Index

Symbols  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  

Symbols


A

  • about
    • high availability 9.1
  • access
    • remote, security guidelines for 3.1.2
    • revoking for targets 14.3.4
  • access rights
    • about managing 14.1
    • administrator account types 14.1
    • controlling by user 14.5.2
    • planning 2.7.7
    • targets. controlling by target or group 14.5.3
  • accounts
  • activate, Audit Vault Agent with key 6.3.8
  • ACTIVATE HOST command A.2.2
  • add audit trail
    • Audit Vault Server as Linux target O.8.2
    • Audit Vault Server as Oracle Database target O.7.2
  • Adding
    • User Content To System Configuration Files N
  • additional information
    • audit collection from Oracle Active Data Guard C.4.1
    • audit collection from Oracle Data Guard C.4.2
  • add target to a group A.6
  • add target to a target group A.6.1
  • administrative features 2.4.5
  • administrators
    • access rights 14.1
    • administrators
    • Audit Vault and Database Firewall
      • administrator roles 2.6
    • tasks 2.6
    • user account types 14.1
  • advice on implementation
    • Security Technical Implementation Guides (STIG) H
  • agentctl command
    • start/stop 6.4.1.1
    • to register Audit Vault Agent as Windows service 6.3.13.2
  • agent host AVCLI commands
  • agent host commands A.2.1
  • alerts
    • configuring email service for 4.4.1
    • forwarding to syslog 4.3.4
    • from Database Firewall 5.2
    • Host Monitor 5.2.3
    • out-of-band mode 5.2.2
  • ALTER DATABASE FIREWALL MONITOR command A.4.2
  • ALTER DISKGROUP command A.10.2
  • ALTER FIREWALL command A.3.2
  • ALTER HOST command A.2.3
  • ALTER REMOTE FILESYSTEM command A.11.2
  • ALTER SAN SERVER command A.10.3
  • ALTER SECURED TARGET command A.5.2
  • ALTER SMTP SERVER command A.8.2
  • ALTER SMTP SERVER DISABLE command A.8.3
  • ALTER SMTP SERVER ENABLE command A.8.4
  • ALTER SYSTEM SET command A.12.2
  • ALTER SYSTEM SMTP SERVER SECURE MODE OFF command A.8.5
  • ALTER SYSTEM SMTP SERVER SECURE MODE ON command A.8.6
  • ALTER TARGET GROUP command A.6.2
  • ALTER USER command A.9.3
  • APPLY RETENTION POLICY command A.15.1
  • archiving
    • See: Windows File Sharing
    • disk space
      • additional for SMB and scp archive data transfer 4.5.2
    • expired audit records
      • archive files required 7.4.6
    • filesystem
      • additional space for SMB and scp archive data transfer 4.5.2
    • NFS filesystem 4.5.2
    • policies
    • port for Windows File Sharing transfer method 4.5.2
    • purging data files after retrieving 15.5.3
    • retrieving from archives 15.5.3
    • security guidelines 3.1.2
    • SMB
      • See: Windows File Sharing
    • transfer method 4.5.2
  • archiving and retrieving
  • audit collection
  • audit data
    • date range in memory 15.9.1
    • storing in memory on Audit Vault Server 15.9.1
  • auditing features 2.4.6
  • audit trail cleanup
  • audit trail collection
    • AVCLI commands used for A.7.1
  • audit trail collection AVCLI commands
  • audit trails
  • audit trails Windows Event Log and operating system logs (audit logs)
    • audit trails
    • DIRECTORY audit trail
    • EVENT LOG audit trail C.2.16
    • NETWORK audit trail C.2.16
    • SYSLOG audit trail C.2.16
    • syslog files C.2.16
    • TABLE C.2.16
    • TRANSACTION LOG
    • Windows Event Log, and DIRECTORY audit trail C.2.16
    • XML files, and DIRECTORY audit trail C.2.16
  • audit vault agent
  • Audit Vault Agent 3.7.2
  • audit vault agent machine
    • java best practices 6.3.2
  • audit vault agent requirements 6.3.1
  • Audit Vault and Database Firewall
    • administrative features 2.4.5
    • administrator tasks 2.6
    • auditing features 2.4.6
    • configuration workflow 2.8
    • documentation, AVDF, downloading latest 2.1
    • documentation, downloading latest 2.1
  • Audit Vault Server 15.7.1, 15.7.13, 15.7.14
    • add audit trail for Linux target O.8.2
    • add audit trail for Oracle Database target O.7.2
    • administrative tasks
      • archiving log disk space, monitoring 15.12
      • changing user passwords 14.6.1
      • flash recovery area 15.13
      • SYSAUX tablespace usage 15.11
    • Audit Vault Agent communication 9.2.7
    • Audit Vault Server
      • reboot upon changing host name 4.3.3.1
    • backup 15.7.5
    • backup/restore location 15.7.4
    • backup utility 15.7.3
    • certificate
    • certificate rotation 3.7.4
    • certificate warning, UI 4.2
    • changing keyboard layout 15.1.4
    • configuration
    • configuring
    • deploying Agent O.6
    • detailed diagnostics 15.1.2.3
    • diagnostic checks 15.1.2.2
    • encryption
    • failover 9.2.9
    • high availability 9.2.1, 9.2.13
    • host name, changing, reboot required 4.3.3.1
    • in-memory usage 15.9.4
    • IP address
      • changing, reboot required 4.3.3.1
      • supplying to Database Firewall 5.3
    • jobs monitoring 15.14
    • log files location A.12.2
    • logging in to UI 2.9.1
    • network configuration 4.3.3.1
    • NFS location 15.7.4
    • pairing 9.2.1
    • perform backup 15.7.7
    • planning configuration 2.7.2
    • public key 15.1.3.2
    • reboot
    • rebooting, powering off 15.1.5
    • register as a database target O.7.1
    • register as a Linux target O.8.1
    • registering Database Firewall in 4.8
    • removing Database Firewall from 15.18.5
    • removing targets from 7.2.1.4
    • restore 15.7.11
    • SNMP access 4.3.3.3
    • status, checking 15.1.1
    • syslog destinations, configuring 4.3.4
    • testing system operation 4.9
    • UI, tabs described 2.9.3
    • user accounts, creating in 14.3.2
  • Audit Vault Server audit data
  • Audit Vault Server backup
  • Audit Vault Server high availability
  • Audit Vault Server in high availability 15.7.14
  • Audit Vault Server restore 15.7.13, 15.7.14
  • Audit Vault Servers
  • authentication in Oracle AVDF
  • automate
  • automatic archiving
  • auto restart
  • Autostart
  • AVCLI
    • logging in with stored credentials 15.16.3.4
    • storing or overwriting credentials 15.16.3.3
  • AVCLI commands
  • AVCLI commandsALTER DATA ENCRYPTIONALTER DATA ENCRYPTION commandencryption AVCLI commandse ALTER DATA ENCRYPTION A.9.2
  • AVCLI commandsCLEAR LOGCLEAR LOG commanddiagnostic logs clearing with AVCLI A.14.2
  • AVCLI utility

