{"id":4105,"date":"2014-11-13T10:47:00","date_gmt":"2014-11-13T09:47:00","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/"},"modified":"2014-11-13T10:47:00","modified_gmt":"2014-11-13T09:47:00","slug":"avdf-post-installation-configuration","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/","title":{"rendered":"Oracle AVDF post-installation configuration"},"content":{"rendered":"<p>In one of my last blog, named: &#8220;<a href=\"\/oracle-audit-vault-and-database-firewall-avdf-121-installation-on-virtualbox-1\" target=\"_blank\">Oracle Audit Vault and Database Firewall (AVDF) 12.1 &#8211; installation on VirtualBox<\/a>&#8221; I explained how to install AVDF on VirtualBox. Since some of you asked for a blog on &#8220;How to configure AVDF&#8221;, I decided to write this posting on AVDF post-installation configuration. This one only concerns the post-installation phase, a third blog will be dedicated to practical cases concerning the configuration of Database Firewall Policies.<\/p>\n<h3>Specifying the Audit Vault Server Certificate and IP Address<\/h3>\n<p>You must associate each Database Firewall with an Audit Vault Server by specifying the server&#8217;s certificate and IP address, so that the Audit Vault Server can manage the firewall. If you are using a resilient pair of Audit Vault Servers for high availability, you must associate the firewall to both servers.<\/p>\n<p>1. Log in to the Audit Vault Server as an administrator, and then click the Settings tab.<br \/>\n2. In the Security menu, click Certificate. The server&#8217;s certificate is displayed.<\/p>\n<p><a title=\"avdf001.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png\"><img decoding=\"async\" title=\"avdf001.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png\" alt=\"avdf001.png\" \/><\/a><\/p>\n<p>3. Copy the server&#8217;s certificate.<br \/>\n4. Log in to the Database Firewall administration console<br \/>\n5. In the System menu, click Audit Vault Server.<br \/>\n6. Enter the IP Address of the Audit Vault Server.<br \/>\n7. Paste the Audit Vault Server&#8217;s Certificate in the next field.<\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf002.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf002.png\"><img decoding=\"async\" title=\"avdf002.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf002.png\" alt=\"avdf002.png\" \/><\/a><\/p>\n<p>8.\u00a0 Click Apply.<\/p>\n<h3>Registering Oracle Secured Target<\/h3>\n<h4>Ensure That Auditing Is Enabled in the Oracle Secured Target<\/h4>\n<pre class=\"brush: actionscript3; gutter: true; first-line: 1\">Databaseoracle@vmtest12c:\/home\/oracle\/ [DUMMY] SOUK\n******** dbi services Ltd. ********\nSTATUS\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : OPEN\nDB_UNIQUE_NAME : SOUK\nOPEN_MODE\u00a0\u00a0\u00a0\u00a0\u00a0 : READ WRITE\nLOG_MODE\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : NOARCHIVELOG\nDATABASE_ROLE\u00a0 : PRIMARY\nFLASHBACK_ON\u00a0\u00a0 : NO\nFORCE_LOGGING\u00a0 : NO\nVERSION\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 11.2.0.3.0\n***********************************\noracle@vmtest12c:\/home\/oracle\/ [SOUK] sqlplus \"\/as sysdba\"SQL*Plus: Release 11.2.0.3.0 Production on Sun Sep 15 22:35:49 2013Copyright (c) 1982, 2011, Oracle.\u00a0 All rights reserved.\nConnected to:\nOracle Database 11g Enterprise Edition Release 11.2.0.3.0 - 64bit ProductionSQL&gt;SQL&gt;\nSQL&gt; SHOW PARAMETER AUDIT_TRAILNAME\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 TYPE\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 VALUE\n------------------------------------ ----------- ---------------------------\naudit_trail\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 string\u00a0\u00a0\u00a0\u00a0\u00a0 DB<\/pre>\n<p>&nbsp;<\/p>\n<p>If the output of the SHOW PARAMETER command is NONE or if it is an auditing value that you want to change, then you can change the setting as follows.For example, if you want to change to XML, and if you are using a server parameter file, you would enter the following:<\/p>\n<pre class=\"brush: actionscript3; gutter: true; first-line: 1\">SQL&gt; ALTER SYSTEM SET AUDIT_TRAIL=XML SCOPE=SPFILE;\nSQL&gt; SHUTDOWN IMMEDIATE;\nSQL&gt; STARTUP;<\/pre>\n<h4>Registering Hosts in the Audit Vault Server<\/h4>\n<p>1. Log in to the Audit Vault Server console as an administrator.<br \/>\n2. Click the Hosts tab. A list of the registered hosts, if present, appears in the Hosts page. To control the view of this list see &#8220;Working With Lists of Objects in the UI&#8221;.<br \/>\n3. Click Register.<br \/>\n4. Enter the Host Name and Host IP address.<\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf003.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf003.png\"><img decoding=\"async\" title=\"avdf003.