{"id":12062,"date":"2019-05-06T23:02:38","date_gmt":"2019-05-06T23:02:38","guid":{"rendered":"https:\/\/dbtut.com\/?p=12062"},"modified":"2019-05-06T23:02:38","modified_gmt":"2019-05-06T23:02:38","slug":"oracle-database-security-check-with-database-security-assessment-tool-dbsat","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/","title":{"rendered":"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)"},"content":{"rendered":"<p>The Oracle Database Security Assessment Tool (DBSAT) analyzes database configurations and security policies to help eliminate security risks and improve database security. Using the DBSAT tool, you can implement recommended security-related actions.<\/p>\n<p>With DBSAT, you can eliminate short-term security risks, and report the necessary findings to implement a comprehensive security strategy.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.veritabani.gen.tr\/wp-content\/uploads\/2018\/04\/925.png\" width=\"747\" height=\"324\" \/><\/p>\n<h3>DBSAT Components<\/h3>\n<p><strong>DBSAT Collector:<\/strong> Collects data by running sql statements and operating system commands. The collected data is written to a file for use in the analysis phase.<\/p>\n<p><strong>DBSAT Reporter:<\/strong> Analyzes the collected data and reports its findings in different formats. These formats can be pdf, excel and text.<\/p>\n<p><strong>The following operations can be performed using the DBSAT :<\/strong><\/p>\n<ul>\n<li>You can quickly identify security configuration issues in your database.<\/li>\n<li>You can apply the best recommended solutions for security.<\/li>\n<li>You can improve the security of Oracle databases.<\/li>\n<li>You can reduce the attack risk.<\/li>\n<\/ul>\n<h3>DBSAT Usage<\/h3>\n<p>You can download the required files for DBSAT from the link mentioned in document 2138254.1. You can use DBSAT for Solaris x64 and Solaris SPARC, Linux x86-64, Windows x64, HP-UX IA (64-bit), IBM AIX &amp; zSeries Based Linux platforms, and Oracle Database 10.2.0.5 and later versions.<\/p>\n<p>The user to connect to the database with DBSAT must have the following privileges.<\/p>\n<ul>\n<li>CREATE SESSION<\/li>\n<li>SELECT on SYS.REGISTRY$HISTORY<\/li>\n<li>Role SELECT_CATALOG_ROLE<\/li>\n<li>Role DV_SECANALYST (If Database Vault is Used)<\/li>\n<li>Role AUDIT_VIEWER (Only 12c)<\/li>\n<li>Role CAPTURE_ADMIN (Only 12c)<\/li>\n<li>SELECT on SYS.DBA_USERS_WITH_DEFPWD (11g and 12c)<\/li>\n<li>SELECT on AUDSYS.AUD$UNIFIED (Only 12c)<\/li>\n<\/ul>\n<p>Python 2.6 or higher is required for reporting. You can find the Python version in the system with the following command.<\/p>\n<pre class=\"lang:default decode:true \">[root@exadb01 ~]# python -V\r\nPython 2.6.6<\/pre>\n<p>You must extract the dbsat.zip file downloaded from the link in the document, in the Oracle home directory. You can use the dbsat tool by setting environment variables. ORACLE_HOME and ORACLE_SID<\/p>\n<pre class=\"lang:default decode:true \">[oracle@exadb01 ~]$ . oraenv\r\nORACLE_SID = [EXADB1] ? \r\nThe Oracle base remains unchanged with value \/u01\/app\/oracle<\/pre>\n<p>The DBSAT Collector can be run as follows.<\/p>\n<pre class=\"lang:default decode:true \">dbsat collect &lt;connect_string&gt; &lt;destination&gt;<\/pre>\n<p>The full file path should be specified with the destination and a name must be given to the database.<\/p>\n<p><strong>Example:<\/strong> for exadb database,<\/p>\n<pre class=\"lang:default decode:true \">[oracle@exab01 dbsat]$ .\/dbsat collect system\/welcome1 \/home\/oracle\/dbsat\/exadb\r\n\r\nDatabase Security Assessment Tool version 2.0.1 (December 2017)\r\n\r\nThis tool is intended to assist in you in securing your Oracle database\r\nsystem. You are solely responsible for your system and the effect and\r\nresults of the execution of this tool (including, without limitation,\r\nany damage or data loss). Further, the output generated by this tool may\r\ninclude potentially sensitive system configuration data and information\r\nthat could be used by a skilled attacker to penetrate your system. You\r\nare solely responsible for ensuring that the output of this tool,\r\nincluding any generated reports, is handled in accordance with your\r\ncompany's policies.\r\n\r\nConnecting to the target Oracle database...\r\n\r\n\r\nSQL*Plus: Release 11.2.0.4.0 Production on Mon Apr 2 12:12:48 2018\r\n\r\nCopyright (c) 1982, 2013, Oracle.  All rights reserved.\r\n\r\n\r\nConnected to:\r\nOracle Database 11g Enterprise Edition Release 11.2.0.4.0 - 64bit Production\r\nWith the Partitioning, Real Application Clusters, Automatic Storage Management, Oracle Label Security,\r\nOLAP, Data Mining and Real Application Testing options\r\n\r\nSetup complete.\r\nSQL queries complete.\r\n\/bin\/cat: \/u01\/app\/oracle\/product\/11.2.0.4\/dbhome_1\/network\/admin\/sqlnet.ora: No such file or directory\r\nWarning: Exit status 256 from OS rule: sqlnet.ora\r\n\/bin\/ls: cannot access \/u01\/app\/oracle\/product\/11.2.0.4\/dbhome_1\/network\/admin\/sqlnet.ora: No such file or directory\r\nWarning: Exit status 512 from OS rule: ls_sqlnet.ora\r\n\/bin\/cat: \/u01\/app\/oracle\/product\/11.2.0.4\/dbhome_1\/network\/admin\/listener.ora: No such file or directory\r\nWarning: Exit status 256 from OS rule: listener.ora\r\n\/bin\/ls: cannot access \/u01\/app\/oracle\/product\/11.2.0.4\/dbhome_1\/network\/admin\/listener.ora: No such file or directory\r\nWarning: Exit status 512 from OS rule: ls_listener.ora\r\nOS commands complete.