B

  • backup
  • backup/restore
  • Backup/Restore 15.7.1
    • high availability configuration 15.7.1
    • repository encryption 15.7.1
  • backup schedule
  • best practices
  • blocking
    • database connections
      • and Database Firewall 3.4.3
    • IPv6 traffic 3.4.3
    • mode in monitoring point 7.5.2
    • security
      • database access handling 3.4.3
  • break
    • Database Firewall instances 9.3.4

C

  • CDB, registering target 7.2.1.2
  • certificate
    • Audit Vault Server 15.1.3.1
    • Database Firewall 7.9.3
    • supplying to Database Firewall 5.3
  • certificate rotation
  • certificates 3.7.1, 3.7.2
  • certificate warning
    • Audit Vault Server, changing UI certificate 4.2
  • change
    • Database Firewall host name 5.7
    • time zone 4.3.2
  • change host name
    • standby Audit Vault Server 4.3.3.2
  • change IP address
    • Database Firewall 5.6
  • COLLECTING trail status 7.4.4
  • collection attributes
  • collection plug-in AVCLI commands
  • collection plug-ins
  • command
    • RETRIEVE AUDIT POLICIES A.17.4
  • command line utility
  • configuration
    • audit trails 7.4.2
    • Database Firewall
    • high availability
      • Database Firewall 9.3.1
    • monitoring points 7.5.2
    • targets
    • understanding workflow 2.8
  • configure
    • custom port 4.3.5
    • Database Firewall pair 9.3.2
    • primary Audit Vault Server 9.2.4
    • standby Audit Vault Server 9.2.3
  • configure mutual authentication
    • inbound TLS communication 7.9.2
    • outbound TLS communication 7.9.2
  • configure snmpv3 users 5.4.3
  • configuring
    • remote syslog over TLS 15.4
  • Configuring Agent auto start
    • IBM AIX host machine M.5
    • OL6 host machine M.2
    • OL7 and OL8 host machine M.1
    • Solaris [SPARC/x64] host machine M.4
    • Windows x64 host machine M.3
  • configuring high availability for Database Firewall in proxy mode
    • through client configuration 9.4.1
    • through DNS 9.4.2
  • CONNECT command A.14.3
  • connections, maintaining for database clients 7.5.3
  • connect strings (for Target Location field) C.6.1
  • console
  • console certificate
    • Audit Vault Server 4.2
  • create audit trail A.7.5
  • CREATE DATABASE FIREWALL MONITOR command A.4.3
  • CREATE RESILIENT PAIR command A.3.3
  • CREATE RETENTION POLICY command A.15.2
  • CREATE TARGET GROUP command A.6.3
  • creating target groups 7.2.2
  • Custom Collector Development 3.5.1

