Solaris Operating System to their
equivalent values in the command_class and target_type fields in the Oracle AVDF
audit record. You can use the audit events mapped here to create custom audit reports
using other Oracle Database reporting products or third-party tools. See also "Oracle
Audit Vault and Database Firewall Database Schemas" on page A-1 for Oracle AVDF
data warehouse details that may be useful in designing your own reports.
Table I–1 lists the Solaris audit events and the equivalent Oracle AVDF events.
This appendix maps audit event names used in the Microsoft Windows Operating
System to their equivalent values in the command_class and target_type fields in the
Oracle AVDF audit record. You can use the audit events mapped here to create custom
audit reports using other Oracle Database reporting products or third-party tools. See
also "Oracle Audit Vault and Database Firewall Database Schemas" on page A-1 for
Oracle AVDF data warehouse details that may be useful in designing your own
reports.
Table J–1 lists the Windows audit events and the equivalent Oracle AVDF events.
This appendix maps audit event names used in the Linux Operating System to their
equivalent values in the Additional Description, command_class and target_type
fields in the Oracle AVDF audit record. You can use the audit events mapped here to
create custom audit reports using other Oracle Database reporting products or
third-party tools. See also "Oracle Audit Vault and Database Firewall Database
Schemas" on page A-1 for Oracle AVDF data warehouse details that may be useful in
designing your own reports.
Table K–1 lists the Linux audit events and the equivalent Oracle AVDF events.
This appendix maps audit event names used in the Oracle ACFS to their equivalent
values in the Source Event, Command Class, Target Object, Associate Object fields
and the Status of the event occurred on target object in the Oracle AVDF audit record.
Target Object can be either a Security Object, for example: Realm, Rules, Rulesets,
and so on, or, a File System Object like File or Dir.
Event or Command Class can be of the following types.
■ For security objects CREATE, MODIFY, DELETE and so on. For example, if a realm is
getting created, realm is target object and ACFS_SEC_REALM_CREATE is the event
which is being mapped to the command class CREATE (selected from a set given by
Oracle AVDF).
■ For filesystem object READ, WRITE, OPEN, DELETE and so on. For example, if a file is
being read, file is target object, and ACFS_EVENT_READ_OP is event which is being
mapped to command class READ (selected from set given by Oracle AVDF).
Associate Objects are the objects which are associated while an event is performed on
a Target Object. For example, in Security commands where we add files to the realm as
follows: Target object- realm, Event- ACFS_SEC_REALM_ADD (MODIFY), Associate object-
file. Another example would be where a file is being read by a user: Target object- file,
Event- ACFS_AUDIT_READ_OP (READ), Associate objects- realms.
The Status column specifies whether the command class executed on the target object
succeeded or not.
See also "Oracle Audit Vault and Database Firewall Database Schemas" on page A-1
for Oracle AVDF data warehouse details that may be useful in designing your own
reports.
Table L–1 lists the Oracle ACFS Security Objects audit events and the equivalent
Oracle AVDF events.
Table L–2 lists the Oracle ACFS File System Objects audit events and the equivalent
Oracle AVDF events.
