VMS Help  —  RMU72  Set  Audit  Examples
    Example 1

    In the following example, the first command enables alarms
    for the RMU and PROTECTION classes. The second command shows
    that alarms for the RMU and PROTECTION classes are enabled but
    not yet started. The AUDIT class is always enabled and cannot
    be disabled. The third command starts alarms for the RMU and
    PROTECTION classes. The fourth command shows that alarms for the
    RMU and PROTECTION classes are enabled and started.

    $ ! Enable alarms for RMU and PROTECTION classes:
    $ RMU/SET AUDIT/TYPE=ALARM/ENABLE=(RMU,PROTECTION) MF_PERSONNEL
    $ !
    $ ! Show that alarms are enabled, but not yet started:
    $ RMU/SHOW AUDIT/ALL MF_PERSONNEL
    Security auditing STOPPED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Security alarms STOPPED for:
        PROTECTION (enabled)
        RMU (enabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Audit flush is disabled

    Audit every access

    Enabled identifiers:
        None

    $ ! Start alarms for the enabled RMU and PROTECTION classes:
    $ RMU/SET AUDIT/START/TYPE=ALARM MF_PERSONNEL
    $ !
    $ ! Show that alarms are started for the RMU and PROTECTION classes:
    $ RMU/SHOW AUDIT/ALL MF_PERSONNEL
    Security auditing STOPPED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Security alarms STARTED for:
        PROTECTION (enabled)
        RMU (enabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Audit flush is disabled

    Audit every access

    Enabled identifiers:
        None

    Example 2

    In this example, the first command shows that alarms are started
    and enabled for the RMU class. The second command disables alarms
    for the RMU class. The third command shows that alarms for RMU
    class are disabled.

    $ ! Show that alarms are enabled and started for the RMU class:
    $ RMU/SHOW AUDIT/ALL MF_PERSONNEL
    Security auditing STOPPED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Security alarms STARTED for:
        PROTECTION (disabled)
        RMU (enabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Audit flush is disabled

    Audit every access

    Enabled identifiers:
        None

    $ ! Disable alarms for the RMU class:
    $ RMU/SET AUDIT/TYPE=ALARM/DISABLE=RMU MF_PERSONNEL
    $ !
    $ ! Show that alarms are disabled for the RMU class:
    $ RMU/SHOW AUDIT/ALL MF_PERSONNEL
    Security auditing STOPPED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Security alarms STARTED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Audit flush is disabled

    Audit every access

    Enabled identifiers:
        None

    Example 3

    In this example, the first command enables auditing for users
    with the [SQL,USER1] and [RDB,USER2] identifiers. The second
    command shows the enabled identifiers. The third command enables
    DACCESS checks requiring SELECT and INSERT privileges for the
    EMPLOYEES and COLLEGES tables. The fourth command displays the
    DACCESS checks that have been specified for the COLLEGES and
    EMPLOYEES tables. Note that because the general DACCESS type has
    not been enabled, DACCESS for the EMPLOYEES and COLLEGES tables
    is displayed as disabled.

    $ ! Enable auditing for users with the [SQL,USER1] and
    $ ! [RDB,USER2] identifiers:
    $ RMU/SET AUDIT/ENABLE=IDENTIFIER=("[SQL,USER1]","[RDB,USER2]") -
    _$ MF_PERSONNEL
    $ !
    $ ! Show that [SQL,USER1] and [RDB,USER2] are enabled identifiers:
    $ RMU/SHOW AUDIT/ALL MF_PERSONNEL
    Security auditing STOPPED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Security alarms STOPPED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Audit flush is disabled

    Audit every access

    Enabled identifiers:
        (IDENTIFIER=[SQL,USER1])
        (IDENTIFIER=[RDB,USER2])

