Auditing of :
User connections
Users System privileges
User Object privileges
Data access
Data Modification
Structure modification
Auditing performance for :
Database I/O operations
Wait events
Data access
Memory configuration
Redo logs configuration
Other Instance configuration
Network
Backup & Restore strategy
Database availability
Compliance with RTO & RPO