Configuring a Target Database for Secure Monitoring

This section covers the following: