Configuring a Target Database for Secure Monitoring This section covers the following: About Secure Monitoring of Databases Configuring a Target Database for Secure Monitoring