D

  • database clients
    • connecting through proxy Database Firewall 5.8.3
  • database firewall
    • AVCLI commands used for A.3.1
  • Database Firewall
    • adding Database Firewall to Audit Vault Server 4.8
    • certificate rotation 3.7.5
    • certificate signed by external CA 7.9.3
    • change IP address 5.6
    • configuration 5.1
      • Audit Vault Server certificate and IP address 5.3
      • network services 5.4.2
      • network settings 5.4.1
      • proxy 5.8.3
      • traffic sources 5.8.2
    • Database Firewall
    • diagnostics 5.9
    • DNS servers
      • configuring for Database Firewall 5.4.2
    • generate certificates 3.7.6
    • high availability 9.3
    • high availability, configuring 9.3.1
    • logging in to UI 2.9.2
    • missing data in reports J.8
    • missing SQL statements J.8
    • network placement 5.8.1
    • network services configuration 5.4.2
    • network settings, changing
      • network mask, Database Firewall network settings 5.4.1
      • subnet
        • Database Firewall network settings, network mask 5.4.1
    • network traffic, capturing to file 15.18.3
    • overview 5.2
    • planning configuration 2.7.3
    • ports
      • for external network access F.5
      • for firewall services F.3
      • required to be open F.1
    • proxy
      • configuration 5.8.3
      • database client connections 5.8.3
    • public key 7.7.3
    • removing from Audit Vault Server 15.18.5
    • restart, power off 15.18.4
    • SNMP access
      • configuring for Database Firewall 5.4.2
    • SSH access
      • configuring for Database Firewall 5.4.2
    • status
    • system services
      • configuring for Database Firewall 5.4.2
    • TLS proxy certificates 3.7.6
    • traffic sources, configuring 5.8.2
    • upload certificates 3.7.6
    • ways to connect to 5.2
  • database firewall AVCLI commands
  • database firewall commands A.3.1
  • Database Firewall high availability
    • with monitoring points 9.3.5
  • Database Firewall in high availability
    • proxy mode 9.4
  • DATABASE FIREWALL MONITOR
    • AVCLI commands used for A.4.1
  • DATABASE FIREWALL MONITOR AVCLI commands
  • DATABASE FIREWALL MONITOR commands A.4.1
  • Database Firewall monitoring points
  • Database Firewall pair
  • Database Firewalls
  • database response monitoring
  • databases supported 2.4.4
  • Data Encryption
  • data files, purging after retrieve 15.5.3
  • data retention policies
  • data security 3.1
  • date and time
    • setting
      • in Audit Vault Server 4.3.1
      • in Database Firewall 5.5
    • timestamps in reports 4.3.1
  • DB2
    • See: IBM DB2
  • DEACTIVATE HOST command A.2.4
  • debugging
    • Audit Vault Agent 6.4.2, 15.1.2.1
    • AVCLI debug log level, setting 15.16.5
    • Java framework (Jfwklog) LOGLEVEL A.12.2
    • Syslog, generating debug messages 4.3.4
  • DELETE ALERT command A.16.1
  • DELETE RETENTION POLICY command A.15.3
  • delete target from a group A.6
  • delete target from a target group A.6.4
  • deleting hosts 6.7
  • deploying Agent
    • main Audit Vault Server O.6
  • DEPLOY PLUGIN command A.13.2
  • developers, downloading SDK 15.17
  • diagnostics
  • directory mask
    • trail location for DIRECTORY trail type 7.4.2, C.6.3
  • DISABLE ALERT command A.16.2
  • disable mutual authentication
    • inbound TLS communication 7.9.4
    • outbound TLS communication 7.9.4
  • DISABLE UNIFIED AUDIT POLICY command A.17.3
  • disk groups
  • disk space
    • additional for SMB and scp archive data transfer 4.5.1
    • monitoring archive log space 15.12
  • dispatcher service, security considerations 3.4.4
  • DOWNLOAD LOG FILE command A.12.3
  • DROP DATABASE FIREWALL MONITOR command A.4.4
  • DROP FIREWALL command A.3.4
  • DROP HOST command A.2.5
  • DROP REMOTE FILESYSTEM command A.11.3
  • DROP RESILIENT PAIR command A.3.5
  • DROP SAN SERVER command A.10.4
  • DROP SECURED TARGET command A.5.3
  • DROP SMTP SERVER command A.8.7
  • DROP TARGET GROUP command A.6.5
  • DROP TRAIL FOR SECURED TARGET command A.7.2

E

  • email notifications
    • about configuring service 4.4.1
    • altering SMTP configuration A.8.2
    • configuring (in UI) 4.4.2
    • disabling SMTP configuration A.8.3
    • enabling SMTP configuration A.8.4
    • finding SMTP configuration A.8.8
    • registering for A.8.2
    • registering SMTP service A.8.9
    • removing configuration for secure server A.8.5
    • timestamp shown in 4.3.1
    • unregistering SMTP service A.8.7
  • enable
    • FIPS 140-2 I
  • ENABLE ALERT command A.16.3
  • enable FIPS 140-2
    • Audit Vault Server I.2
    • Database Firewall I.3
    • Database Firewall in high availability I.4
  • enable TLS encrypted traffic monitoring
    • Oracle Database 7.9
  • ENABLE UNIFIED AUDIT POLICY command A.17.1
  • Enabling SSH
    • Secondary Network Interface for Audit Vault Server K.2
  • encrypted traffic monitoring for Oracle Database
  • encryption
    • network encryption, handling 3.4.1
    • Oracle Databases, configuration for handling 7.7
    • providing public key to encrypted Oracle Database 7.7.3
    • security guidelines 3.4.1
    • show status, AVCLI command A.9.14
  • Enterprise Manager, Audit Vault and Database Firewall Plug-in for 2.11
  • Event Repository Encryption
  • exiting AVCLI A.14.6
  • expired audit records, archiving 7.4.6
  • external
    • network dependencies 3.3

