eTrust Audit Reference Guide - CA Technologies
eTrust Audit Reference Guide - CA Technologies
eTrust Audit Reference Guide - CA Technologies
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 7: UNIX INI Files<br />
e<strong>Audit</strong>.ini .................................................................................... 7-1<br />
Ports ..................................................................................... 7-1<br />
Messages ................................................................................. 7-3<br />
Fatal ..................................................................................... 7-4<br />
Critical ................................................................................... 7-4<br />
Error ..................................................................................... 7-4<br />
Warning .................................................................................. 7-4<br />
Info ...................................................................................... 7-5<br />
Monitor .................................................................................. 7-5<br />
Recorders ................................................................................. 7-6<br />
Router.................................................................................... 7-6<br />
Management Agent....................................................................... 7-11<br />
Parameters............................................................................... 7-11<br />
AN Types................................................................................ 7-12<br />
recorder.ini .................................................................................. 7-14<br />
Recorder Modules ........................................................................ 7-14<br />
Definitions ............................................................................... 7-14<br />
Parameters............................................................................... 7-15<br />
Chapter 8: Encryption Options<br />
Changing Your Encryption Key................................................................. 8-1<br />
setkey Command Options...................................................................... 8-2<br />
Turning Off Encryption ........................................................................ 8-2<br />
Chapter 9: Firewall Considerations<br />
Chapter 10: Database Considerations<br />
Preparing <strong>eTrust</strong> <strong>Audit</strong> Database .............................................................. 10-1<br />
Oracle Databases ......................................................................... 10-1<br />
MS SQL Server Databases ................................................................. 10-2<br />
Configuring an Oracle Client .................................................................. 10-2<br />
Windows ................................................................................ 10-2<br />
UNIX.................................................................................... 10-2<br />
Windows NT Authentication with Microsoft SQL Server ......................................... 10-3<br />
vi<br />
<strong>Reference</strong> <strong>Guide</strong>