Topics
■ About Active Directory Audit Events
■ Directory Service Audit Trail Events
■ Security Audit Trail Events
Index-1
auditing features, of Oracle AVDF, 1-2 fields in AVDF audit records, B-1
auditors masking sensitive data, 4-13
role in Oracle AVDF described, 1-6 data masking, 4-13
types of, 1-6 data warehouse schema, A-1
automated attacks, using login/logout policies, 4-12 Database Activity Monitoring
AVSYS schema structure, A-1 DAM mode, defined, 1-5
AVSYS.ALERT_EVENT_MAP table, A-6 defined, 1-5
AVSYS.ALERT_NOTE table, A-6 Database Activity Monitoring (DAM)
AVSYS.ALERT_STORE table, A-5 about, 1-8
AVSYS.AUDIT_TRAIL table, A-2 strategy for using, 1-8
AVSYS.EVENT_LOG table, A-3 Database Firewall
AVSYS.SECURED_TARGET table, A-2 about, 1-5
AVSYS.SECURED_TARGET_TYPE table, A-2 policies
AVSYS.UE_DBA_APPLICATION_ROLES table, A-7 Analyzed SQL, 4-7
AVSYS.UE_DBA_COL_PRIVS table, A-7 assigning to secured target, 4-16
AVSYS.UE_DBA_PROFILES table, A-8 copying, 4-2
AVSYS.UE_DBA_ROLE_PRIVS table, A-9 creating, 4-2
AVSYS.UE_DBA_ROLES table, A-8 Default Rule, about, 4-11
AVSYS.UE_DBA_SYS_PRIVS table, A-9 Default Rule, defining, 4-11
AVSYS.UE_DBA_TAB_PRIVS table, A-10 defining rules for Analyzed SQL, 4-7
AVSYS.UE_DBA_USERS table, A-10 Deployed column on Firewall Policy
AVSYS.UE_ROLE_SYS_PRIVS table, A-12 page, 4-16
AVSYS.UE_SYS_DBA_OPER_USERS table, A-12 editing, 4-3
exceptions, order of applying, 4-7
global settings, 4-14
B invalid SQL policies, 4-13
before and after values, creating capture rules Novelty Policy, creating, 4-9
for, 5-15 profiles, about, 4-14
blocking profiles, creating, 4-15
in Default Rule, 4-11 publishing in Audit Vault Server, 4-16
SQL statements, guidelines, 4-11 sensitive data masking, 4-13
substitute statement with, guidelines, 4-11 policy editor
See Also Database Policy Enforcement about, 4-1
traffic encryption with Oracle network
C encryption, 4-8
Database Firewall Alert
Capture Rule Settings page, 5-16 preconfigured, 8-2
capture rules, for redo log file auditing, 5-15 Database Policy Enforcement (DPE)
charting data in reports, 6-7 about, 1-8
collection agents IPv6, traffic blocked, 4-5
See Audit Vault Agent setting blocking, 1-8
collectors Database Policy Enforcement, DPE mode
See audit trails defined, 1-5
columns, hiding or showing in reports, 6-5 Database Roles by Source Report, 7-6
compliance reports, 6-19 Database Roles Report, 7-6
components, Oracle AVDF, diagram, 1-4 databases
Condition Available Fields, 8-4 Database Roles Report, 7-6
conditions requirements for auditing, 1-9
defining for alerts, 8-4 DB Client Sets, in firewall policies, 4-5, 4-15
example of alert condition, 8-6 DB User Sets, in firewall policies, 4-5, 4-15
console DB2
filtering and sorting lists in, 1-12 See IBM DB2
reset view of, 1-13 Default Rule
Critical Alerts Report, 6-18 firewall policies, procedure for defining, 4-11
CSV format, downloading report as, 6-3 in firewall policies, about, 4-11
in relation to other policies, 4-11
D Default Rule, defined for firewall policies, 4-3
default settings in reports, reverting to, 6-9
DAM deleting user accounts, 3-4
See Database Activity Monitoring Deployed column, Firewall Policy page, 4-16
data
Index-2
dimension tables, A-1 Fine-Grained Audit Settings page, 5-14
disabling alerts, 8-7 fine-grained auditing, 5-11
display settings, in reports, 6-3 audit policy, defining, 5-12
distribution lists, creating, 3-5 event handlers, 5-12
documentation, AVDF, downloading latest, 1-1 relevant columns, 5-11
DPE firewall policies
See Database Policy Enforcement See policies
Drop connection, 4-14 formatting, lists in console, 1-12
E G
email notifications generated reports
about, 3-4 downloading, 6-13
creating a distribution list, 3-5 Notify, 6-13
creating an email template, 3-5 Show Pending Reports
encrypted traffic, and firewall policies, 4-8 Show Pending Reports, 6-13
Enforcement Points menu, 2-3, 3-7 generating built-in reports, 6-2
