Tripwire Enterprise 9.1 User Guide
Tripwire Enterprise 9.1 User Guide
For an introduction to database nodes, see What are Node Types? on page 52.
https://www.tripwire.com/customers/support-policy/tripwire-enterprise-platform-support
Notes To monitor a database node you must specify a delegated Agent, a system with
Tripwire Enterprise Agent or Axon Agent software installed that processes some
Tripwire Enterprise functions for the database node.
Nodes with Axon Agent installed cannot be used as a delegated Agent for DB2
database nodes.
Select the Collect audit-event information check box to save audit events
(if available) in new element versions. For more information on the source
for audit events, see Table 106 on the next page.
Next In the New Node Wizard, you specify a user account that Tripwire Enterprise will
use to access the database server.
To successfully baseline and version check the database server, you must grant
appropriate permissions to the specified user account. For instructions, see
Configuring a Database User Account (or Login) on page 414.
PostgreSQL Tripwire Enterprise does not monitor audit Axon Agent does not monitor audit
events on PostgreSQL databases. events on PostgreSQL databases.
Note To use a database audit log as an event source, the audit log must be configured
and enabled on the corresponding database.
To successfully monitor a database, you must configure the database user account (or login) that
is assigned to the database’s node.
For a Microsoft SQL Server database server, complete the following steps in the login’s
properties dialog.
Note To read the SQL Server Audit log, an Axon Agent needs to use
Table function sys.fn_get_audit_file which requires control
server permission. Granting control server does not make a Login
part of the sysadmin role. Users can have granular control over the
Login permissions, for example, a Login with control server
permission, that has been denied view any definition permission,
won't be able to view any definition of the securable.
c. If you want to monitor all logins, add the View any definition permission.
d. To use the MS SQL Server policy rules from the Tripwire Customer Center, the user
account needs to have the View server state permission.
https://docs.microsoft.com/en-us/sql/relational-databases/stored-
procedures/grant-permissions-on-a-stored-procedure?view=sql-server-2017
To use Windows Login to monitor the database, the Windows user must have
log on permission (SeInteractiveLogonRight) on the Windows machine where
Axon Agent is installed.
GRANT CREATE SESSION, SELECT ANY TABLE, SELECT ANY DICTIONARY TO <username>;
where <username> is the name of the Oracle user account.
Note For some database query rules, additional privileges may be required. For
example, if an Oracle query rule calls for a user-defined function, then the
EXECUTE ANY PROCEDURE privilege must be granted to the Oracle user account.
For a DB2 database server, complete the following steps in a command editor:
2. With the following format, enter a command for each of the privileges listed below.
GRANT SELECT ON <privilege> TO USER <user_account_name>;
Privileges:
AUDIT.OBJMAINT SYSCAT.INDEXEXTENSIONMETHODS
AUDIT.SECMAINT SYSCAT.KEYCOLUSE
SYSCAT.ATTRIBUTES SYSCAT.LIBRARYAUTH
SYSCAT.AUDITPOLICIES SYSCAT.PACKAGEAUTH
SYSCAT.BUFFERPOOLS SYSCAT.PACKAGES
SYSCAT.CHECKS SYSCAT.PASSTHRUAUTH
SYSCAT.COLAUTH SYSCAT.PREDICATESPECS
SYSCAT.COLCHECKS SYSCAT.PROCEDURES
SYSCAT.COLIDENTATTRIBUTES SYSCAT.PROCPARMS
SYSCAT.COLUMNS SYSCAT.REFERENCES
SYSCAT.COLUSE SYSCAT.ROUTINEAUTH
SYSCAT.DATATYPES SYSCAT.ROUTINES
SYSCAT.DBAUTH SYSCAT.SCHEMAAUTH
SYSCAT.DBPARTITIONGROUPDEF SYSCAT.SCHEMATA
SYSCAT.DBPARTITIONGROUPS SYSCAT.SEQUENCEAUTH
SYSCAT.EVENTMONITORS SYSCAT.SEQUENCES
SYSCAT.EVENTS SYSCAT.TABAUTH
SYSCAT.EVENTTABLES SYSCAT.TABCONST
SYSCAT.FUNCPARMS SYSCAT.TABLES
SYSCAT.FUNCTIONS SYSCAT.TABLESPACES
SYSCAT.HIERARCHIES SYSCAT.TBSPACEAUTH
SYSCAT.INDEXAUTH SYSCAT.TRIGGERS
SYSCAT.INDEXCOLUSE SYSCAT.VIEWS
SYSCAT.INDEXES SYSIBM.SYSDUMMY1
SYSCAT.INDEXEXPLOITRULES
SYSCAT.DATAPARTITIONEXPRESSION SYSCAT.VARIABLEAUTH
SYSCAT.DATAPARTITIONS SYSCAT.VARIABLES
SYSCAT.HISTOGRAMTEMPLATEBINS SYSCAT.WORKACTIONS
SYSCAT.HISTOGRAMTEMPLATES SYSCAT.WORKACTIONSETS
SYSCAT.HISTOGRAMTEMPLATEUSE SYSCAT.WORKCLASSES
SYSCAT.INDEXXMLPATTERNS SYSCAT.WORKCLASSSETS
SYSCAT.NICKNAMES SYSCAT.WORKLOADAUTH
SYSCAT.ROLEAUTH SYSCAT.WORKLOADCONNATTR
SYSCAT.ROLES SYSCAT.WORKLOADS
SYSCAT.SECURITYLABELCOMPONENTELEMENTS SYSCAT.XSROBJECTAUTH
SYSCAT.SECURITYLABELCOMPONENTS SYSIBMADM.DBCFG
SYSCAT.SECURITYPOLICIES SYSIBMADM.DBMCFG
SYSCAT.SERVICECLASSES SYSIBMADM.SNAPCONTAINER
SYSCAT.THRESHOLDS SYSIBMADM.SNAPTBSP
SYSIBMADM.SNAPTBSP_PART
For a PostgreSQL database server, enter the following SQL statements at a command prompt:
The permissions above will enable the specified user to monitor PostgreSQL database objects
with database metadata rules. To monitor specific objects with database query rules, the user
account must also have SELECT permission on the database objects that are to be monitored.