\r\nDisconnected from Oracle Database 11g Enterprise Edition Release 11.2.0.4.0 - 64bit Production\r\nWith the Partitioning, Real Application Clusters, Automatic Storage Management, Oracle Label Security,\r\nOLAP, Data Mining and Real Application Testing options\r\nDBSAT Collector completed successfully.\r\n\r\nCalling \/u01\/app\/oracle\/product\/11.2.0.4\/dbhome_1\/bin\/zip to encrypt exadb.json...\r\n\r\nEnter password: \r\nVerify password: \r\n  adding: exadb.json (deflated 86%)\r\nzip completed successfully.<\/pre>\n<p>When you run the command, it will ask for the password to be specified for the zip file. After the command runs, a file (exadb.zip) will be created in the specified directory (\/ home \/ oracle \/ dbsat) with the specified name. This file contains the data to be used for reporting.<\/p>\n<p>DBSAT Reporter can be run as follows.<\/p>\n<pre class=\"lang:default decode:true\">dbsat report [-a] [-n] [-x &lt;section&gt;] &lt;pathname&gt;<\/pre>\n<p><strong>With -a<\/strong>, it includes all users in the database during analysis. Unless specified by -a, it does not include users who cannot access the database, such as expired or locked users.<\/p>\n<p><strong>With -n<\/strong>, it is ensured that the report is not encrypted.<\/p>\n<p><strong>With -x<\/strong>, it ensures that some sections are not included in the report. These sections are as follows:<\/p>\n<p>\u2013 USER : User Accounts<br \/>\n\u2013 PRIV : Privileges and Roles<br \/>\n\u2013 AUTH : Authorization Control<br \/>\n\u2013 CRYPT : Encryption<br \/>\n\u2013 ACCESS :Fine-Grained Access Control<br \/>\n\u2013 AUDIT : Auditing<br \/>\n\u2013 CONF : Database Configuration<br \/>\n\u2013 NET : Network Configuration<br \/>\n\u2013 OS : Operating System<\/p>\n<p><strong>Sample Usage: :\u00a0<\/strong><\/p>\n<pre class=\"lang:default decode:true \">-x USER,PRIV yada\u00a0\u2014x USER \u2014x PRIV<\/pre>\n<p><strong>Example: for exadb ,<\/strong><\/p>\n<pre class=\"lang:default decode:true \">[oracle@exadb01 dbsat]$ .\/dbsat report -a exadb\r\n\r\nDatabase Security Assessment Tool version 2.0.1 (December 2017)\r\n\r\nThis tool is intended to assist in you in securing your Oracle database\r\nsystem. You are solely responsible for your system and the effect and\r\nresults of the execution of this tool (including, without limitation,\r\nany damage or data loss). Further, the output generated by this tool may\r\ninclude potentially sensitive system configuration data and information\r\nthat could be used by a skilled attacker to penetrate your system. You\r\nare solely responsible for ensuring that the output of this tool,\r\nincluding any generated reports, is handled in accordance with your\r\ncompany's policies.\r\n\r\nArchive:  exadb.zip\r\n[exadb.zip] exadb.json password: \r\n  inflating: exadb.json              \r\nDBSAT Reporter ran successfully.\r\n\r\nCalling \/usr\/bin\/zip to encrypt the generated reports...\r\n\r\nEnter password: \r\nVerify password: \r\n\tzip warning: exadb_report.zip not found or empty\r\n  adding: exadb_report.txt (deflated 85%)\r\n  adding: exadb_report.html (deflated 87%)\r\n  adding: exadb_report.xlsx (deflated 3%)\r\n  adding: exadb_report.json (deflated 88%)\r\nzip completed successfully.<\/pre>\n<p>When the command is executed, a file named &#8220;&lt;pathname&gt; _report.zip&#8221; (exadb_report.zip) will be created in the same directory. The password for this compressed file is the password that is issued when the command is executed. There are reports in html, excel and text format in the file.<\/p>\n\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_12062\" class=\"pvc_stats all  \" data-element-id=\"12062\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Oracle Database Security Assessment Tool (DBSAT) analyzes database configurations and security policies to help eliminate security risks and improve database security. Using the DBSAT tool, you can implement recommended security-related actions. With DBSAT, you can eliminate short-term security risks, and report the necessary findings to implement a comprehensive security strategy. DBSAT Components DBSAT Collector: &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_12062\" class=\"pvc_stats all  \" data-element-id=\"12062\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":12064,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[3857,3856,3855,3860,3864,3861,3863,3858,3854,3865,3862,3859],"class_list":["post-12062","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-oracle","tag-database-security-assessment-tool","tag-database-security-assessment-tool-dbsat","tag-dbsat","tag-dbsat-discover","tag-dbsat-discoverer","tag-dbsat-faq","tag-dbsat-oracle-base","tag-how-to-run-oracle-dbsat","tag-oracle-database-security-check","tag-oracle-dbsat-discoverer","tag-oracle-dbsat-example","tag-oracle-dbsat-license"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Oracle Database Security Check With Database Security Assessment Tool (DBSAT) - Database Tutorials<\/title>\n<meta name=\"description\" content=\"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Oracle