JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle SuperCluster T5-8

Security Guide

search filter icon
search icon

Document Information

Accessing Oracle SuperCluster T5-8 Security Resources

Security Task Overview

Security Information for SuperCluster Components

Understanding Oracle SuperCluster T5-8 Security Guidelines

Understanding Hardware Security Guidelines

Access Restrictions

Serial Numbers

Drives

SPARC T5-8 Hardware Security

Software Security Guidelines

Network Security Considerations

Understanding Oracle SuperCluster T5-8 Security Settings and Services

Default Security Settings

Changing Passwords on Default User Accounts

Change Passwords on Default Accounts

Default User Accounts and Passwords

Change the Exadata Storage Server Passwords

Change the Ethernet Switch Password

Default TCP/IP Ports and Services

Keeping Oracle SuperCluster T5-8 Secure

Managing SuperCluster Security

Oracle ILOM for Secure Management

Oracle Identity Management Suite

Oracle Key Manager

Oracle Enterprise Manager

Oracle Enterprise Manager Ops Center (Optional)

Monitoring and Auditing

Workload Monitoring and Auditing

Database Activity Monitoring and Auditing

Monitoring the Network

Software and Firmware Updating

Index

Workload Monitoring and Auditing

The Oracle Solaris OS has a comprehensive auditing facility that can monitor administrative actions, command-line invocations, and even individual kernel-level system calls. This facility is highly configurable, offering a global, per-zone, and even per-user auditing policies.

When the system is configured to use Oracle Solaris Zones, audit records for each zone can be stored in the global zone to protect them from tampering.

Oracle Solaris auditing provides the ability to send audit records to remote collection points using the system log (syslog) facility. Many commercial intrusion detection and prevention services can use Oracle Solaris audit records as an additional input for analysis and reporting.

Oracle VM Server for SPARC leverages the native Oracle Solaris auditing facility to record actions and events associated with virtualization events and domain administration.

For more information, refer to the Monitoring and Maintaining Oracle Solaris Security section in the Oracle Solaris Security Guidelines at: http://docs.oracle.com/cd/E26502_01