Next steps for data security monitoring

After installing the basic data security monitoring policy and creating reports, begin tuning the polices and using advanced analytics.

Procedure

  1. Using the Admin Users Activity and Administrative Commands Execution reports, examine the traffic to identify and ignore trusted sessions.
  2. Run advanced analytics on the data logged by the basic data security monitoring policy.
    To learn more about enabling and using advanced analytics, see the following information:
  3. Continuously monitor and tune policies to keep up with the changes in the database and application landscape.
    The basic data security monitoring policy provides a starting point for monitoring and analyzing traffic, but your organization needs to maintain and tune policies according to the observed traffic and organizational requirements.