F

  • failover
  • filesystem
    • additional space for SMB and scp archive data transfer 4.5.1
  • FIPS
    • Oracle AVDF I.1
  • FIPS 140-2 I, I.1
  • flash recovery area, monitoring in Audit Vault Server 15.13

G

  • general usage
    • AVCLI commands used for A.14.1
  • general usage AVCLI commands
  • general user
    • AVCLI commands used for A.18.1
  • general user AVCLI commands
  • GRANT ACCESS command A.9.4
  • GRANT ADMIN command A.9.5
  • GRANT AUDITOR command A.9.6
  • granting access privileges A.9.4
  • granting ADMIN privileges A.9.5
  • granting AUDITOR privileges A.9.6
  • granting super admin privileges A.9.7
  • granting super auditor privileges A.9.8
  • GRANT SUPERADMIN command A.9.7
  • GRANT SUPERAUDITOR command A.9.8
  • groups 7.2.2, 7.2.3
    • access rights

H

  • help information about AVCLI A.14.5
  • high availability 15.7.14
    • Audit Vault Server backup 15.7.10
    • backup and restore impact 15.7.1
    • backup encryption 15.7.1
    • check status 9.2.5
    • Database Firewall 9.3
    • Database Firewall with monitoring points 9.3.5
    • for Audit Vault Server 9.2
    • for Database Firewall 9.3.1
    • of Audit Vault Servers 9.2.1, 9.2.13
    • Oracle AVDF on OCI 12.9
    • resilient pairs 9.1
    • SAN repository 16.5.1
  • high availability restore 15.7.14
  • host machine
  • host monitor
  • Host Monitor
  • host monitor agent
    • requirements validation 8.2.2
  • host monitors
    • checking status of 8.3.5
    • deploying on Unix 8.2.4.2
    • installing 8.2
    • uninstalling (Unix hosts only) 8.3.6
    • updating, Linux only 8.4
  • host name
  • hosts
    • AVCLI commands used for A.2.1
    • changing names 6.3.9
    • deleting from Audit Vault Server 6.7
    • registering
      • procedure 6.2
    • registering, about 6.1

I

  • IBM DB2
    • audit trail cleanup C.5.4
    • audit trail location C.2.6
    • collection attributes C.6.2.3
    • converting binary audit files to ASCII format 7.4.8.3
    • starting audit trail, prerequisite ASCII conversion 7.4.1
    • user account script C.3.6.2
  • IDLE trail status 7.4.4
  • In-Memory usage
  • installation, security guidelines 3.1
  • installing
    • PostgreSQL E.2
  • IP addresses
    • and spoofing detection in monitoring and blocking mode 7.5.2
    • Audit Vault Server
      • changing, reboot required 4.3.3.1
    • subnet restrictions for proxy interface 5.8.3
  • IPv6

J

  • java best practices
    • audit vault agent machine 6.3.2
  • Java framework, logging levels, debugging A.12.2
  • Java SE, Audit Vault Agent requires 6.3.7
  • jobs, monitoring 15.14

K

  • key, for activating agent 6.3.8
  • keyboards
  • keystore password, changing 15.6.3

L

  • link properties
    • network setting
  • Linux
  • LIST ADMIN command A.18.8
  • LIST ADMINS command A.18.9
  • LIST ALERT POLICIES command A.16.4
  • LIST ATTRIBUTE FOR SECURED TARGET command A.5.4
  • LIST ATTRIBUTE OF SMTP SERVER command A.8.8
  • LIST AUDITOR command A.18.10
  • LIST AUDITORS command A.18.11
  • LIST DATABASE FIREWALL MONITOR command A.4.5
  • LIST DISK command A.10.5
  • LIST DISKGROUP command A.10.6
  • LIST EXPORT command A.11.4
  • LIST FIREWALL command A.3.6
  • LIST HOST command A.2.6
  • LIST METRICS command A.5.5
  • LIST PLUGIN FOR SECURED TARGET TYPE command A.13.3
  • LIST REMOTE FILESYSTEM command A.11.5
  • LIST RETENTION POLICY command A.15.4
  • LIST SAN SERVER command A.10.7
  • LIST SECURED TARGET command A.5.6
  • LIST SECURED TARGET TYPE command A.5.7
  • LIST TARGET FOR SAN SERVER command A.10.8
  • LIST TARGET GROUPS command A.6.6
  • LIST TARGETS OF TARGET GROUP command A.6.7
  • LIST TRAIL FOR SECURED TARGET command A.7.3
  • LIST UNIFIED AUDIT POLICIES command A.17.2
  • locked user accounts
  • log files
  • logging in
    • to Database Firewall 2.9.2
  • logging levels
  • log in
    • to Audit Vault Server 2.9.1

