Table of Contents
- Title and Copyright Information
- Preface
- 1 Getting Started with Oracle Security Monitoring and Analytics
- 2 Working with Security Monitoring and Analytics
- 3 Investigating and Analyzing Threats Based on Correlation Rule
- A Configuration of Security Log Sources
- B SMA Reference
- C User Identity Information and Alerting Sources