Vantage Security Monitoring - Teradata Vantage

Configuring Teradata Vantageā„¢ After Installation

Product
Teradata Vantage
Release Number
1.1
Published
July 2019
Language
English (United States)
Last Update
2019-10-11
dita:mapPath
qyu1559916244734.ditamap
dita:ditavalPath
jsj1481748799576.ditaval
dita:id
B700-4014
lifecycle
previous
Product Category
Analytical Ecosystem
Software
Teradata Vantage

To ensure optimal database security, the security administrator should configure the system to audit security events, then monitor the logs to detect breaches in security and, where necessary, repel security threats. If unauthorized or undesirable activity is detected, the administrator can take remedial actions to address the problem.

Vantage monitors and logs system accesses by database users, directory users, and middle-tier application users.

Logon information, such as the username, session number, and unsuccessful logons, is stored in DBC.LogOnOffV.

Optionally, access information, such as type of access, type of request, username, referenced database object, and frequency of access is logged to the DBC.AccessLogV view.

See Teradata Vantageā„¢ Data Dictionary, B035-1092.