Security Manager for Oracle |
Release Notes |
Date Published: May 2011 |
|
Security Manager for Oracle monitors your Oracle databases on UNIX computers for various changes to Oracle user accounts, roles, and privileges. Security Manager for Oracle monitors events in real-time that may indicate possible external intrusions or attacks so you can quickly take corrective or preventive actions. For example, this module enables you to perform the following tasks:
Security Manager for Oracle also collects events from logs and stores them in secure repositories so you can archive this data, create reports for management or auditing purposes, and analyze critical events to research issues. This module for the Security Manager product includes several new features. This version also improves usability and resolves several previous issues. Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Security Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and the Security Manager user group. This document outlines why you should install this module, lists installation requirements, and identifies known issues. Supported ProductsFor the latest information about supported software versions and the availability of module updates, visit the Security Manager Supported Products page. If you encounter problems using this module with a later version of your application, contact NetIQ Technical Support. This release supports the following products:
Why Install This Module?Security Manager for Oracle monitors events on UNIX computers to detect a variety of occurrences and alert you to them. When significant events occur, Security Manager sends alerts to the consoles and can notify your staff so they can quickly take corrective action. Resolves Issue Where Oracle on UNIX Forensic Analysis Query FailsThis release resolves an issue where selecting the IDMEF field named "Object Affected" when creating a Forensic Analysis query causes the query against Oracle on UNIX to not properly display all data. You can now properly select the "Object Affected" field for use in Forensic Analysis queries run against Oracle on UNIX installations. (ENG302901) System RequirementsSecurity Manager for Oracle uses the NetIQ UNIX Agent to monitor Oracle database events on UNIX computers and takes advantage of updated functionality and rules in the latest version of the NetIQ UNIX Agent. For the Security Manager for Oracle module to function correctly, NetIQ recommends you update all UNIX agents to the latest version of the NetIQ UNIX Agent before installing or upgrading this module. For more information about requirements for a UNIX agent monitoring an Oracle database computer, see the NetIQ UNIX Agent documentation available from the setup program in the NetIQ UNIX Agent installation kit. In addition to installing and configuring the UNIX agent, you must install and configure the Security Manager for UNIX module. For more information, see the Security Manager for UNIX Release Notes. Installing This ModuleInstall the module using the Module Installer utility. For more information about installing modules, see the User Guide for NetIQ Security Manager. You can verify successful installation of the module in the Module Installer. After the installation completes, verify the Status column indicates the module is current and the module version listed in the Installed Version column is the same as the version in the Available Version column. After you install the module, install the UNIX Agent Manager and UNIX agents on the computers on which you want Security Manager for Oracle to monitor real-time events and collect log data. Configure the UNIX agent to support Security Manager for Oracle. For more information, see the NetIQ UNIX Agent documentation available from the setup program in the NetIQ UNIX Agent installation kit. Security Manager for Oracle does not require configuration, but you do need to add operators to the Oracle Administrators group to receive notifications from the associated rules. You must also configure the Security Manager for UNIX module in the Configuration Wizard. For more information about using the Configuration Wizard, see the User Guide for NetIQ Security Manager. Configuring Oracle for Event AuditingAfter you have installed this module and installed and configured the UNIX agent and the Security Manager for UNIX module, complete the following steps to enable Oracle auditing. To enable Oracle auditing:
AUDIT USER BY ACCESS; AUDIT ROLE BY ACCESS; AUDIT CONNECT BY ACCESS; AUDIT UPDATE ON SYS.AUD$ BY ACCESS; AUDIT INSERT TABLE BY ACCESS WHENEVER NOT SUCCESSFUL; AUDIT SYSTEM GRANT BY ACCESS; AUDIT ALTER ANY TABLE BY ACCESS; AUDIT DROP ANY PROCEDURE BY ACCESS; AUDIT CREATE ANY CLUSTER, CREATE ANY DIRECTORY, CREATE ANY INDEX, CREATE ANY LIBRARY, CREATE ANY PROCEDURE, CREATE ANY SEQUENCE, CREATE ANY SNAPSHOT, CREATE ANY SYNONYM, CREATE ANY TABLE, CREATE ANY TRIGGER, CREATE ANY TYPE, CREATE ANY VIEW, CREATE CLUSTER, CREATE DATABASE LINK, CREATE LIBRARY, CREATE PROCEDURE, CREATE PROFILE, CREATE PUBLIC DATABASE LINK, CREATE PUBLIC SYNONYM, CREATE ROLLBACK SEGMENT, CREATE SEQUENCE, CREATE SNAPSHOT, CREATE SYNONYM, CREATE TABLE, CREATE TRIGGER, CREATE TYPE, CREATE VIEW BY ACCESS; AUDIT DROP ANY CLUSTER, DROP ANY DIRECTORY, DROP ANY INDEX, DROP ANY LIBRARY, DROP ANY PROCEDURE, DROP ANY SEQUENCE, DROP ANY SNAPSHOT, DROP ANY SYNONYM, DROP ANY TABLE, DROP ANY TRIGGER, DROP ANY TYPE, DROP ANY VIEW, DROP PROFILE, DROP PUBLIC DATABASE LINK, DROP PUBLIC SYNONYM, DROP ROLLBACK SEGMENT, DROP TABLESPACE, DROP USER BY ACCESS; Known IssuesNetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support.
Upgrading Requires Updated Versions of Previously Installed UNIX and Oracle ModulesThe Security Manager for Oracle module replaces the Event Manager for Oracle on UNIX and Log Manager for Oracle on UNIX modules. However, if you upgrade from Log Manager for Oracle on UNIX to the Security Manager for Oracle module, you must also use the Module Installer to install the latest version of the Log Manager for Oracle on UNIX module, available on the NetIQ AutoSync Server. In the Module Installer, the name of the Log Manager for Oracle on UNIX module is "LM Support for Oracle on UNIX (Obsolete)," located in the "zzz Obsolete Modules - Only select if already installed" category. In addition, if you upgraded from the Log Manager for UNIX module to the Security Manager for UNIX module, you must install the latest version of the Log Manager for UNIX module, available on the NetIQ AutoSync Server. In the Module Installer, the name of the Log Manager for UNIX module is "Log Manager for UNIX (Obsolete)." If you did not previously install the Log Manager for Oracle on UNIX, Event Manager for Oracle on UNIX, or Log Manager for UNIX modules, you need to install only the Security Manager for UNIX and Security Manager for Oracle modules. (DOC289091) Superseded Release Notes Not Removed on UpgradeThe Security Manager for Oracle module replaces the Event Manager for Oracle and Log Manager for Oracle modules. However, a known issue exists where Security Manager cannot remove old release notes files when installing updated modules. Release notes are installed by default in the \Program Files\NetIQ Security Manager\OnePoint\Documentation\Release Notes folder on the central computer, but may have been moved or copied to a different location in your environment. After upgrading this module, you should manually delete any superseded release notes in the default folder or in other folders. Removal of Monitoring GuidesSince monitoring information for updated Security Manager modules is now available in the module release notes, monitoring guides have been discontinued. However, a known issue exists where Security Manager cannot remove old monitoring guides when installing updated modules. To reduce the risk of users referencing outdated monitoring guides, Security Manager now replaces the old monitoring guide in the default documentation folder with a blank monitoring guide. Monitoring guides are installed by default in the \Program Files\NetIQ Security Manager\OnePoint\Documentation\Monitoring Guides folder on the central computer, but may have been moved or copied to a different location in your environment. After installing an updated module, you should manually delete any outdated monitoring guides that were copied or moved to other folders. Contact InformationOur goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you. For detailed contact information, see the Support Contact Information Web site. For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups. Legal NoticeTHIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. © 2011 NetIQ Corporation. All rights reserved. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the USA. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This product claims FIPS compliance by use of one or more of the Microsoft cryptographic components listed below. These components were certified by Microsoft and obtained FIPS certificates via the CMVP. 893 Windows Vista Enhanced Cryptographic Provider (RSAENH) 894 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 989 Windows XP Enhanced Cryptographic Provider (RSAENH) 990 Windows XP Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 997 Microsoft Windows XP Kernel Mode Cryptographic Module (FIPS.SYS) 1000 Microsoft Windows Vista Kernel Mode Security Support Provider Interface (ksecdd.sys) 1001 Microsoft Windows Vista Cryptographic Primitives Library (bcrypt.dll) 1002 Windows Vista Enhanced Cryptographic Provider (RSAENH) 1003 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 1006 Windows Server 2008 Code Integrity (ci.dll) 1007 Microsoft Windows Server 2008 Kernel Mode Security Support Provider Interface (ksecdd.sys) 1008 Microsoft Windows Server 2008 1009 Windows Server 2008 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 1010 Windows Server 2008 Enhanced Cryptographic Provider 1012 Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) This product may also claim FIPS compliance by use of one or more of the Open SSL cryptographic components listed below. These components were certified by the Open Source Software Institute and obtained the FIPS certificates as indicated. 918 - OpenSSL FIPS Object Module v1.1.2 - 02/29/2008 140-2 L1 1051 - OpenSSL FIPS Object Module v 1.2 - 11/17/2008 140-2 L1 1111 - OpenSSL FIPS Runtime Module v 1.2 - 4/03/2009 140-2 L1 Note: Windows FIPS algorithms used in this product may have only been tested when the FIPS mode bit was set. While the modules have valid certificates at the time of this product release, it is the user's responsibility to validate the current module status. | ||