enforcement points, viewing status of, 3-7 global settings for firewall policies, 4-14
entitlement reports group access
data for creating, A-7 controlling by group, 3-3
labels, 7-4 controlling by user, 3-3
See reports, entitlement
snapshots, 7-4
H
viewing by snapshots and labels, 7-3
entitlement snapshots hiding columns in reports, 6-5
about, 7-2 highlighting data in reports, 6-7
viewing snapshot and label audit data, 7-3 Home page
entitlements alert monitoring in, 8-6
checking retrieval status, 2-4 contents of, 1-12
jobs monitoring, 3-7 HTML, downloading report as, 6-3
managing data, general steps for using, 7-1
retrieving data from Oracle Database, 2-4 I
snapshots and labels, about, 7-3
event handlers IBM DB2
fine-grained auditing, 5-12 audit event reference
relevant columns, 5-12 requirements for audit data collection, 1-10
event reports, data for creating, A-3 Interactive Reports, 6-3, 6-10
EVENT_LOG table, A-3 IP Address Sets, in firewall policies, 4-5, 4-15
events IPv6, traffic blocked, 4-5
Active Directory audit events, M-1
IBM DB2 audit events J
Linux audit events, K-1
jobs, monitoring, 3-7
Microsoft SQL Server audit events, E-1
MySQL audit events, H-1
Oracle ACFS audit events, L-1 L
Oracle Database audit events, C-1
labels
Solaris audit events, I-1
about, 7-2
Sybase ASE audit events, D-1
assigning to snapshots, 7-3
Windows audit events, J-1
using to compare entitlement data, 7-4
exceptions
viewing data, 7-3
creating in firewall policies, 4-6
viewing entitlement reports by, 7-3
defining session filters in firewall policies, 4-5
when used in entitlement reports, 7-3
order of applying in firewall policies, 4-7
Linux Operating System
audit event reference, K-1
F lists, finding objects in console UI, 1-12
logging
filtering
blocking SQL statements, 1-8
in firewall policies, 4-5
level, defined for firewall policies, 4-4
lists in console, 1-12
logging in, to Audit Vault Server UI, 1-11
report data, 6-3, 6-4
login policies for database users, 4-12
Index-3
logout policies for database users, 4-12 P
passwords
M changing, 3-4
master records, pulling column from report, 6-8 PDF, format for scheduling report, 6-11
Match All Tables, in Novelty Policy, 4-10 planning Database Firewall protection level, 1-8
Match Any Table, in Novelty Policy, 4-10 platforms supported, 1-2
metadata for activity reports, A-2 policies
Microsoft SQL Server audit
audit event reference, E-1 about, 5-1
requirements for audit data collection, 1-10 creating, general steps for, 5-1
monitoring alerts, 8-6 described, 1-8
MySQL exporting AVDF audit settings to SQL
audit event reference, H-1 script, 5-17, 5-18
fine grained auditing, defining, 5-12
fine-grained auditing, 5-11
N introduction, 1-8
network encryption, and firewall policies, 4-8 privilege auditing, 5-9
notifications, setting in reports, 6-12 privileges auditing, 5-8
Notify provisioning to Oracle Database, 5-17, 5-18
on generated reports, 6-13 redo log files, 5-15
Novelty Policy redo log files, capture rules for, 5-15
creating in firewall policies, 4-9 schema object auditing, 5-6
examples, 4-10 schema object auditing, defining, 5-7
Match All Tables, 4-10 SQL statement auditing, 5-4
Match Any Table, 4-10 firewall
matching statement classes only, order of about policy editor, 4-1
applying, 4-10 action level, defined, 4-4
matching statement examples, 4-10 Analyzed SQL, about, 4-7
order of applying in firewall policies, 4-10 Analyzed SQL, defined, 4-3
statement matches multiple, 4-10 assigning to secured targets, 4-16
null values, sorting in reports, 6-6 checking publishing status, 4-16
copying, 4-2
creating, 4-2
O Default Rule, about, 4-11
Object Privileges by Source Report, 7-7 Default Rule, defined, 4-3
Object Privileges Report, 7-7 defining rules for Analyzed SQL, 4-7
Object Settings page, 5-8 defining sets, 4-5
objects Deployed column, Firewall Policy page, 4-16
See schema object auditing described, 1-7
objects being audited designing policy, 4-4
Object Privileges by Source Report, 7-7 development process, 4-1
