Skip Headers
Oracle® Audit Vault Auditor's Guide
Release 10.2.3.1

Part Number E13842-02
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  C  D  E  F  G  H  I  J  M  N  O  P  R  S  T  U  W 

A

Account and Role Changes - Blocked Report, 3.6.1
account management events
IBM DB2, D.2
Oracle Database, A.2
report, 3.4.1
SQL Server, B.2
Sybase Adaptive Server Enterprise, C.2
Activity Overview Report, 3.3.1
Adaptive Server Enterprise
See Sybase Adaptive Server Enterprise
administrative changes
blocked, 3.6.1
checking collection agent status, 1.5
successful, 3.6.2
alert handlers, 2.12.1
alerts
about, 2.12.1
activity summary, 2.12.3
advanced, 2.12.2.3
basic, 2.12.2.2
creating alerts, 2.12.2
creating rules, 2.12.2.1
handler example, 2.12.1
how they are raised, 2.12.3
listing, 2.12.2.1
modifying alerts, 2.12.2
monitoring, 2.12.3
All Alerts Report, 3.7.1
application management events
IBM DB2, D.3
Oracle Database, A.3
reports, 3.4.4
SQL Server, B.3
Sybase Adaptive Server Enterprise, C.3
ASE
See Sybase Adaptive Server Enterprise
audit command events
IBM DB2, D.4
Oracle Database, A.4
report, 3.4.2
SQL Server, B.4
Sybase Adaptive Server Enterprise, C.4
Audit Commands Report, 3.4.2
audit events
context information in CONTEXT_DIM dimension table, 4.4
IBM DB2, listed, D.1
information in EVENT_DIM dimension table, 4.4
Oracle Database, A.1
Oracle Database Vault, A.6
SQL Server, B.1
Sybase Adaptive Server Enterprise, C.1
See also reports
audit policies
about, 2.1
activating, 2.3.2
copying to another database, 2.11
creating, general tasks for, 2.2
exporting to source database, 2.10
fine-grained auditing, 2.7.1
privilege auditing, 2.6.1
redo log files, capture rules for, 2.8.1
retrieving, 2.3.1
schema object auditing, 2.5.1
source database, retrieving settings from, 2.3.1
SQL statement auditing, 2.4.1
verifying semantic correctness, 2.9
audit records
finding information about, 3.9.1
setting a retention period for audit data, 2.13
audit settings
recommended for Oracle source database, 1.3.1.2
refreshing audit settings state, 2.3.2
retention period for audit data, 2.13
source database settings, retrieving, 2.3.2
updating state, 2.3.2
Audit Vault Console
creating alert rules, 2.12
monitoring alerts from, 2.12
starting, 1.4
AUDIT_EVENT_FACT fact table
contents of, 4.6.1
AUDIT_TRAIL initialization parameter, 1.3.1.1
audited data
types of, 1.2.2
auditing
enabling in source database, 1.3
fine-grained, 2.7.1
general tasks, 1.2
privileges, 2.6
redo log files, 2.8
schema objects, 2.5
SQL statements, 2.4

C

capture rules
See redo log file auditing
categories
creating for user-defined reports, 3.10.2
changes to audit events
report, 3.6.3
Changes to Audit Report, 3.6.3
charting data in reports, 3.8.6
client connections
information in CLIENT_HOST_DIM dimension table, 4.4
tool information in CLIENT_TOOLS_DIM dimension table, 4.4
CLIENT_HOST_DIM dimension table
about, 4.4
contents of, 4.6.2
CLIENT_TOOL_DIM dimension table
about, 4.4
contents of, 4.6.3
collection agents
checking status of, 1.5
columns in a report
See also relevant columns
columns in report
finding information about, 3.9.2
hiding current column, 3.8.2.1
hiding or showing, 3.8.2.2
CONTEXT_DIM dimension table
about, 4.4
contents of, 4.6.4
Critical Alerts Report, 3.7.2
CSV files, saving reports to, 3.11
custom reports
See data warehouse schema

