CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
strict-transport-security: max-age=31536000; includeSubDomains
last-modified: Fri, 10 Oct 2025 16:45:42 GMT
x-oracle-dms-ecid: 006GDUuwlFKFw0KimTXvWJ000mEf000ZK2
custom_cache_rule_location: AssetTypeLevel
device_type: Any
x-content-type-options: nosniff
host_service: FutureTenseContentServer:12c
custom_akamai_autopurge: YES
x-oracle-dms-rid: 0:1
content-language: en-US
x-akamai-transformed: 9 - 0 pmb=mRUM,2
vary: Accept-Encoding
content-encoding: gzip
cache-control: max-age=1800
expires: Sat, 11 Oct 2025 22:14:10 GMT
date: Sat, 11 Oct 2025 21:44:10 GMT
content-length: 16144
server-timing: cdn-cache; desc=HIT
server-timing: edge; dur=1
akamai-request-bc: [a=23.11.215.15,b=289197746,c=g,n=IN_KA_BANGALORE,o=20940]
akamai-grn: 0.0fd70b17.1760219050.113cceb2
set-cookie: akaas_aud-seg-ocom-prod=2147483647~rv=35~id=e86fe62d52b9e88ec7dc0697dcc0a810; path=/; Secure; SameSite=None
x-frame-options: sameorigin
content-security-policy: frame-ancestors 'self' https://my.oracle.com https://eeho.fa.us2.oraclecloud.com https://blogs.oracle.com *.khapps.com *.khapps.jp *.lsapps.oracle.com *.lsapps.oracle.jp *.dev-lsapps.oracle.com https://oraclesso.sharepoint.com https://oracle.sharepoint.com https://partners.oracle.com https://partners-stage.oracle.com https://partners-test.oracle.com https://partners-sit.oracle.com https://partners-dev.oracle.com
x-content-type-options: nosniff
x-xss-protection: 1
origin-cache-control: NO_HEADER_PRESENTED
origin-edge-control: !no-store,max-age=2592000,downstream-ttl=1800
actual-object-ttl: 2592000
server-timing: ak_p; desc="1760219050937_386651919_289197746_152_9579_5_6_15";dur=1
Audit Vault and Database Firewall Features| Oracle
Oracle Audit Vault and Database Firewall Features
Database security posture management for Oracle Databases helps validate security posture and develop mitigation plans

- Offers a fleet-wide, simplified view of database security assessments, along with the security findings and associated risks.
- Define a security baseline and monitor deviations from your baseline security posture.
- Discover unmonitored databases to register and monitor them with AVDF.
- Discover what types of sensitive data you have and where they are located. Use this information to monitor activity and define policies.
- Provide entitlement management to monitor individual user privileges and their drift.
- Identify changes to stored procedures.
Track data access and modifications

- Audit and monitor all types of activities: database, network-based SQL traffic, OS, active directory, REST, JSON, XML, CSV, and custom tables.
- Detect data exfiltration attempts from databases.
- Track before and after values for Oracle and Microsoft SQL Server databases with the associated primary key(s).
- Centrally manage Oracle unified auditing and STIG- and CIS-compliant Oracle audit policies.
Support forensic analysis and manage notifications
- Receive out-of-the-box reports for security and compliance regulations.
- See powerful, interactive reporting with multiple filters and generate PDF/Excel reports.
- Get immediate insight into the top user activities across multiple databases.
- Use the policy-based alert engine to get notified of suspicious activities.
- Use read-only auditor and improved separation of duty.

Manage unauthorized data access

- Multi-stage database firewall inspects SQL traffic to accurately detect and optionally block unauthorized SQL including SQL injection attacks.
- Powerful policy engine that detects unauthorized access to sensitive tables.
- Ability to easily profile an application’s behavior and block deviations.
- Trusted path enforcement to the database based on specific OS users, client programs, client IP, and SQL categories.
Simplified operational management
- Centralized management of AVDF deployment with embedded security.
- Highly scalable architecture with high availability and disaster recovery.
- Streamlined data retention with simplified lifecycle management.
- SIEM/Syslog integration along with FIPS 140-2 mode support.
- Agentless audit record collection for Oracle and Microsoft SQL Server databases.
- Automation through command-line interface.
- Minimal or predictable downtime during hardware or software updates and upgrades.