Database Security Check With Database Security Assessment Tool (DBSAT) - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-06T23:02:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dbtut\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dbtut\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/\"},\"author\":{\"name\":\"dbtut\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408\"},\"headline\":\"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)\",\"datePublished\":\"2019-05-06T23:02:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/\"},\"wordCount\":548,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png\",\"keywords\":[\"Database Security Assessment Tool\",\"Database Security Assessment Tool (DBSAT)\",\"DBSAT\",\"dbsat discover\",\"dbsat discoverer\",\"dbsat faq\",\"dbsat oracle base\",\"how to run oracle dbsat\",\"Oracle Database Security Check\",\"oracle dbsat discoverer\",\"oracle dbsat example\",\"oracle dbsat license\"],\"articleSection\":[\"ORACLE\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/\",\"name\":\"Oracle Database Security Check With Database Security Assessment Tool (DBSAT) - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png\",\"datePublished\":\"2019-05-06T23:02:38+00:00\",\"description\":\"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#primaryimage\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png\",\"width\":640,\"height\":412},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408\",\"name\":\"dbtut\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g\",\"caption\":\"dbtut\"},\"description\":\"We are a team with over 10 years of database management and BI experience. Our Expertises: Oracle, SQL Server, PostgreSQL, MySQL, MongoDB, Elasticsearch, Kibana, Grafana.\",\"sameAs\":[\"http:\/\/NurullahCAKIR\"],\"url\":\"https:\/\/dbtut.com\/index.php\/author\/dbtut\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Oracle Database Security Check With Database Security Assessment Tool (DBSAT) - Database Tutorials","description":"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/","og_locale":"en_US","og_type":"article","og_title":"Oracle Database Security Check With Database Security Assessment Tool (DBSAT) - Database Tutorials","og_description":"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)","og_url":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/","og_site_name":"Database Tutorials","article_published_time":"2019-05-06T23:02:38+00:00","og_image":[{"width":640,"height":412,"url":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png","type":"image\/png"}],"author":"dbtut","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dbtut","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/"},"author":{"name":"dbtut","@id":"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408"},"headline":"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)","datePublished":"2019-05-06T23:02:38+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/"},"wordCount":548,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png","keywords":["Database Security Assessment Tool","Database Security Assessment Tool (DBSAT)","DBSAT","dbsat discover","dbsat discoverer","dbsat faq","dbsat oracle base","how to run oracle dbsat","Oracle Database Security Check","oracle dbsat discoverer","oracle dbsat example","oracle dbsat license"],"articleSection":["ORACLE"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/","url":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/","name":"Oracle Database Security Check With Database Security Assessment Tool (DBSAT) - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#primaryimage"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png","datePublished":"2019-05-06T23:02:38+00:00","description":"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#primaryimage","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2019\/05\/Ads\u0131z-7.png","width":640,"height":412},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2019\/05\/06\/oracle-database-security-check-with-database-security-assessment-tool-dbsat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"Oracle Database Security Check With Database Security Assessment Tool (DBSAT)"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/fc047c39e1e53dce28fc4253529ea408","name":"dbtut","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c322c32021bf651d9e103b183963c479a9c9791ead0715f4348203496c39aa54?s=96&d=mm&r=g","caption":"dbtut"},"description":"We are a team with over 10 years of database management and BI experience. Our Expertises: Oracle, SQL Server, PostgreSQL, MySQL, MongoDB, Elasticsearch, Kibana, Grafana.","sameAs":["http:\/\/NurullahCAKIR"],"url":"https:\/\/dbtut.com\/index.php\/author\/dbtut\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/12062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=12062"}],"version-history":[{"count":0,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/12062\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media\/12064"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=12062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=12062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=12062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}