    $ ! Enable and start DACCESS checks for the SELECT and INSERT
    $ ! privileges for the COLLEGES and EMPLOYEES tables:
    $ RMU/SET AUDIT/ENABLE=DACCESS=TABLE=(COLLEGES,EMPLOYEES) -
    _$ /PRIVILEGES=(SELECT,INSERT)/START MF_PERSONNEL
    $ !
    $ ! Display the DACCESS checks that are enabled and
    $ ! started for the COLLEGES and EMPLOYEES tables:
    $ RMU/SHOW AUDIT/DACCESS=TABLE MF_PERSONNEL
    Security auditing STARTED for:
        DACCESS (disabled)
            TABLE : EMPLOYEES
                (SELECT,INSERT)
            TABLE : COLLEGES
                (SELECT,INSERT)

    Security alarms STARTED for:
        DACCESS (disabled)
            TABLE : EMPLOYEES
                (SELECT,INSERT)
            TABLE : COLLEGES
                (SELECT,INSERT)

    Example 4

    In this example, the first command enables auditing of the JOBS
    and EMPLOYEES tables for DACCESS checks for users with the
    [SQL,USER1] or BATCH identifier. The Privileges=All qualifier
    specifies that auditing will be produced for every privilege.
    The second command shows that auditing is enabled for users
    with the [SQL,USER1] or BATCH identifier. The third command
    shows that DACCESS checking for the JOBS and EMPLOYEES tables
    for all privileges is specified. The fourth command enables the
    general DACCESS class. The fifth command's output shows that the
    general DACCESS class is now enabled. The sixth command starts
    the auditing that is enabled, and the seventh command shows that
    the enabled auditing is started.

    $ ! Enable DACCESS checks for users with the [SQL,USER1] or
    $ ! BATCH identifier for the JOBS and EMPLOYEES tables:
    $ RMU/SET AUDIT/TYPE=AUDIT -
    _$ /ENABLE=(IDENTIFIER=("[SQL,USER1]",BATCH), -
    _$ DACCESS=TABLE=(JOBS,EMPLOYEES)) /PRIVILEGES=ALL MF_PERSONNEL
    $ !
    $ ! Show that auditing is enabled for users with the [SQL,USER1]
    $ ! or BATCH identifiers:
    $ RMU/SHOW AUDIT/ALL MF_PERSONNEL
    Security auditing STOPPED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Security alarms STOPPED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (disabled)

    Audit flush is disabled

    Audit every access

    Enabled identifiers:
        (IDENTIFIER=[SQL,USER1])
        (IDENTIFIER=BATCH)

    $ ! Show that DACCESS checking for all privileges for the
    $ ! JOBS and EMPLOYEES tables is enabled:
    $ RMU/SHOW AUDIT/DACCESS=TABLE MF_PERSONNEL
    Security auditing STOPPED for:
        DACCESS (disabled)
            TABLE : EMPLOYEES
                (ALL)
            TABLE : JOBS
                (ALL)

    Security alarms STOPPED for:
        DACCESS (disabled)

    $ ! Enable the general DACCESS class:
    $ RMU/SET AUDIT/ENABLE=DACCESS MF_PERSONNEL
    $ !
    $ ! Show that the general DACCESS class is enabled:
    $ RMU/SHOW AUDIT/DACCESS=TABLE MF_PERSONNEL
    Security auditing STOPPED for:
        DACCESS (enabled)
            TABLE : EMPLOYEES
                (ALL)
            TABLE : JOBS
                (ALL)

    Security alarms STOPPED for:
        DACCESS (enabled)

    $ ! Start the auditing that is enabled:
    $ RMU/SET AUDIT/START MF_PERSONNEL
    $ !
    $ ! Show that the enabled auditing is started:
    $ RMU/SHOW AUDIT/ALL MF_PERSONNEL
    Security auditing STARTED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (enabled)

    Security alarms STARTED for:
        PROTECTION (disabled)
        RMU (disabled)
        AUDIT (enabled)
        DACCESS (enabled)

    Audit flush is disabled

    Audit every access

    Enabled identifiers:
        (IDENTIFIER=[SQL,USER1])
        (IDENTIFIER=BATCH)

    Example 5

    In this example, the first command enables DACCESS checks
    requiring the INSERT privilege for the mf_personnel database,
    for the EMPLOYEES table, and for the EMPLOYEE_ID column of the
    EMPLOYEES table. The second command shows that the DACCESS check
    for the INSERT privilege is enabled for the specified objects.

