Go to main content
3/48
List of Tables
5-1 OS Permission Required For Installing The Agent
14-1 Components with Variable Logging Levels
A-1 AVCLI Agent Host Commands
A-2 Host Attributes (key values)
A-3 LOGLEVEL Component Names
A-4 LOGLEVEL Values
A-5 Database Firewall Commands
A-6 Oracle Database Firewall Attributes
A-7 Enforcement Point Commands
A-8 Enforcement Point Attributes
A-9 AVCLI Secured Target Commands
A-10 Secured Target Attributes
A-11 AVCLI Target Group Commands
A-12 AVCLI Secured Target Connection Commands
A-13 AVCLI SMTP Commands
A-14 AVCLI Security Management Commands
A-15 AVCLI SAN Storage Commands
A-16 AVCLI Remote Filesystem Commands
A-17 AVCLI Server Management Commands
A-18 System Attributes
A-19 Logging component names and values
A-20 Logging level and values
A-21 AVCLI Collection Plug-In Commands
A-22 AVCLI HELP and EXIT Commands
A-23 AVCLI User Commands
B-1 Out-of-the-Box Plug-ins and Features Supported in Oracle Audit Vault and Database Firewall
B-2 Oracle Database Plug-in
B-3 Microsoft SQL Server Plug-in
B-4 Sybase ASE Plug-in
B-5 Sybase SQL Anywhere Plug-in
B-6 IBM DB2 Plug-in
B-7 MySQL Plug-in
B-8 Old Audit Format
B-9 New Audit Format
B-10 Oracle Solaris Plug-in
B-11 Linux Plug-in
B-12 IBM AIX Plug-in
B-13 Microsoft Windows Plug-in
B-14 Microsoft Active Directory Plug-in
B-15 Oracle ACFS Plug-in
B-16 Big Data Appliance Plug-in
B-17 Summary of Audit Trail Types Supported for Each Secured Target Type
B-18 Secured Target Connect Strings (for Secured Target Location Field)
B-19 Collection Attributes for DIRECTORY Audit Trail for Oracle Database
B-20 Collection Attribute for IBM DB2 for LUW Database
B-21 Collection Attributes for MySQL Database
B-22 Collection Attribute for Oracle ACFS
B-23 Supported Trail Locations for Secured Targets
C-1 Initialization Parameters for an Oracle 11.2 or 12c Secured Target Database
C-2 Hidden Initialization Parameters for a Release 11.1 Secured Target Database
C-3 Initialization Parameters for a Release 11.1 Secured Target Database
C-4 Hidden Initialization Parameters for a Release 10.2 Secured Target Database
C-5 Initialization Parameters for a Release 10.2 Secured Target Database
D-1 Ports for Services Provided by Audit Vault Server
D-2 Ports for Services Provided by Database Firewall
D-3 Ports for External Network Access by the Audit Vault Server
D-4 Ports for External Network Access by the Database Firewall
D-5 Ports for Internal TCP Communication
F-1 Vulnerability Categories
F-2 Current Implementation of Database STIG Rules
F-3 Accounts and Role Assignments in Audit Vault Server
F-4 Accounts and Role Assignments in Database Firewall
F-5 Operating System STIG Rule Set Reference
F-6 User Action – Definition and Guidelines
F-7 Current Implementation of Operating System STIG Rules
G-1 Server Encryption Types
Scripting on this page enhances content navigation, but does not change the content in any way.