M

  • MAC addresses, spoofing detection and monitoring and blocking mode 7.5.2
  • Maintain Existing Connections monitoring point setting 7.5.3
  • Maintenance Job
  • Management NIC
    • from secondary NIC K.8
  • manual archiving
    • starting an archive job 15.5.2
  • messages
    • Audit Vault G.1
    • Database Firewall G.2
  • metrics of targets A.5.5
  • Microsoft Active Directory
    • audit trail location C.2.14
    • authentication in Oracle AVDF 14.7.2
  • Microsoft Active Directory integration
    • about 14.7.1
    • creating new users 14.7.3
    • log in as OpenLDAP or Microsoft Active Directory user 14.7.4
  • Microsoft SQL Server
    • audit trail location C.2.4
    • registering C.5.2
    • trace files, preventing from being deleted by accident C.5.2
    • user account script C.3.5.2
  • Microsoft Windows
    • audit trail location C.2.13
    • file sharing
      • archiving transfer, recommended port 4.5.2
    • host monitor, deploying on 8.2.4.1
    • services, registering AV Agent as 6.3.13.2
    • target user, administrative permissions 7.3.3
  • missing data
    • Oracle AVDF reports J.8
  • missing SQL statements
    • Oracle AVDF reports J.8
  • modifying target groups 7.2.3
  • monitor 15.7.13
    • Audit Vault Server backup 15.7.8
  • monitoring
    • Audit Vault Server detailed diagnostics 15.1.2.3
    • Audit Vault Server diagnostic checks 15.1.2.2
    • Database Firewall diagnostics 5.9
  • monitoring and blocking mode
    • and spoofing detection rules 7.5.2
    • connections, switching from monitoring only mode 7.5.3
    • monitoring point monitoring mode 7.5.2
    • traffic disruption on time synchronization 5.5
  • monitoring mode
    • and SQL blocking 7.5.2
    • monitoring point monitoring mode 7.5.2
    • monitoring point setting 7.5.2
    • with SQL blocking firewall policy 7.5.2
  • monitoring points
    • configuring 7.5.2
    • database response setting 7.5.3
    • definition 7.5.1
    • deleting 7.5.4
    • Maintain Existing Connections setting 7.5.3
    • modifying 7.5.3
    • monitoring and blocking mode and IP spoofing 7.5.2
    • monitor native network encrypted traffic 7.5.3
    • starting and stopping 7.5.4
    • status 7.5.2
    • status, viewing 7.5.5
    • status values, defined 7.5.5
  • monitor native network encrypted traffic
    • monitoring point setting 7.5.3
  • monitor restore 15.7.13
  • Months Archived field 4.5.3.1
  • Months Online field 4.5.3.1
  • Multiple
    • Network Interface Cards K.1
  • Multiple Network Interface Cards K.1
  • MySQL
    • See: Microsoft Active DirectoryOracle ACFS
    • ACFS
      • See: Oracle ACFS
    • Active Directory
      • See: Microsoft Active Directory
    • adding audit trail, prerequisite XML conversion 7.4.1
    • collection attributes C.6.2.4
    • Microsoft Active Directory
      • supported versions C.2.1
    • Microsoft Windows
      • supported versions C.2.1
    • Oracle ACFS
      • supported versions C.2.1
    • Solaris
      • supported versions C.2.1
    • supported versions C.2.1
    • trail location 7.4.8.2, A.7.4, A.7.6, C.6.3
    • XML transformation utility 7.4.8.2

N

  • native network encrypted traffic
    • monitoring for Oracle Database 7.7
  • native network encrypted traffic through Database Firewall
  • Native Network Encryption
  • Network Encryption
    • providing public key to encrypted Oracle Database 7.7.3
  • network services
    • configuring for Database Firewall 5.4.2
  • network traffic, capturing to file in Database Firewall 15.18.3
  • NFS filesystem
    • archiving transfer method 4.5.2
    • AVCLI commands
      • REGISTER REMOTE FILESYSTEM A.11.6
    • registering with the Audit Vault Server A.11.6
    • REGISTER REMOTE FILESYSTEM command A.11.6
  • non-SQL protocol access
    • Audit Vault and Database Firewall
      • IPv6 not supported 3.4.3
    • Database Firewall
      • non-TCP-based connections 3.4.3
    • IPv6
      • connections not supported 3.4.3
    • non-TCP-based connections, and Database Firewall 3.4.3