    $ ! Enable a DACCESS check for the INSERT privilege for the
    $ ! MF_PERSONNEL database, EMPLOYEES table, and EMPLOYEE_ID
    $ ! column of the EMPLOYEES table:
    $ RMU/SET AUDIT -
    _$ /ENABLE=DACCESS=(DATABASE,TABLE=EMPLOYEES, -
    _$ COLUMN=EMPLOYEES.EMPLOYEE_ID) -
    _$ /PRIVILEGES=(INSERT) MF_PERSONNEL
    $ !
    $ ! Show that the DACCESS check for the INSERT privilege is
    $ ! enabled for the specified objects. (The general DACCESS
    $ ! class remains disabled until you issue an
    $ ! RMU/SET AUDIT/ENABLE=Daccess command without specifying
    $ ! any object-type parameter to the Daccess option.
    $ ! See the fourth Oracle RMU command in Example 4.)
    $ !
    $ RMU/SHOW AUDIT/DACCESS=(DATABASE,TABLE,COLUMN) MF_PERSONNEL
    Security auditing STOPPED for:
        DACCESS (disabled)
            DATABASE
                (INSERT)
            TABLE : EMPLOYEES
                (INSERT)
            COLUMN : EMPLOYEES.EMPLOYEE_ID
                (INSERT)

    Security alarms STOPPED for:
        DACCESS (disabled)
            DATABASE
                (INSERT)
            TABLE : EMPLOYEES
                (INSERT)
            COLUMN : EMPLOYEES.EMPLOYEE_ID
                (INSERT)

    Example 6

    In this example, the first command enables a DACCESS check
    requiring the INSERT privilege for the EMPLOYEES and COLLEGES
    tables, as well as for the EMPLOYEE_ID and LAST_NAME columns of
    the EMPLOYEES table and the COLLEGE_CODE column of the COLLEGES
    table in the mf_personnel database. The second command shows that
    the DACCESS check for the INSERT privilege is enabled for the
    specified objects.

    $ ! Enable a DACCESS check for the INSERT privilege for the
    $ ! EMPLOYEES and COLLEGES table, the LAST_NAME and EMPLOYEE_ID
    $ ! column of the EMPLOYEES table, and the COLLEGE_CODE column
    $ ! of the COLLEGES table:
    $ RMU/SET AUDIT -
    _$ /ENABLE=DACCESS=(TABLE=(EMPLOYEES,COLLEGES), -
    _$                  COLUMN=(EMPLOYEES.EMPLOYEE_ID, -
    _$                          EMPLOYEES.LAST_NAME, -
    _$                          COLLEGES.COLLEGE_CODE)) -
    _$ /PRIVILEGES=(INSERT) MF_PERSONNEL
    $ !
    $ ! Show that the DACCESS check for the INSERT privilege is
    $ ! enabled for the specified objects. (The general DACCESS
    $ ! class remains disabled until you issue an
    $ ! RMU/SET AUDIT/ENABLE=Daccess command without specifying
    $ ! any object-type parameter to the Daccess option.
    $ ! See the fourth Oracle RMU command in Example 4.)
    $ !
    $ RMU/SHOW AUDIT/DACCESS=(DATABASE,TABLE,COLUMN) MF_PERSONNEL
    Security auditing STOPPED for:
        DACCESS (disabled)
            DATABASE
                (NONE)
            TABLE : COLLEGES
                (INSERT)
            TABLE : EMPLOYEES
                (INSERT)
            COLUMN : COLLEGES.COLLEGE_CODE
                (INSERT)
            COLUMN : EMPLOYEES.EMPLOYEE_ID
                (INSERT)
            COLUMN : EMPLOYEES.LAST_NAME
                (INSERT)

    Security alarms STOPPED for:
        DACCESS (disabled)
            DATABASE
                (NONE)
            TABLE : COLLEGES
                (INSERT)
            TABLE : EMPLOYEES
                (INSERT)
            COLUMN : COLLEGES.COLLEGE_CODE
                (INSERT)
            COLUMN : EMPLOYEES.EMPLOYEE_ID
                (INSERT)
            COLUMN : EMPLOYEES.LAST_NAME
                (INSERT)
Close Help