Fortinet black logo

Handbook (HTML)

User policy alert rules for various databases

Copy Link
Copy Doc ID 73ac471a-9afd-11ea-8862-00505692583a:586602

User policy alert rules for various databases

The alert rules that are available for user policies depends are determined by the type of database.

Database Available Alert Rules
Oracle
  • Security Violation
  • Suspicious OS User
  • Suspicious Object Access
  • Suspicious Location
  • Suspicious Client Application (Client Id)
  • Excessive Access Violation
  • Time Range Violation
  • Suspicious Client IP (only for "TCP/IP Sniffer")
Microsoft SQL Server
  • Security Violation
  • Suspicious OS User
  • Suspicious Object Access
  • Suspicious Location
  • Suspicious Client Application
  • Excessive Access Violation
  • Time Range Violation
  • Suspicious Client IP (only for "TCP/IP Sniffer")
DB2
  • Security Violation
  • Suspicious OS User
  • Suspicious Object Access
  • Suspicious Location
  • Excessive Access Violation
  • Time Range Violation
  • Suspicious Client IP (only for "TCP/IP Sniffer")
Sybase
  • Security Violation
  • Suspicious OS User
  • Suspicious Object Access
  • Suspicious Location
  • Excessive Access Violation
  • Time Range Violation
  • Suspicious Client IP (only for "TCP/IP Sniffer")
MySQL
  • Security Violation
  • Suspicious Object Access
  • Suspicious Location
  • Excessive Access Violation
See also

User policy alert rules for various databases

The alert rules that are available for user policies depends are determined by the type of database.

Database Available Alert Rules
Oracle
  • Security Violation
  • Suspicious OS User
  • Suspicious Object Access
  • Suspicious Location
  • Suspicious Client Application (Client Id)
  • Excessive Access Violation
  • Time Range Violation
  • Suspicious Client IP (only for "TCP/IP Sniffer")
Microsoft SQL Server
  • Security Violation
  • Suspicious OS User
  • Suspicious Object Access
  • Suspicious Location
  • Suspicious Client Application
  • Excessive Access Violation
  • Time Range Violation
  • Suspicious Client IP (only for "TCP/IP Sniffer")
DB2
  • Security Violation
  • Suspicious OS User
  • Suspicious Object Access
  • Suspicious Location
  • Excessive Access Violation
  • Time Range Violation
  • Suspicious Client IP (only for "TCP/IP Sniffer")
Sybase
  • Security Violation
  • Suspicious OS User
  • Suspicious Object Access
  • Suspicious Location
  • Excessive Access Violation
  • Time Range Violation
  • Suspicious Client IP (only for "TCP/IP Sniffer")
MySQL
  • Security Violation
  • Suspicious Object Access
  • Suspicious Location
  • Excessive Access Violation
See also