O

  • OCI VM shapes
  • opening port
    • Oracle Database Cloud Service 13.2
  • OpenLDAP
    • authentication in Oracle AVDF 14.7.2
  • OpenLDAP integration
  • operating systems supported 2.4.4
  • Oracle ACFS
  • Oracle AVDF 3.7.1
    • audit trails 12.11
    • Cloud Marketplace image 12.4.1
    • connect to instance 12.5
    • create 12.4.2
    • deploy Audit Vault Agent 12.10
    • deploy Database Firewall on OCI 12.12
    • differences in on-premises and OCI deployment 12.7
    • high availability 12.9
    • OCI 12.1, 12.2
    • OCI VM shapes 12.3
    • Oracle Cloud Infrastructure
    • ports used 12.8
    • post instance creation steps 12.4.3
    • provisioning on OCI 12.4
    • scale up instance 12.6
    • terminate instance 12.18
  • Oracle AVDF on OCI
    • archive and retrieve 12.16
    • backup and restore 12.15
    • monitor Autonomous Database services 12.13
    • monitor DB Systems 12.14
    • start or stop instance 12.17
  • Oracle database
    • enabling auditing 7.3.2
    • Native Network Encryption 7.8.1
  • Oracle Database
    • audit trail location C.2.2
    • collection attributes C.6.2.2
    • In-Memory
    • PDB/CDB and targets 7.2.1.2
    • REDO logs, audit data collection reference D.1
    • user account script C.3.2
    • using Network Encryption, configuration for handling 7.7
  • Oracle Database - 11.1
    • entitlement auditing C.2.1
    • IBM DB2
      • supported versions C.2.1
    • native network encrypted traffic monitoring C.2.1
    • stored procedure auditing C.2.1
    • supported versions C.2.1
    • Sybase ASE
      • supported versions C.2.1
    • Sybase SQL Anywhere
      • supported versions C.2.1
  • Oracle Database In-Memory
  • Oracle GoldenGate
  • Oracle RAC
  • Oracle shared server, security considerations 3.4.4

P

  • password expiry
  • passwords
  • PDB, registering target 7.2.1.2
  • perform backup
  • platform 3.7.1
  • platform certificates 3.7.1
  • platforms supported 2.3
  • plug-ins
  • policies
  • ports
    • See: Secure Copy
    • archiving
      • defining archiving locations 4.5.2
      • transfer method
    • finding Database Firewall monitoring point 7.5.6
    • for Audit Vault Server external network access F.4
    • for Audit Vault Server services F.2
    • for Database Firewall external network access F.5
    • for internal TCP communication F.6
    • recommended for archiving using Windows file sharing transfer 4.5.2
    • required for Database Firewall deployment F.1
    • scp
      • See: Secure Copy
    • Secure Copy
      • archive datafile transfer 4.5.2
  • PostgreSQL
  • power off
  • POWEROFF FIREWALL command A.3.7
  • prerequisites
    • Audit Vault Server high availability 9.2.2
  • primary and standby Database Firewall
  • proxy
    • and database client connections 5.8.3
    • configuring Database Firewall as 5.8.3
    • IP address, subnet restrictions 5.8.3
  • proxy mode
    • Database Firewall high availability 9.4
  • public key
    • Audit Vault Server 15.1.3.2
    • Database Firewall 7.7.3
    • providing to encrypted Oracle Database 7.7.3
  • purge job
    • Audit Vault Server audit data O.3
  • purging audit trails
    • IBM DB2 audit files 7.4.8.3
    • source database in Audit Vault environment C.5.1.2

Q


R

  • REBOOT FIREWALL command A.3.8
  • recommends that you follow these se
    • guidelines, general security 3.2
    • security
      • general recommendations 3.2
      • recommendations 3.2
  • recommends you follow these
    • hybrid cloud
    • hybrid cloud, deployment 13.1
  • RECOVERING trail status 7.4.4
  • REDO logs
    • audit data collection reference D.1
  • register database target
    • main Audit Vault Server O.7.1
  • REGISTER FIREWALL command A.3.9
  • REGISTER HOST command A.2.7
  • registeringh
    • hosts
      • procedure 6.2
  • register Linux target
    • main Audit Vault Server O.8.1
  • REGISTER SAN SERVER command A.10.9
  • REGISTER SMTP SERVER command A.8.9
  • REGISTER TARGET command A.5.8
  • remote access, security guidelines 3.1.2
  • remote file system AVCLI commands
  • remote file systems
    • AVCLI commands used for A.11.1
  • remote monitors
    • See: host monitors
  • remote syslog
    • TLS, configuring 15.4
  • reports
    • host monitoring 8.1
    • timestamp shown in PDF/XLS 4.3.1
  • repository
  • requirements
    • audit vault agent 6.3.1
    • Audit Vault Agent, Java SE 6.3.7
  • reset console view
    • Actions button 2.9.4
    • console
      • filtering and sorting lists 2.9.4
    • filtering, lists in Audit Vault Server console 2.9.4
    • formatting, lists in Audit Vault Server console 2.9.4
    • lists, finding objects in Audit Vault Server console 2.9.4
    • sorting lists in Audit Vault Server console 2.9.4
  • resilient pairs
  • restart
  • restore 15.7.13, 15.7.14
  • RETRIEVE AUDIT POLICIES command A.17.4
  • retrieve session information
    • for Microsoft SQL Server database 7.8.4.1
    • Sybase SQL Anywhere database 7.8.4.2
  • retrieving, from archives 15.5.3
  • REVOKE ACCESS command A.9.9
  • REVOKE ADMIN command A.9.10
  • REVOKE AUDITOR command A.9.11
  • REVOKE SUPERADMIN command A.9.12
  • REVOKE SUPERAUDITOR command A.9.13
  • revoking

