Siebel Security Hardening Guide > Implementing Auditing >

Operating System Auditing


Implement the following operating system auditing recommendations:

  • Use platform-level auditing to audit login and logout events, access to the file system, and failed object access attempts.
  • Back up log files and regularly analyze them for signs of suspicious activity.
  • Secure log files by using restricted access control lists, and relocate system log files away from their default locations to make sure attackers cannot cover their tracks.

For additional information on operating system auditing, see your operating system documentation.

Siebel Security Hardening Guide Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Legal Notices.