Configuring DSMs
Oracle Audit Records
273
Step 7
If you are using Oracle v9i or Oracle v10g Release 1, you must create a view,
using SQLplus to enable the SIEM integration. If you are using Oracle 10g
Release 2 or later, you may skip this step:
CREATE VIEW SIEM_audit_view AS SELECT
CAST(dba_audit_trail.timestamp AS TIMESTAMP) AS SIEM_time,
dba_audit_trail.* FROM dba_audit_trail;
If you are using the JDBC protocol, see the
Log Sources User Guide
for more
information on configuring the JDBC protocol. When configuring the JDBC protocol
within SIEM (see the
Log Sources User Guide
), use the following specific
parameters:
NOTE
Make sure that database user that SIEM uses to query events from the audit log
table has the appropriate permissions for the Table Name object.
Step 8
You are now ready to configure the log source in SIEM.
To configure SIEM to receive events from an Oracle Database:
From the
Log Source Type
drop-down list box, select the
Oracle RDBMS
Audit Record
option.
For more information on configuring log sources, see the
Log Sources User Guide
.
Improving
Performance With
Large Audit Tables
The size of the Oracle audit table affects the amount of time that SIEM requires to
process the DBA_AUDIT_TRAIL view. If your sys.sud$ table is large (close or
exceeding 1 GB), extended processing time is required. To ensure SIEM
processes the large sys.sud$ table quickly, you must create an index and a new
view.
NOTE
If auditing is extensive or the database server is very active, you may need to shut
down the database to perform the below procedure.
Table 51-2
Configuring Log Source Parameters
Parameter Name
Oracle v9i or 10g Release 1
Values
Oracle v10g Release 2 and
v11g Values
Table Name
SIEM_audit_view
dba_audit_trail
Select List
*
*
Compare Field
SIEM_time
extended_timestamp
Database Name
For all supported versions of Oracle, the Database Name
must be the exact service name used by the Oracle listener.
You can view the available service names by running the
following command on the Oracle host:
lsnrctl status
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......