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf003.png\" alt=\"avdf003.png\" \/><\/a><\/p>\n<p>5. Click Save.<\/p>\n<h4>Deploying and Activating the Audit Vault Agent on Secured Target Hosts<\/h4>\n<p>1. Log in to the Audit Vault Server console as an administrator.<br \/>\n2. Click the Hosts tab, and then from the Hosts menu, click Agent.<br \/>\n3. Click \u201cDownload Agent\u201d and save the agent.jar file to a location of your choice.<\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf004.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf004.png\"><img decoding=\"async\" title=\"avdf004.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf004.png\" alt=\"avdf004.png\" \/><\/a><\/p>\n<p>4. Using an OS user account, copy the agent.jar file to the secured target&#8217;s host computer.<br \/>\n5. On the host machine, set JAVA_HOME to the installation directory of the jdk1.6 (or higher version), and make sure the java executable corresponds to this JAVA_HOME setting.<\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf005.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf005.png\"><img decoding=\"async\" title=\"avdf005.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf005.png\" alt=\"avdf005.png\" \/><\/a><\/p>\n<p>6. Start a command prompt with Run as Administrator. In the directory where you placed the agent.jar file, extract it by running:<\/p>\n<p><code>java -jar agent.jar -d Agent_Home<\/code><\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf006.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf006.png\"><img decoding=\"async\" title=\"avdf006.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf006.png\" alt=\"avdf006.png\" \/><\/a><\/p>\n<h4>Request agent Activation<\/h4>\n<p>To request activation of the Audit Vault Agent:<\/p>\n<p>1. On the secured target host computer, go to the following directory:<\/p>\n<p><code>Agent_Home\/bin<\/code><\/p>\n<p>2. Agent_Home is the directory created in the step 7 above.\u00a0 Run the following command:<\/p>\n<p><code>.\/agentctl activate<\/code><\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf007.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf007.png\"><img decoding=\"async\" title=\"avdf007.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf007.png\" alt=\"avdf007.png\" \/><\/a><\/p>\n<h4>Activate and Start the Agent<\/h4>\n<p>In this step, you approve the agent activation request in the Audit Vault Server, then start the agent on the secured target host machine.To activate and start the agent:<\/p>\n<p>1. Log in to the Audit Vault Server console as an administrator.<br \/>\n2. Click the Hosts tab.<br \/>\n3. Select the host you want to activate, and then click Activate.<\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf008.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf008.png\"><img decoding=\"async\" title=\"avdf008.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf008.png\" alt=\"avdf008.png\" \/><\/a><\/p>\n<p>This will generate a new activation key under the Agent Activation Key column.You can only activate a host if you have completed the procedures in Step 1: Deploy the Audit Vault Agent on the Host Machine. Otherwise the Agent Activation Status for that host will be No Request.<\/p>\n<p>4. Change directory as follows:<\/p>\n<p><code>cd Agent_Home\/bin<\/code><\/p>\n<p>Agent_Home is the directory created in the step 7 above.<\/p>\n<p>5. On the secured target host machine, run the following command and provide the activation key from Step 3:<\/p>\n<p><code>.\/agentctl start -k key<\/code><\/p>\n<p>Note: the -k argument is not needed after the initial agentctl start command.<\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf009.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf009.png\"><img decoding=\"async\" title=\"avdf009.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf009.png\" alt=\"avdf009.png\" \/><\/a><\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf010.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf010.png\"><img decoding=\"async\" title=\"avdf010.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf010.png\" alt=\"avdf010.png\" \/><\/a><\/p>\n<h3>Stopping and Starting the Audit Vault Agent<\/h3>\n<p>To stop or start the Audit Vault Agent after initial activation and start, run one of the following commands from the Agent_Home\/bin directory on the secured target host machine:<\/p>\n<p><code>.\/agentctl stop<\/code><code><\/code><\/p>\n<p><code>.