S

  • sample Oracle GoldenGate Integrated Extract parameter files D.13
  • SAN disks
    • adding to repository 16.5.2
    • dropping from repository 16.5.3
  • SAN servers
  • SAN storage
    • AVCLI commands used for A.10.1
    • iSCSI initiator name, configuring 16.2
  • SAN storage AVCLI commands
  • Scheduling
  • Scheduling Maintenance Job 15.15
  • scp
    • See: Secure Copy
  • scripts
  • SDK, downloading for plug-in development 15.17
  • Secondary Network Interface
    • Enable SSH K.2
  • Secondary Network Interface Card
    • enable Agent connectivity for 20.7 and earlier K.3
    • enable Agent connectivity for 20.8 and later K.4
    • enable Agent for high availability connection K.5
  • Secondary Network Interface Card for Audit Vault Server K.5
  • Secondary Network Interface Card for Audit Vault Server 20.7 and earlier K.3
  • Secondary Network Interface Card for Audit Vault Server 20.8 and later K.4
  • secondary NIC
    • change to Management NIC K.8
  • Secure Copy
    • archive datafile transfer 4.5.1
  • Secure Sockets Layer (SSL)
    • SMTP configuration A.8.6
  • security
    • and installing 3.1
    • Audit Vault and Database Firewall account guidelines 14.3.1
    • Custom Collector Development 3.5.1
    • encryption 3.4.1
    • guidelines 3.1
    • multiple databases on shared listener 3.4.5
    • Oracle shared server configuration 3.4.4
  • security management
    • AVCLI commands used for A.9.1
  • security management AVCLI commands
  • Security Technical Implementation Guides (STIG)-based advice on implementation H
  • Security Technical Implementation Guides (STIG)user account rules 14.2
  • self signed certificates
    • Database Firewall 7.9.1
  • server management
    • AVCLI commands used for A.12.1
  • server management AVCLI commands
  • Service Name field 7.2.1.2, A.5.2
  • session information
    • non Oracle database 7.8.4
  • settings, keyboard 4.3.1
  • shared listener, security considerations
    • client program name
      • security considerations 3.4.5
    • client-side security 3.4.5
    • OS username, security considerations 3.4.5
    • security
      • client-side context information 3.4.5
  • SHOW CERTIFICATE command A.12.4
  • SHOW ISCSI INITIATOR DETAILS FOR SERVER command A.10.10
  • SHOW RETENTION POLICY command A.15.5
  • SHOW STATUS FOR FIREWALL command A.3.11
  • SHOW STATUS OF REMOTE FILESYSTEM command A.11.7
  • SID 7.2.1.2
  • SID field 7.2.1.2, A.5.2
  • SMB
    • See: Windows File Sharing
    • archiving
      • expired audit records
  • SMTP
    • configuring connection (UI) 4.4.1
    • enabling (AVCLI) A.8.4
  • SMTP connection AVCLI commands
  • SMTP connections
    • AVCLI commands used for A.8.1
  • SNMP access
    • Audit Vault Server
    • configuring for Audit Vault Server 4.3.3.3
    • DNS servers
      • configuring for Audit Vault Server 4.3.3.3
    • network services
      • configuring for Audit Vault Server 4.3.3.3
    • standby Audit Vault Server 4.3.3.4
    • system services
      • configuring for Audit Vault Server 4.3.3.3
    • Web access
      • configuring for Audit Vault Server 4.3.3.3
  • Solaris
    • audit trail location C.2.10
    • audit trail location format C.2.10, C.6.3
    • audit trail location format (avcli) A.7.4
  • SPA, configuring 7.6
  • spoofing detection
    • MAC and IP address, and monitoring and blocking mode 7.5.2
  • SQL, types not captured by Database Firewall 3.4.2
  • SQL*Net
    • and Sybase ASE, required on Agent host 6.3.7
  • SQL Anywhere
    • See: Sybase SQL Anywhere
  • SQL Server
    • See: Microsoft SQL Server
  • SSH access
    • configuring for Audit Vault Server 4.3.3.3
    • configuring for standby Audit Vault Server 4.3.3.4
  • SSL connections
    • configuring targets for 7.11
  • standby Audit Vault Server
  • start audit trail command A.7.5
  • START COLLECTION FOR SECURED TARGET command A.7.4
  • START DATABASE FIREWALL MONITOR command A.4.6
  • Start data encryption
  • status
    • audit trails, checking 7.4.4
    • Audit Vault Server
    • Database Firewall, viewing for 5.9
    • host monitor, checking 8.3.5
    • jobs in Audit Vault Server 15.14
  • STOP COLLECTION FOR SECURED TARGET command A.7.6
  • STOP DATABASE FIREWALL MONITOR command A.4.7
  • STOPPED trail status 7.4.4
  • storage requirement
    • main Audit Vault Server O.4
  • stored procedure auditing
    • configuring 7.6
  • stored procedure auditing (SPA)
    • configuring 7.6
  • subnet
    • Database Firewall network settings, default gateway 5.4.1
    • for proxy IP address 5.8.3
    • ports
    • proxy
    • system settings, default gateway 4.3.3.1
    • system settings, network mask 4.3.3.1
  • sudo access configuration 14.4.1
  • super administrators
  • supported operating systems 2.4.4
  • supported platforms 2.3
  • supported targets 2.4.4
  • Suspended, monitoring point status 7.5.5
  • swap
    • primary and standby Database Firewall 9.3.3
  • SWAP RESILIENT PAIR command A.3.10
  • swap roles
    • primary and standby Audit Vault Servers 9.2.8
  • Sybase ASE
    • audit trail location C.2.7
    • SQL*Net on Agent host, requirement 6.3.7
    • user account script C.3.3.2
  • Sybase SQL Anywhere
    • audit trail location C.2.8
    • user account script C.3.4
  • synchronizing time
    • traffic disruption in monitoring and blocking mode 5.5
  • SYSAUX tablespace
    • monitoring in Audit Vault Server 15.11
  • syslog
    • Audit Vault and Database Firewall alert forwarding, format 4.3.4
    • debug messages, generating 4.3.4
    • forward to destinations, configuring 4.3.4
    • IP addresses for forwarding 4.3.4
  • system configuration
    • understanding workflow 2.8
    • workflow
      • with Audit Vault Agent 2.8.1
      • with Database Firewall 2.8.2

