You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for policy


1 to 20 of 1092 results. Previous page Prev  Next next page
Results per page:   20  | 40 | 60


Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Configuring the RMAN Environment

Disabling the Retention PolicyWhen you disable the retention policy, RMAN does not consider any backup as obsolete. To disable … the retention policy, run this command: CONFIGURE RETENTION POLICY TO NONE; Configuring the retention … policy to NONE is not the same as clearing it. Clearing it returns it to its default setting of … REDUNDANCY

Database Performance Tuning Guide, 11g Release 1 (11.1)

Using SQL Plan Management

15.5.2 Purging PolicyA weekly scheduled purging task manages the disk space used by SQL plan management. The task runs as an automated task in the maintenance window. Any plan that has not been used for more than 53 weeks are purged, as identified by the LAST_EXECUTED timestamp stored in the SMB for that plan. The 53-week time frame ensures plan information will be available during any yearly SQL processing activity.

Database Concepts, 11g Release 1 (11.1)

Database Security

Auditing PolicySecurity administrators should define a policy for the auditing procedures of each database. You

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Configuring the RMAN Environment

Configuring the Backup Retention PolicyAs explained in \"Backup Retention Policies\", the backup retention policy specifies which backups … must be retained to meet your data recovery requirements. This policy can be based on a recovery … window or redundancy. Use the CONFIGURE RETENTION POLICY command to specify the retention policy. See

Database Administrator's Guide, 11g Release 1 (11.1)

The Importance of Establishing a Security Policy for Your Database

The Importance of Establishing a Security Policy for Your DatabaseIt is important to develop a security policy for every database. The security policy establishes … administrator, who is responsible for implementing and maintaining the database security policy If the

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Configuring the RMAN Environment

Configuring an Archived Redo Log Deletion PolicyYou can use RMAN to create a persistent configuration that governs when archived redo logs are eligible for deletion from disk.

Database Installation Guide for Linux, 11g Release 1 (11.1)

Overview of Oracle Database Installation

1.4.5 Default Audit Policy and Initialization ParametersOracle Database Vault installs a baseline database auditing policy. This policy covers the access … Administrator's Guide for more information on the database audit policy

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Configuring the RMAN Environment

Enabling an Archived Redo Log Deletion PolicyThis section explains how to configure an archived redo log deletion policy. By default the policy … is set to NONE. To enable an archived redo log deletion policy: Start RMAN and connect to a target … database and a recovery catalog (if used). Run the CONFIGURE ARCHIVELOG DELETION POLICY command with … at least

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Configuring the RMAN Environment

Configuring a Recovery Window-Based Retention Policywindow. Run the CONFIGURE RETENTION POLICY command at the RMAN prompt. This example ensures that you … can recover the database to any point within the last week: CONFIGURE RETENTION POLICY TO RECOVERY

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Configuring the RMAN Environment

Configuring a Redundancy-Based Retention PolicyThe REDUNDANCY parameter of the CONFIGURE RETENTION POLICY command specifies how many full or level … , then RMAN considers the extra backups as obsolete. The default retention policy is REDUNDANCY 1. As you … backups. Run the CONFIGURE RETENTION POLICY command at the RMAN prompt, as in the following example … : CONFIGURE RETENTION

Database Concepts, 11g Release 1 (11.1)

Database Security

Password Management Policydatabase security, the Oracle Database password management policy is controlled by DBAs and security

Database Concepts, 11g Release 1 (11.1)

Database Security

System Security Policysecurity policy: the security administrators. If the database system is small, then the database … security administrator. A security policy must be developed for every database. A security policy

Database Concepts, 11g Release 1 (11.1)

Database Security

Data Security Policylevel. Your data security policy determines which users have access to a specific schema object, and the … policy should also define the actions, if any, that are audited for each schema object. Your data … security policy is determined primarily by the level of security you want for the data in your database … be based on the

Database Concepts, 11g Release 1 (11.1)

Database Security

User Security PolicyThis section describes aspects of user security policy, and contains the following topics: General … administrators should develop a password security policy to maintain database access security. For example … the use of roles. End-User Security Security administrators must define a policy for end-user … have a policy

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Reporting on RMAN Operations

Reporting on Files Needing a Backup Under a Retention Policyretention policy. With no arguments, REPORT NEED BACKUP reports which objects need backup under the … currently configured retention policy. The output for a configured retention policy of REDUNDANCY 1 … is similar to this example: RMAN> REPORT NEED BACKUP; RMAN retention policy will be applied to the … command

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

RMAN Backup Concepts

Backup Retention Policy and Flash Recovery Area Deletion Rulesto the retention policy. A companion command, DELETE OBSOLETE, deletes all files which are obsolete … according to the retention policy. You can run DELETE OBSOLETE periodically to minimize space … also override the configured retention policy the configured retention policy by specifying the … Reference for REPORT

Database Security Guide, 11g Release 1 (11.1)

Configuring Authentication

Using a Password Management Policypassword management policy. Database administrators and security officers control this policy through

Database Backup and Recovery User's Guide, 11g Release 1 (11.1)

Glossary

retention policySee backup retention policy

Database Security Guide, 11g Release 1 (11.1)

Using Oracle Virtual Private Database to Control Data Access

Configuring an Oracle Virtual Private Database PolicyThis section contains: About Oracle Virtual Private Database Policies Attaching a Policy to a … Display of Column Data with Policies Working with Oracle Virtual Private Database Policy Groups … Optimizing Performance by Using Oracle Virtual Private Database Policy Types

Database Security Guide, 11g Release 1 (11.1)

Using Oracle Virtual Private Database to Control Data Access

Table 7-2 DBMS_RLS.ADD_POLICY Policy TypesPolicy Types When the Policy Function Executes Usage Example Shared Across Multiple Objects … ? DYNAMIC Policy function re-executes every time a policy-protected database object is accessed … . Applications where policy predicates must be generated for each query, such as time-dependent policies where