\/agentctl start<\/code><\/p>\n<h3>Changing the Logging Level for the Audit Vault Agent<\/h3>\n<p>The logging level you set affects the amount of information written to the log files. You may need to take this into account for disc space limitations.The following logging levels are listed in the order of amount of information written to log files, with debug providing the most information:<\/p>\n<ul>\n<li>error &#8211; Writes only error messages<\/li>\n<li>warn &#8211; (Default) Writes warning and error messages<\/li>\n<li>info &#8211; Writes informational, warning, and error messages<\/li>\n<li>debug &#8211; Writes detailed messages for debugging purposes<\/li>\n<\/ul>\n<p>To change the logging level for an Audit Vault Agent:<\/p>\n<p>1. Ensure that you are logged into AVCLI on the Audit Vault Server.<br \/>\n2. Run the ALTER HOST command. The syntax is as follows:<\/p>\n<p><code>ALTER HOST host_name SET LOGLEVEL=av.agent:log_level\u00a0\u00a0\u00a0\u00a0\u00a0 <\/code><\/p>\n<p>In this specification:<\/p>\n<ul>\n<li>\u00a0host_name: The name of the host where the Audit Vault Agent is deployed.<\/li>\n<li>\u00a0log_level: Enter a value of info, warn, debug, or error.<\/li>\n<\/ul>\n<h4>Registering Secured Targets<\/h4>\n<p>1. If you will collect audit data from a secured target, do stored procedure auditing (SPA), entitlements auditing, or enable database interrogation, create a user account on the secured target, with the appropriate privileges to allow Oracle AVDF to access the required data.<\/p>\n<p>Setup scripts: Scripts are available to configure user account privileges for these secured target types:- &#8220;Oracle Database Setup Scripts&#8221;<\/p>\n<ul>\n<li>&#8220;Sybase ASE Setup Scripts&#8221;<\/li>\n<li>&#8220;Microsoft SQL Server Setup Scripts&#8221;<\/li>\n<li>&#8220;IBM DB2 for LUW Setup Scripts&#8221;<\/li>\n<li>&#8220;MySQL Setup Scripts&#8221;<\/li>\n<li>&#8220;Sybase SQL Anywhere Setup Scripts&#8221;<\/li>\n<\/ul>\n<p>Linux secured targets: Assign the Oracle AVDF user to the log_group parameter in the Linux \/etc\/audit\/auditd.conf configuration file. This user must have execute permission on the folder that contains the audit.log file (default folder is \/var\/log\/audit).<\/p>\n<p>Other types of secured targets: You must create a user that has the appropriate privileges to access the audit trail required. For example, for a Windows secured target, this user must have administrative permissions in order to read the security log.<\/p>\n<p>Note: Oracle AVDF does not accept user names with quotation marks. For example, &#8220;JSmith&#8221; would not be a valid user name for an Audit Vault and Database Firewall user account on secured targets.<\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf011.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf011.png\"><img decoding=\"async\" title=\"avdf011.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf011.png\" alt=\"avdf011.png\" \/><\/a><\/p>\n<p>2. Log in to the Audit Vault Server console as an administrator.<br \/>\n3. Click the Secured Targets tab. The Secured Targets page lists the configured secured targets to which you have access. You can sort or filter the list of targets. See &#8220;Working With Lists of Objects in the UI&#8221;.<br \/>\n4. Click Register, and in the Register Secured Target page, enter a name and description for the new target.<br \/>\n5. In the Secured Target Location field, enter the connect string for the secured target.\u00a0\u00a0\u00a0\u00a0\u00a0 See &#8220;Secured Target Locations (Connect Strings)&#8221; for the connect string format for a specific secured target type. For example, for Oracle Database, the string might look like the following:<\/p>\n<p><code>jdbc:oracle:thin:@\/\/HOSTNAME:PORT\/SERVICE_NAME<\/code><\/p>\n<p>6. In the Secured Target Type field, select the secured target type, for example, Oracle Database.<br \/>\n7. In the User Name, Password, and Re-enter Password fields, enter the credentials for the secured target user account you created in Step 1.<br \/>\n8. If you will monitor this secured target with a Database Firewall, in the Add Secured Target Addresses area, for each available connection of this database enter the following information, and then click Add.<\/p>\n<ul>\n<li>IP Address (or Host Name)<\/li>\n<li>Port Number<\/li>\n<li>Service Name (Oracle Database only)<\/li>\n<\/ul>\n<p>9. If required, enter values for Attribute Name and Attribute Value at the bottom of the page, and click Add. Collection attributes may be required by the Audit Vault Agent depending on the secured target type. See &#8220;Collection Attributes&#8221; to look up requirements for a specific secured target type.<br \/>\n10. If you will monitor this secured target with a Database Firewall, you can increase the processing resource for this secured target by adding the following Collection Attribute:<\/p>\n<ul>\n<li>Attribute Name: MAXIMUM_ENFORCEMENT_POINT_THREADS<\/li>\n<li>Attribute Value: A number between 1 &#8211; 16 (default is 1)<\/li>\n<\/ul>\n<p>This defines the maximum number of Database Firewall processes (1 &#8211; 16) that may be used for the enforcement point associated with this secured target. You should consider defining this if the number of secured targets you are monitoring is less than the number of processing cores available on the system running the Database Firewall. Setting a value when it is not appropriate wastes resources.