To ensure optimal database security, the security administrator should configure the system to audit security events, then monitor the logs to detect breaches in security and, where necessary, repel security threats. If unauthorized or undesirable activity is detected, the administrator can take remedial actions to address the problem.
Vantage monitors and logs system accesses by database users, directory users, and middle-tier application users.
Logon information, such as the username, session number, and unsuccessful logons, is stored in DBC.LogOnOffV.
Optionally, access information, such as type of access, type of request, username, referenced database object, and frequency of access is logged to the DBC.AccessLogV view.
See Teradata Vantageā¢ Data Dictionary, B035-1092.