Object Privileges Report, 7-7 editing, 4-3
operational modes, defined, 1-8 exceptions, creating, 4-6
Oracle ACFS exceptions, order of applying, 4-7
audit event reference, L-1 filtering data by using profiles, 4-14
Oracle Database filtering on session data, 4-5
audit event reference, C-1 global settings, 4-14
audit settings introduction, 1-7
creating additional, 5-4 invalid SQL, 4-13
recommended in the database, 1-9 logging level, defined, 4-4
retrieving in AVDF, 5-2 logins for database users, 4-12
checking audit settings in source database, 1-9 logouts for database users, 4-12
requirements for audit data collection, 1-9 masking sensitive data, 4-13
unified audit policies, 12c, 5-1 Match all Tables in Novelty Policy, 4-10
version 9i, and audit policy, 5-3 Match Any Table in Novelty Policy, 4-10
Oracle Database Vault, provisioning audit policy to Novelty Policy, creating, 4-9
database that uses, 5-18 Novelty Policy, examples, 4-10
OS User Sets, in firewall policies, 4-5, 4-15 Novelty Policy, order applied, 4-10
Overview Page, of firewall policy, 4-3 Policy Overview page, 4-3
preconfigured, 4-1
Index-4
profiles, about, 4-14 columns
profiles, creating, 4-15 adding control break, 6-8
publishing, 4-16 hiding or showing, 6-5
threat severity, defined, 4-4 compliance, 6-19
IPv6, traffic blocked, 4-5 about, 6-19
policy controls, in firewall policies, 4-5 compliance, associating secured targets
Policy tab, described, 1-12 with, 6-19
Privilege Audit Settings page, 5-10 creating charts, 6-7
privilege auditing Critical Alerts Report, 6-18
statement auditing, compared with, 5-9 CSV, downloading as, 6-3
System Privileges by Source Report, 7-6 customizing, 6-3
System Privileges Report, 7-6 customizing data display, 6-3
Privileged Users by Source Report, 7-7 Data Access Report, 6-17
Privileged Users Report, 7-7 data collected for, 6-1
privileges Database Firewall, 6-20
auditing, 5-8 downloading as CSV or HTML, 6-3
Privileged Users by Source Report, 7-7 entitlement
Privileged Users Report, 7-7 about, 7-5
procedures data for creating, A-7
See SQL statement auditing Database Roles by Source Report, 7-6
profiles Database Roles Report, 7-6
creating in firewall policies, 4-15 general steps for using, 7-1
defining session filters for, 4-5 labels, 7-3
in firewall policies, about, 4-14 Object Privileges by Source Report, 7-7
provisioning, audit policies to Oracle Database, 5-17, Object Privileges Report, 7-7
5-18 Privileged Users by Source Report, 7-7
Privileged Users Report, 7-7
snapshots, 7-3
Q System Privileges by Source Report, 7-6
Quick Links menu System Privileges Report, 7-6
Audit Trail Collection, 2-2, 3-7 User Accounts by Source Report, 7-5
Enforcement Points, 2-3, 3-7 User Accounts Report, 7-5
User Privileges by Source Report, 7-5
R User Privileges Report, 7-5
User Profiles by Source Report, 7-6
redo log files User Profiles Report, 7-6
auditing, 5-15 event, data for, A-3
defining capture rule for audit policy, 5-15 F5, 6-21
relevant columns filtering
about, 5-11 all rows based on current column, 6-4
event handlers, 5-12 rows in one or all columns, 6-4
fine-grained auditing, used in, 5-11 using an expression, 6-5
report definition file, for creating custom filtering and display settings, 6-3
reports, 6-15 formatting, 6-11
reports generation, status of job, 6-13
about, 6-1 hiding columns, 6-5
Access Reports, 6-16 highlighting rows, 6-7
accessing, 6-2 HTML, downloading as, 6-3
Activity Overview Report, 6-16 Interactive Reports, 6-3, 6-10
activity, metadata for, A-2 jobs monitoring, 3-7
adding your own, 6-15 notifications, 6-12
alert Oracle Database, 6-20
schema for creating, A-5 PDF generation, 6-11
alert reports, 6-18 resetting display values to defaults, 6-9
All Alerts Report, 6-18 retention policy, 6-12
annotating, 6-14 scheduling, 6-11
attestations, 6-13 sending to other users, 6-11
attesting to, 6-14 setting retention time, 6-11
browsing, 6-2 sorting data