<\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf012.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf012.png\"><img decoding=\"async\" title=\"avdf012.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf012.png\" alt=\"avdf012.png\" \/><\/a><\/p>\n<p>11. Click Save.<\/p>\n<h4>Configuring an Audit Trail in the Audit Vault Server<\/h4>\n<p>In order to start collecting audit data, you must configure an audit trail for each secured target in the Audit Vault Server, and then start the audit trail collection manually. Before configuring an audit trail for any secured target, you must:<\/p>\n<ul>\n<li>Add the secured target in the Audit Vault Server. See &#8220;Registering or Removing Secured Targets in the Audit Vault Server&#8221; for details.<\/li>\n<li>Register the secured target host machine and deploy and activate the agent on that machine. See &#8220;Registering Hosts&#8221;.<\/li>\n<\/ul>\n<p>This procedure assumes that the Audit Vault Agent is installed on the same computer as the secured target.<\/p>\n<p>To configure an audit trail for a secured target:<\/p>\n<p>1. Log in to the Audit Vault Server console as an administrator.<br \/>\n2. Click the Secured Targets tab.<br \/>\n3. Under Monitoring, click Audit Trails. The Audit Trails page appears, listing the configured audit trails and their status.<br \/>\n4. In the Audit Trails page, click Add.<br \/>\n5. From the Collection Host drop-down list, select the host computer of the secured target.<br \/>\n6. From the Secured Target Name drop-down list, select the secured target&#8217;s name.<br \/>\n7. From the Audit Trail Type drop-down list, select one of the following:<\/p>\n<ul>\n<li>CUSTOM<\/li>\n<li>DIRECTORY<\/li>\n<li>EVENT LOG<\/li>\n<li>NETWORK<\/li>\n<li>SYSLOG<\/li>\n<li>TABLE<\/li>\n<li>TRANSACTION LOG<\/li>\n<\/ul>\n<p>See Table B-13 for details on which type(s) of audit trails can be collected for a specific secured target type, and &#8220;Data Collected for Each Audit Trail Type&#8221; for descriptions of data collected.<\/p>\n<p>8. In the Trail Location field, enter the location of the audit trail on the secured target computer, for example, sys.aud$.\u00a0\u00a0\u00a0\u00a0\u00a0 The trail location depends on the type of secured target. See &#8220;Audit Trail Locations&#8221; for supported trail locations.\u00a0\u00a0\u00a0\u00a0\u00a0 Note: If you selected DIRECTORY for Audit Trail Type, the Trail Location must be a directory mask.<br \/>\n9. If you have deployed plug-ins for this type of secured target, select the plug-in in the Collection Plug-in drop-down list. For more information on plug-ins, see &#8220;About Agent Plug-ins&#8221;.<\/p>\n<p><a class=\"easyblog-thumb-preview\" title=\"avdf013.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf013.png\"><img decoding=\"async\" title=\"avdf013.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf013.png\" alt=\"avdf013.png\" \/><\/a><\/p>\n<p>10. Click Save.<\/p>\n<h4>Starting and Stopping Audit Trails in the Audit Vault Server<\/h4>\n<p>To start or stop audit trail collection for a secured target:<\/p>\n<p>1. Log in to the Audit Vault Server console as an administrator.<br \/>\n2. Click the Secured Targets tab.<br \/>\n3. Click Audit Trails.<br \/>\n4. Select the audit trail(s) you want to start or stop, and then click Start or Stop. <a class=\"easyblog-thumb-preview\" title=\"avdf014.png\" href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf014.png\"><img decoding=\"async\" title=\"avdf014.png\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf014.png\" alt=\"avdf014.png\" \/><\/a><\/p>\n<p>I very do hope that this blog will help you delpoying AVDF. Do not hesitate to post comments if you have any questions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In one of my last blog, named: &#8220;Oracle Audit Vault and Database Firewall (AVDF) 12.1 &#8211; installation on VirtualBox&#8221; I explained how to install AVDF on VirtualBox. Since some of you asked for a blog on &#8220;How to configure AVDF&#8221;, I decided to write this posting on AVDF post-installation configuration. This one only concerns the [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4106,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[198],"tags":[209,405],"type_dbi":[],"class_list":["post-4105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-database-management","tag-oracle-12c","tag-oracle-audit-vault-and-database-firewall"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Oracle AVDF post-installation configuration - dbi Blog<\/title>\n<meta name=\"description\" content=\"Since some of you asked for a blog on &quot;How to configure AVDF&quot;, I decided to write this posting on AVDF post-installation configuration. This one only concerns the post-installation phase, a third blog will be dedicated to practical cases concerning the configuration of Database Firewall Policies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Oracle AVDF post-installation configuration\" \/>\n<meta property=\"og:description\" content=\"Since some of you asked for a blog on &quot;How to configure AVDF&quot;, I decided to write this posting on AVDF post-installation configuration. This one only concerns the post-installation phase, a third blog will be dedicated to practical cases concerning the configuration of Database Firewall Policies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-13T09:47:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png\" \/>\n\t<meta property=\"og:image:width\" content=\"881\" \/>\n\t<meta property=\"og:image:height\" content=\"858\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gr\u00e9gory Steulet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gr\u00e9gory Steulet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/\"},\"author\":{\"name\":\"Gr\u00e9gory Steulet\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7609faada8e4d63e04a28ae29e227098\"},\"headline\":\"Oracle AVDF post-installation configuration\",\"datePublished\":\"2014-11-13T09:47:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/\"},\"wordCount\":1789,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png\",\"keywords\":[\"Oracle 12c\",\"Oracle Audit Vault and Database Firewall\"],\"articleSection\":[\"Database management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/\",\"name\":\"Oracle AVDF post-installation configuration - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png\",\"datePublished\":\"2014-11-13T09:47:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7609faada8e4d63e04a28ae29e227098\"},\"description\":\"Since some of you asked for a blog on \\\"How to configure AVDF\\\", I decided to write this posting on AVDF post-installation configuration. This one only concerns the post-installation phase, a third blog will be dedicated to practical cases concerning the configuration of Database Firewall Policies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#primaryimage\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png\",\"contentUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png\",\"width\":881,\"height\":858},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dbi-services.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Oracle AVDF post-installation configuration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7609faada8e4d63e04a28ae29e227098\",\"name\":\"Gr\u00e9gory Steulet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e1531483285469fe17ea7a769ce5d8a8a01847185e4245d9c4d22c575c7c6d3e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e1531483285469fe17ea7a769ce5d8a8a01847185e4245d9c4d22c575c7c6d3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e1531483285469fe17ea7a769ce5d8a8a01847185e4245d9c4d22c575c7c6d3e?s=96&d=mm&r=g\",\"caption\":\"Gr\u00e9gory Steulet\"},\"description\":\"Gr\u00e9gory Steulet has more than ten years of experience in database and infrastructure management, engineering, and optimization. He is specialized in Oracle technologies and high availability solutions (Oracle DataGuard, Data Replication Block Device). His expertise also includes Avaloq banking applications, as well as the open source field (MySQL, Unix\/Linux, etc.). Gr\u00e9gory Steulet is \\\"Oracle Certified Professional 10g\\\", \\\"MySQL Cluster 5.1 Certified\\\", and \\\"Avaloq Certified Professional 2.6\\\". Prior to joining dbi services, Gr\u00e9gory Steulet was Senior Consultant at Trivadis in Lausanne. He also worked as IT Administrator at Box Telecom in Miami Beach, Florida (USA). Gr\u00e9gory Steulet has an Executive MBA from the International Institute of Management in Technology, Fribourg (CH). He also holds a Bachelor's Degree in Business Administration and Computer Science from the University of Applied Sciences Western Switzerland. His branch-related experience covers Telecommunications, Financial Services \/ Banking, Logistics, Pharma etc.