Action and description |
See |
---|---|
1. Install auditing – set the number of audit tables and assign devices for the audit trail and the syslogs transaction log in the sybsecurity database. |
“Installing the audit system” and the Adaptive Server installation and configuration documentation |
2. Set up audit trail management – write and establish a threshold procedure that receives control when the current audit table is nearly full. The procedure automatically switches to a new audit table and archives the contents of the current table. In addition, this step involves setting the audit queue size and the suspend audit when device full configuration parameters. |
“Setting up audit trail management” For single-table auditing, “Single-table auditing” |
3. Set up transaction log management in the sybsecurity database – determine how to handle the syslogs transaction log in the sybsecurity database, how to set the trunc log on chkpt database option and establishing a last-chance threshold procedure for syslogs if trunc log on chkpt is off. |
|
4. Set auditing options – use sp_audit to establish the events to be audited. |
|
5. Enable auditing – use sp_configure to turn on the auditing configuration parameter. Adaptive Server begins writing audit records to the current audit table. |
|
6. Restarting auditing – use sp_audit restart to restart auditing if it fails. |