built-in, generating, 6-2 all columns, 6-6
Index-5
specifying auditors to attest to, 6-11 See Microsoft SQL Server
status of generation job, 6-13 SQL statement auditing
stored procedure auditing, 6-18 about, 5-4
timestamps, online browsing, 6-2 compared with privilege auditing, 5-9
timestamps, PDF/XLS, 6-2, 6-11 SQL statements
user-defined, accessing, 6-10 auditing, 5-4
viewing PDF/XLS generated reports, 6-13 blocking, 4-11
Warning Alerts Report, 6-18 default rule for anomalies, 4-11
who can access, 6-2 invalid, firewall policies for, 4-13
XLS, downloading as, 6-13 match more than one Novelty Policy, 4-10
Reports tab, described, 1-12 Statement Audit Settings page, 5-6
reset Audit Vault Server console view, 1-13 statements
retention policies See SQL statement auditing
and reports, 6-12 stored procedure auditing (SPA), reports
setting for secured target, 2-5 described, 6-18
Retrieve User Entitlement Data, checking status substitute statements, when blocking SQL in firewall
of, 2-4 policies, 4-11
RTF, report template, 6-15 super auditor role, 1-6
supported platforms, 1-2
supported secured target types, 1-2
S Sybase Adaptive Server Enterprise
Sarbanes-Oxley Act requirements for audit data collection, 1-10
privilege auditing to meet compliance, 5-9 Sybase ASE
See also compliance reports audit event reference, D-1
saved reports, 6-3, 6-10 syslog
schedules, creating for reports, 6-11 alert message format, AVDF, 8-6
schema object auditing, 5-6 forwarding alerts to, 8-6
defining audit policy, 5-7 System Privileges by Source Report, 7-6
Object Privileges by Source Report, 7-7 System Privileges Report, 7-6
Object Privileges Report, 7-7
schema reference for AVDF, A-1
secured targets T
access, controlling by user, 3-3 template, for custom reports, 6-15
assigning firewall policy, 4-16 third-party products used with Oracle AVDF, 1-3
changing the firewall policy, 4-16 threat severity, defined for firewall policies, 4-4
introduction, 1-7 timestamps
retention policies, 2-5 in online reports, 6-2
supported types, 1-2 in PDF/XLS reports, 6-2, 6-11
Secured Targets tab, described, 1-12 troubleshooting
SECURED_TARGET table, A-2 database auditing not enabled, 1-9
SECURED_TARGET_TYPE table, A-2 latest audit data not appearing in reports, 6-16
security, and Default Rule block action, 4-11
Settings tab, described, 1-12
U
showing columns in reports, 6-5
snapshots UE_DBA_APPLICATION_ROLES table, A-7
about, 7-2 UE_DBA_COL_PRIVS table, A-7
assigning labels to, 7-3 UE_DBA_PROFILES table, A-8
creating, 7-2 UE_DBA_ROLE_PRIVS table, A-9
deleting, 7-2 UE_DBA_ROLES table, A-8
using to compare entitlement data, 7-4 UE_DBA_SYS_PRIVS table, A-9
viewing data, 7-3 UE_DBA_TAB_PRIVS table, A-10
viewing entitlement reports by, 7-3 UE_DBA_USERS table, A-10
when used in entitlement reports, 7-3 UE_ROLE_SYS_PRIVS table, A-12
Solaris Operating System UE_ROLE_TAB_PRIVS table, A-12
audit event reference, I-1 UE_SYS_DBA_OPER_USERS table, A-12
sorting unified audit policies, Oracle Database 12c, 5-1
data in report columns, 6-6 user accounts
lists in console UI, 1-12 changing type, 3-3
SQL script, exporting audit policy settings to, 5-17 deleting, 3-4
SQL Server User Accounts by Source Report, 7-5
Index-6
User Accounts Report, 7-5
User Privileges by Source Report, 7-5
User Privileges Report, 7-5
User Profiles by Source Report, 7-6
User Profiles Report, 7-6
user-defined reports, accessing, 6-10
users
Database Roles Report, 7-6
logging in to the Audit Vault Server console, 1-11
Privileged Users by Source Report, 7-7
Privileged Users Report, 7-7
User Accounts Report, 7-5
User Privileges by Source Report, 7-5
User Privileges Report, 7-5
User Profiles by Source Report, 7-6
User Profiles Report, 7-6
W
Warning Alerts Report, 6-18
Web Application Firewall (WAF)
defined, 1-3
Windows Event Viewer
audit events logged in, E-3
exception events logged in, E-4
Windows Operating System
audit event reference, J-1
X
XLS, format for scheduling report, 6-11
Index-7
Index-8