\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/author\/gregory-steulet\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Oracle AVDF post-installation configuration - dbi Blog","description":"Since some of you asked for a blog on \"How to configure AVDF\", I decided to write this posting on AVDF post-installation configuration. This one only concerns the post-installation phase, a third blog will be dedicated to practical cases concerning the configuration of Database Firewall Policies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/","og_locale":"en_US","og_type":"article","og_title":"Oracle AVDF post-installation configuration","og_description":"Since some of you asked for a blog on \"How to configure AVDF\", I decided to write this posting on AVDF post-installation configuration. This one only concerns the post-installation phase, a third blog will be dedicated to practical cases concerning the configuration of Database Firewall Policies.","og_url":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/","og_site_name":"dbi Blog","article_published_time":"2014-11-13T09:47:00+00:00","og_image":[{"width":881,"height":858,"url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png","type":"image\/png"}],"author":"Gr\u00e9gory Steulet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gr\u00e9gory Steulet","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/"},"author":{"name":"Gr\u00e9gory Steulet","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7609faada8e4d63e04a28ae29e227098"},"headline":"Oracle AVDF post-installation configuration","datePublished":"2014-11-13T09:47:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/"},"wordCount":1789,"commentCount":0,"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png","keywords":["Oracle 12c","Oracle Audit Vault and Database Firewall"],"articleSection":["Database management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/","url":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/","name":"Oracle AVDF post-installation configuration - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#primaryimage"},"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png","datePublished":"2014-11-13T09:47:00+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7609faada8e4d63e04a28ae29e227098"},"description":"Since some of you asked for a blog on \"How to configure AVDF\", I decided to write this posting on AVDF post-installation configuration. This one only concerns the post-installation phase, a third blog will be dedicated to practical cases concerning the configuration of Database Firewall Policies.","breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#primaryimage","url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png","contentUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/avdf001.png","width":881,"height":858},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/avdf-post-installation-configuration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Oracle AVDF post-installation configuration"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7609faada8e4d63e04a28ae29e227098","name":"Gr\u00e9gory Steulet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e1531483285469fe17ea7a769ce5d8a8a01847185e4245d9c4d22c575c7c6d3e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e1531483285469fe17ea7a769ce5d8a8a01847185e4245d9c4d22c575c7c6d3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e1531483285469fe17ea7a769ce5d8a8a01847185e4245d9c4d22c575c7c6d3e?s=96&d=mm&r=g","caption":"Gr\u00e9gory Steulet"},"description":"Gr\u00e9gory Steulet has more than ten years of experience in database and infrastructure management, engineering, and optimization. He is specialized in Oracle technologies and high availability solutions (Oracle DataGuard, Data Replication Block Device). His expertise also includes Avaloq banking applications, as well as the open source field (MySQL, Unix\/Linux, etc.). Gr\u00e9gory Steulet is \"Oracle Certified Professional 10g\", \"MySQL Cluster 5.1 Certified\", and \"Avaloq Certified Professional 2.6\". Prior to joining dbi services, Gr\u00e9gory Steulet was Senior Consultant at Trivadis in Lausanne. He also worked as IT Administrator at Box Telecom in Miami Beach, Florida (USA). Gr\u00e9gory Steulet has an Executive MBA from the International Institute of Management in Technology, Fribourg (CH). He also holds a Bachelor's Degree in Business Administration and Computer Science from the University of Applied Sciences Western Switzerland. His branch-related experience covers Telecommunications, Financial Services \/ Banking, Logistics, Pharma etc.","url":"https:\/\/www.dbi-services.com\/blog\/author\/gregory-steulet\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/4105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=4105"}],"version-history":[{"count":0,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/4105\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media\/4106"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=4105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=4105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=4105"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=4105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}