Home | Previous Page | Next Page   Overview of Auditing > Audit Analysis >

Preparation for Audit Analysis

This section describes two methods to analyze database server audit records:

Important:
The SQL-based procedure is more convenient but remains untrusted because users can use SQL data-manipulation statements to tamper with the records that are copied into a table.

Both methods rely on a utility called onshowaudit, which Audit Analysis and Utility Syntax describe. For either method, you can extract audit events for specific users, database servers, or both.

Figure 4 shows the preparation process for both analysis methods. Audit Analysis explains each step in detail.

Figure 4. Preparing for Audit Analysis
begin figure description - This figure is described in the surrounding text. - end figure description

To perform audit analysis, first have audit records in your database server or operating-system audit trail. The onshowaudit utility does not remove data from the audit trail. It only reads records from the audit trail and allows them to be viewed or manipulated with standard SQL utilities.

UNIX Only

When all of the following conditions are present on UNIX, records are in the operating-system audit trail:

End of UNIX Only
Windows Only

To clear or remove audit logs on Windows, delete the files that contain the audit trail.

End of Windows Only
Home | [ Top of Page | Previous Page | Next Page | Contents | Index ]