Go to main content
2/12
List of Figures
1-1 Audit Vault and Database Firewall Architecture
1-2 Audit Vault Server Dashboard
1-3 Audit Vault Server - Secured Targets
1-4 Audit Vault Server - Database Firewalls
1-5 Illustration of Oracle Audit Vault and Database Firewall on the Network (Simplified)
1-6 Oracle AVDF with F5 BIG-IP ASM Data Flow Unit
1-7 Oracle Audit Vault and Database Firewall Plug-in for Oracle Enterprise Manager Cloud Control
2-1 Pairs of Oracle Audit Vault Servers and Database Firewalls in High Availability Mode
3-1 Oracle Audit Vault Server with Audit Vault Agents Deployed
4-1 In-line Bridge
4-2 Proxy Without Network Separation
4-3 Proxy With Network Separation
4-4 Out-of-Band Mode
4-5 Host Monitor Mode
4-6 Flow of SQL Through a Firewall Policy
5-1 Oracle AVDF Built-in Reports - Compliance Reports Section
5-2 Browsing, Scheduling, or Viewing Previously Generated Reports
5-3 Interactively Customizing a Built-In Report
5-4 Login Failures Report
5-5 Customizing the Failed Logins Report into a Chart Format by Client IP
5-6 Failed Logins Shown in a Bar Chart by Client IP Address
5-7 Filter the Failed Logins Report for a Specific User
5-8 Database Schema Changes Report
5-9 Filtering a Report by Event Name
5-10 Database Schema Changes Filtered for a Specific Event Name and User
5-11 Database Schema Changes Shown in a Bar Chart by User Name
5-12 Downloading Report Template and Definition Files
Scripting on this page enhances content navigation, but does not change the content in any way.