Monitor and Audit Your Users

Each of the tools mentioned above are useful to add security, but most of them deal with protecting your content. A coherent security policy also must focus on detecting access violations and properly reacting to them.

How to react to an access violation is something best left up to the individual security teams. However, Oracle does provide a few more tools to help people detect access violations, so you know when to react.

All UCM components detect and log unauthorized access in their Web logs. Access violations in the Records Management Agents are logged back to the content server logs as well. IRM logs both failed and successful unsealing attempts, but in a different database. Authentication errors, such as incorrect ...

Get Transforming Infoglut! A Pragmatic Strategy for Oracle Enterprise Content Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.