After installing the basic data security monitoring policy and creating reports, begin
tuning the polices and using advanced analytics.
Procedure
-
Using the Admin Users Activity and Administrative Commands Execution
reports, examine the traffic to identify and ignore trusted sessions.
For more
information, see the following videos:
- Run advanced analytics on the data logged by the basic data security monitoring
policy.
To learn more about enabling and using advanced analytics, see the
following information:
- Continuously monitor and tune policies to keep up with the changes in the database and
application landscape.
The basic data security monitoring policy provides a
starting point for monitoring and analyzing traffic, but your organization needs to maintain and
tune policies according to the observed traffic and organizational requirements.