D

data access events
IBM DB2, D.5
Oracle Database, A.5
Oracle Database Vault, A.6
report, 3.3.2
SQL Server, B.5
Sybase Adaptive Server Enterprise, C.5
Data Access Report, 3.3.2
Data Change Report, 3.6.4
data warehouse schema
about, 4.1
architecture, 4.2
AUDIT_EVENT_FACT table, 4.6.1
CLIENT_HOST_DIM table, 4.4, 4.6.2
CLIENT_TOOL_DIM table, 4.4, 4.6.3
CONTEXT_DIM table, 4.4, 4.6.4
design, 4.3
dimension tables
about, 4.4
relationships, 4.6
EVENT_DIM table, 4.4, 4.6.5
fact tables
about, 4.4
constraints, 4.5
indexes, 4.5
relationships, 4.6
PRIVILEGES_DIM table, 4.4, 4.6.6
SOURCE_DIM table, 4.4, 4.6.7
TARGET_DIM table, 4.4, 4.6.8
TIME_DIM table, 4.4, 4.6.9
USER_DIM table, 4.4, 4.6.10
data, changed by INSERT, UPDATE, DELETE
report, 3.6.4
Database Vault
See Oracle Database Vault
Database Vault Report, 3.3.3
databases
audit policies
copying to another database, 2.11
exporting to source database, 2.10
retrieving from, 2.3.1
distributed
tracking with Distributed Database Report, 3.3.4
monitoring source database, 1.5
requirements for auditing, 1.3
source database information in SOURCE_DIM dimension table, 4.4
DDL Report, 3.6.5
DDL report audit events
report, 3.6.5
default settings in reports
reverting to, 3.8.8
dimension tables
See data warehouse schema
dimension, used in data warehouse schema, 4.4
Distributed Database Report, 3.3.4

E

event activity summary, 2.12.3
event categories
See audit events
event handler, 2.12.1
event handlers
fine-grained auditing, 2.7.1.2
relevant columns, 2.7.1.2
EVENT_DIM dimension table
about, 4.4
contents of, 4.6.5
exception events
IBM DB2, D.6
Oracle Database, A.7
SQL Server, B.6
Sybase Adaptive Server Enterprise, C.6
exceptional event events
report, 3.5.1

F

fact table, used in data warehouse schema, 4.4
fact tables
See data warehouse schema
failed attempts
administrative, 3.6.1
filtering data in reports, 3.8.3
fine-grained auditing, 2.7.1
about, 2.7.1
audit policy, defining, 2.7.2
checking in source database, 1.3.1.1
event handlers, 2.7.1.2
relevant columns, 2.7.1.1

G

general tasks for auditors using Oracle Audit Vault, 1.2

H

hiding columns in reports, 3.8.2
highlighting data in reports, 3.8.5
Home page
alert monitoring, 2.12.3

I

IBM DB2
audit events
about, D.1
listed, D.1
requirements for audit data collection, 1.3.2
invalid record events
IBM DB2, D.7
Oracle Database, A.8
report, 3.5.2
SQL Server, B.7
Sybase Adaptive Server Enterprise, C.7

J

join operations
filtering row data, 3.8.3

M

master records
pulling column from report, 3.8.7
Microsoft SQL Server
See SQL Server
monitoring alerts, 2.12.3

N

null values
sorting in reports, 3.8.4.2

O

Object Access Reports, 3.6.8
object management events
IBM DB2, D.8
Oracle Database, A.9
report, 3.4.3
SQL Server, B.8
Sybase Adaptive Server Enterprise, C.8
objects
See schema object auditing
objects being audited
information in TARGET_DIM dimension table, 4.4
Oracle Audit Vault
about, 1.1
alert handler examples, 2.12.1
audited data, types of, 1.2.2
general tasks for auditors, 1.2
IBM DB2 database requirements, 1.3.2
Oracle Database requirements, 1.3.1.1
SQL Server database requirements, 1.3.2
Sybase Adaptive Server Enterprise database requirements, 1.3.2
See also data warehouse schema, reports
Oracle Database
audit events
about, A.1
listed, A.1
audit settings
recommended in the database, 1.3.1.2
checking audit settings in source database, 1.3.1.1
enabling auditing in source database, 1.3.1.1
requirements for audit data collection, 1.3.1.1
retrieving audit settings, 2.3
Oracle Database Vault
events, A.6
finding if installed, 3.3.3
report, 3.3.3
Overview page
displaying, 2.12.3

P

peer association events
Distributed Database Report, 3.3.4
IBM DB2, D.9
Oracle Database, A.10
SQL Server, B.9
Sybase Adaptive Server Enterprise, C.9
policies
See audit policies
privilege auditing
about, 2.6.1
defining audit policy, 2.6.2
statement auditing, compared with, 2.6.1
privilege events
See role and privilege management events
PRIVILEGES_DIM dimension table
about, 4.4
contents of, 4.6.6
Procedure Executions Report, 3.3.5
Procedure Management Report, 3.4.4
procedures
See SQL statement auditing