T

  • TABLE audit trail C.2.16
  • tabs, UI, described 2.9.3
  • target A.5.1
    • host machine change 7.2.5
  • target AVCLI commands
  • target group A.6
  • target group AVCLI commands
  • Target Location field 7.2.1.2, C.6.1
  • targets
  • TCPS/SSL connections
    • configuring targets for 7.11
  • testing, Audit Vault Server operation 4.9
  • TEST SMTP SERVER command A.8.10
  • timestamps, and Audit Vault Server date and time 4.3.1
  • time synchronization, traffic disruption in monitoring and blocking mode 5.5
  • time zone
  • Time Zone Offset field 4.3.1
  • TLS
    • Database Firewall 3.7.6
  • TLS proxy
  • TLS proxy certificates
    • Database Firewall 3.7.6
  • trace files, Microsoft SQL Server, preventing deletion C.5.2
  • traffic disruptions, and time synchronization in monitoring and blocking mode 5.5
  • traffic sources
    • changing in monitoring point 7.5.3
    • Database Firewall, configuring in 5.8.2
  • Trail Location field
    • directory mask for DIRECTORY trail type 7.4.2, C.6.3
  • trail locations
    • supported per target C.6.3
  • TRANSACTION LOG
    • recommended settings reference D.1
  • transfer method, archiving 4.5.2
  • Transport Layer Security (TLS)
    • SMTP configuration A.8.6
  • troubleshooting J.8
    • Agent activation error using avcli J.9
    • Agent cannot connect to Audit Vault Server J.2
    • Audit Vault Agent
      • access denied while installing as Windows service J.14
      • error on startup J.16
      • java -jar agent.jar failed J.11
      • unable to start through services applet J.15
      • unable to uninstall Windows service J.13
    • avcli agent activation error J.9
    • cannot collect Oracle Database trail J.2
    • Database Firewall, partial traffic only J.7
    • Host Monitor, setup error J.3
    • host monitor fails J.2
    • Oracle Database alerts not triggered J.17

U

  • UI
    • Audit Vault Server, tabs described 2.9.3
  • UI certificates
    • Audit Vault Server, changing 4.2
  • UNDEPLOY PLUGIN command A.13.4
  • Unix
    • deploying host monitor on 8.2.4.2
  • unlock user account 14.3.5, A.9.3
  • unpair
    • Audit Vault Servers 9.2.10
    • Database Firewall instances in high availability 9.3.4
  • Unreachable, monitoring point status 7.5.5
  • UNREACHABLE trail status 7.4.4
  • update
    • Audit Vault Agents 9.2.6
  • Update Certificate button
    • certificate
    • Database Firewall
      • certificate validation failed 15.18.6
  • updating
    • host monitors, Linux only 8.4
  • upload or delete wallet file command A.5.9
  • user accounts
  • User Content To System Configuration Files
    • add N
  • users
    • logging in to the Audit Vault Server console 2.9.1
    • user names with quotes invalid 7.3.3, 14.3.1

V

  • validate
    • Audit Vault Server backup 15.7.8
  • validate requirements
    • audit vault agent 6.3.3
    • host monitor agent 8.2.2
  • verify FIPS 140-2 status
    • Database Firewall in high availability I.5, I.6
  • version number of AVCLI, finding A.14.9

W

  • wallet
    • event repository encryption, backing up 15.6.4
  • Windows
    • See: Microsoft Windows
  • Windows File Sharing
  • Windows service
    • Audit Vault Agent, registering as 6.3.13.1
    • Audit Vault Agent, unregistering as 6.3.13.3
  • with monitoring points
    • Database Firewall high availability 9.3.5