Before you begin
In a standalone environment (no central manager), follow this procedure on each collector.
In a managed environment, follow this procedure on the central manager.For a rule-by-rule
description of the basic data security monitoring policy, see Understand the basic data security monitoring policy rules.
Procedure
-
Navigate to .
- Select the Basic Data Security Policy [template] and click
.
- Policy templates are cloned before installation: use the Clone policy
tempalte dialog to provide a unique name for the cloned policy and click
OK.
- After successful installation, click OK on the confirmation
dialog.
- Take the following actions on the Install policy dialog:
- Use the Installation action menu and select Install
and override.
Attention: The Install and override action replaces any
currently-installed policies. Select a different installation action if you need to preserve
installed policies.
- Accept the default setting to install and override All
policies.
- Optional: If working from a central manager, select the managed units
where the policy will be installed.
- Click OK.
What to do next
Create reports based on SQL traffic collected by the basic monitoring policy.