R

redo log file auditing
about, 2.8.1
defining capture rule for audit policy, 2.8.2
relevant columns
about, 2.7.1.1
event handlers, 2.7.1.2
fine-grained auditing, used in, 2.7.1.1
reports
about, 3.1
accessing, 3.2
checking data collection status, 1.5
columns
adding control break, 3.8.7
finding information about, 3.9.2
hiding current column, 3.8.2.1
hiding or showing, 3.8.2.2
compliance, 3.6
creating charts, 3.8.6
customizing data display, 3.8
data collected for, 3.1
filtering
all rows based on current column, 3.8.3.1
rows in one or all columns, 3.8.3.2
using an expression, 3.8.3.3
finding information
audit records, 3.9.1
column descriptions, 3.9.2
highlighting rows, 3.8.5
resetting display values to defaults, 3.8.8
saving to CSV file, 3.11
sorting data
all columns, 3.8.4.2
current column, 3.8.4.1
who can access, 3.1
See also reports, default and reports, user-defined
reports, default
Access Reports, 3.3
Account and Role Changes, 3.6.2
Account and Role Changes - Blocked Report, 3.6.1
Account Management Report, 3.4.1
Activity Overview Report, 3.3.1
alert reports, 3.7
All Alerts Report, 3.7.1
Audit Commands Report, 3.4.2
Changes to Audit Report, 3.6.3
compliance reports, 3.6
Critical Alerts Report, 3.7.2
Data Access Report, 3.3.2
Data Change Report, 3.6.4
Database Vault Report, 3.3.3
DDL Report, 3.6.5
Distributed Database Report, 3.3.4
Exception Activity Report, 3.5.1
Invalid Audit Record Report, 3.5.2
Login Failures Report, 3.6.6
Login/Logoff Report, 3.6.7
management activity reports, 3.4
Object Access Report, 3.6.8
Object Management Report, 3.4.3
Procedure Executions Report, 3.3.5
Procedure Management Report, 3.4.4
Role and Privilege Management Report, 3.4.5
System Events Report, 3.6.9
system exception reports, 3.5
System Management Report, 3.4.6
Uncategorized Activity Report, 3.5.3
User Sessions Report, 3.3.6
Warning Alerts Report, 3.7.3
See also reports, and user-defined reports
reports, user-defined
accessing, 3.10.4
creating, 3.10.3
creating categories, 3.10.2
See also reports, and reports, default
role and privilege management events
IBM DB2, D.10
information in PRIVILEGE_DIM dimension table, 4.4
Oracle Database, A.11
report, 3.4.5
SQL Server, B.10
Sybase Adaptive Server Enterprise, C.10
roles
failed attempts report, 3.6.1
role changes report, 3.6.2

S

Sarbanes-Oxley Act
privilege auditing to meet compliance, 2.6.1
See also compliance reports
saving a report to CSV file, 3.11
schema object auditing
about, 2.5.1
defining audit policy, 2.5.2
security administration
reporting changes to, 3.6.1
service and application utilization events
IBM DB2, D.11
Oracle Database, A.12
report, 3.3.5
SQL Server, B.11
Sybase Adaptive Server Enterprise, C.11
session events
See user session
showing columns in reports, 3.8.2
sorting data in reports, 3.8.4
SOURCE_DIM dimension table
about, 4.4
contents of, 4.6.7
SQL Server
audit events
about, B.1
listed, B.1
requirements for audit data collection, 1.3.2
SQL statement auditing
about, 2.4.1
defining audit policy, 2.4.2
privilege auditing, compared with, 2.6.1
Procedure Executions Report, 3.3.5
Procedure Management Report, 3.4.4
starting Audit Vault Console, 1.4
statements
See SQL statement auditing
subqueries
filtering row data, 3.8.3
Sybase Adaptive Server Enterprise
audit events
about, C.1
listed, C.1
requirements for audit data collection, 1.3.2
system audit events
reports, 3.6.9
system management events
IBM DB2, D.12
Oracle Database, A.13
report, 3.4.6
SQL Server, B.12
Sybase Adaptive Server Enterprise, C.12

T

TARGET_DIM dimension table
about, 4.4
contents of, 4.6.8
time, actions performed over
information in TIME_DIM dimension table, 4.4
TIME_DIM dimension table
about, 4.4
contents of, 4.6.9
troubleshooting
database auditing not enabled, 1.3
Database Vault report not showing data, 3.3.3
no data in reports, 1.5
source database not available, 1.5

U

Uncategorized Activity Report, 3.5.3
unknown or uncategorized events
IBM DB2, D.13
Oracle Database, A.14
report, 3.5.3
SQL Server, B.13
Sybase Adaptive Server Enterprise, C.13
user login failure audit events
report, 3.6.6
user session events
IBM DB2, D.14
Oracle Database, A.15
report, 3.3.6
SQL Server, B.14
Sybase Adaptive Server Enterprise, C.14
User Sessions Report, 3.3.6
USER_DIM dimension table
about, 4.4
contents of, 4.6.10
user-defined reports
accessing, 3.10.4
creating, 3.10.3
creating categories, 3.10.2
deleting, 3.10.4
users
failed administrative attempts, report, 3.6.1
information in USER_DIM dimension table, 4.4
logging in to the Audit Vault Console, 1.4
login and logoff operations, report, 3.6.7

W

Warning Alerts Report, 3.7.3
Windows Event Viewer
audit events logged in, B.4
exception events logged in, B.6