You are on page 1of 3

Oracle University | Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709

Implementing Oracle Database Firewall


Duration: 2 Days
What you will learn
In this course you will learn to configure an Oracle Database Firewall and an Oracle Database Firewall Management
Server. You will learn to use enforcement points to deploy Database Firewall policies. You will use the Oracle Database
Firewall Administration Console, a Web browser-based application for configuring, managing, and monitoring the
system. You will configure stored procedure auditing and user role auditing. The configuration and use of local and
remote monitoring is discussed in this course. Additional topics include reporting, archiving data, and email alerts.
You will use the Oracle Database Firewall Analyzer to create policies that the Oracle Database Firewall uses to block,
alert, log or permit SQL statements.
Learn To:
Use Oracle Database Firewall to monitor and block unauthorized SQL traffic before it reaches the database
Create a defensive perimeter that helps prevent SQL injection, application bypass, and other malicious activity from
reaching the database
Create white-list, black-list, and exception-list based policies to protect databases
Generate customized reports to comply with regulations
A Live Virtual Class (LVC) is exclusively for registered students; unregistered individuals may not view an LVC at any
time. Registered students must view the class from the country listed in the registration form. Unauthorized recording,
copying, or transmission of LVC content may not be made.

Audience
Database Administrators
Network Administrator
Security Administrators
Security Compliance Professionals

Prerequisites
Required Prerequisites
General knowledge of SQL
General knowledge of networks

Course Objectives
Understand how to Install Oracle Database Firewalls and Oracle Database Firewall Management Server
Configure an Oracle Database Firewall and Oracle Database Firewall Management Server
Configure data policies to protect databases
View predefined and generate customized summary, compliance, and audit reports
Archive data
Configure stored procedure auditing
Configure user role auditing
Configure local monitoring
Configure remote monitoring
Copyright 2011, Oracle. All rights reserved.

Page 1

Course Topics
Introduction to Oracle Database Firewall
Understanding How Data is Compromised
Understanding Oracles Defense in Depth Security Approach
Oracle Database Security Solutions
Oracle Database Firewall (Overview)
Positive Security Model-Based Enforcement
Negative Security Model-Based Enforcement
Oracle Database Firewall Architecture
Protected Databases
Installing Oracle Database Firewall
Installation Overview
Installing Database Firewall and Database Firewall Management Server
Logging in to the Administration Console
Installing the Firewall Analyzer
Database Firewall Sizing
Configuring Oracle Database Firewall
Configuring a Standalone Oracle Database Firewall System
Configuring an Oracle Database Firewall Management Server System
Creating an Enforcement Point
Oracle Database Firewall Operational Modes (Database Activity Monitoring, Database Policy Enforcement)
Oracle Database Firewall Logging
Oracle Database Firewall Logs
Determining the Protection Level for your Databases
Configuring System Administrator Users
Configuring Policies
Oracle Database Firewall Policy Enforcement
Policy Engine Flow
Configuring Policies
Oracle Database Firewall Preconfigured Policies
Creating Policy Files
Custom Policy Development Overview
Enabling the Firewall Analyzer to Understand Database Usage
Creating a Policy
Creating Advanced Configuration Policies
Using Profiles
Using a Novelty Policy
Novelty Policy Example
Creating a Novelty Policy
Reporting
Oracle Database Firewall Reporting System
Using the Summary Reports
Using the Summary Compliance Reports
Using the Search Log Function
Using Search Log Results
Creating Audit Reports

Copyright 2011, Oracle. All rights reserved.

Page 2

Using the Search Log Results in Audit Reports


Generating the Audit Report
Stored Procedure Auditing
Stored Procedure Auditing Overview
Stored Procedure Auditing Architecture
Creating Users and Setting Permissions for Stored Procedure Auditing
Enabling Stored Procedure Auditing
Auditing Changes to Stored Procedures
User Role Auditing
User Role Auditing Overview
User Role Auditing Architecture
Creating Users and Setting Permissions for User Role Auditing
Enabling user Role Auditing
Auditing Changes to User Roles
Configuring and Using Local Monitoring
Local Monitoring Overview
Oracle Database Firewall Architecture:Local Monitoring
Installing Oracle Database Firewall Monitoring Software
Installing Local monitoring in an Oracle Database
Installing Local monitoring in a Microsoft SQL Server Database
Installing Local monitoring in a Sybase ASE Database
Enabling Local Monitoring
Configuring and Using Remote Monitoring
Remote Monitoring Overview
Oracle Database Firewall Architecture: Remote Monitoring
Prerequisites for Remote Monitoring
Configuring the Remote Monitor in the Administration Console
Download the Configuration File
Contents of the remote-agent.conf FIle
Executing the Remote Monitor Script
Verifying that the Remote Monitor is Active
Additional System Management Tasks
Archiving Data
Configuring syslog Logging
Deleting Logs and History

Copyright 2011, Oracle. All rights reserved.

Page 3