ORACLE POLICY DIRECTORY SECURITY AUDIT TRAIL
Sawmill is a Oracle Policy Directory Security Audit Trail log analyzer (it also supports the 1020 other log formats listed to the left).
It can process log files
in Oracle Policy Directory Security Audit Trail format, and generate dynamic statistics from them,
analyzing and reporting events.
Sawmill can parse Oracle Policy Directory Security Audit Trail logs, import them into a MySQL, Microsoft SQL Server, or Oracle database (or its own built-in database),
aggregate them, and generate dynamically filtered reports, all through a web interface.
Sawmill can perform Oracle Policy Directory Security Audit Trail log analysis on any platform, including Windows, Linux, FreeBSD, OpenBSD, Mac OS, Solaris, other UNIX, and others.
Sawmill stores the following non-numerical fields in its database for Oracle Policy Directory Security Audit Trail, generates reports for each field, and allows dynamic filtering on any combination of these fields:
|Field|| ||Internal Name|
| ||date/time|| ||date_time|
| ||day of week|| ||day_of_week|
| ||hour of day|| ||hour_of_day|
| ||client|| ||client|
| ||server|| ||server|
| ||event outcome|| ||event_outcome|
| ||number of groups|| ||number_of_groups|
| ||authorization status|| ||authorization_status|
| ||item 1|| ||item_1|
Sawmill stores the following numerical fields in its database for Oracle Policy Directory Security Audit Trail, aggregating them and including them as columns in most reports:
|Numerical Field|| ||Internal Name|
| ||hits|| ||hits|
| ||page views|| ||page_views|
See Sawmill Features to learn more about Sawmill's options for viewing, customizing, filtering, exporting and scheduling Oracle Policy Directory Security Audit Trail reports.
Sawmill also supports 1020 other log formats.