Monitoring setup
In this chapter, we describe the steps that are required to successfully implement database monitoring. In this context, we define monitoring as the review of database activities that can pose compliance or security violations. The result of these steps is a process that automatically delivers your required reports to the appropriate staff members on a scheduled basis by using workflow automation and delivers required real-time alerts to defined destination.
This process includes the following steps:
•Monitoring approach
•Monitoring ...
Get Deployment Guide for InfoSphere Guardium now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.