03.03.2015 Views

eTrust Audit Reference Guide - CA Technologies

eTrust Audit Reference Guide - CA Technologies

eTrust Audit Reference Guide - CA Technologies

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 7: UNIX INI Files<br />

e<strong>Audit</strong>.ini .................................................................................... 7-1<br />

Ports ..................................................................................... 7-1<br />

Messages ................................................................................. 7-3<br />

Fatal ..................................................................................... 7-4<br />

Critical ................................................................................... 7-4<br />

Error ..................................................................................... 7-4<br />

Warning .................................................................................. 7-4<br />

Info ...................................................................................... 7-5<br />

Monitor .................................................................................. 7-5<br />

Recorders ................................................................................. 7-6<br />

Router.................................................................................... 7-6<br />

Management Agent....................................................................... 7-11<br />

Parameters............................................................................... 7-11<br />

AN Types................................................................................ 7-12<br />

recorder.ini .................................................................................. 7-14<br />

Recorder Modules ........................................................................ 7-14<br />

Definitions ............................................................................... 7-14<br />

Parameters............................................................................... 7-15<br />

Chapter 8: Encryption Options<br />

Changing Your Encryption Key................................................................. 8-1<br />

setkey Command Options...................................................................... 8-2<br />

Turning Off Encryption ........................................................................ 8-2<br />

Chapter 9: Firewall Considerations<br />

Chapter 10: Database Considerations<br />

Preparing <strong>eTrust</strong> <strong>Audit</strong> Database .............................................................. 10-1<br />

Oracle Databases ......................................................................... 10-1<br />

MS SQL Server Databases ................................................................. 10-2<br />

Configuring an Oracle Client .................................................................. 10-2<br />

Windows ................................................................................ 10-2<br />

UNIX.................................................................................... 10-2<br />

Windows NT Authentication with Microsoft SQL Server ......................................... 10-3<br />

vi<br />

<strong>Reference</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!