Ransomware attackers specifically target and attempt to destroy backup systems to increase the probability of payment. Hardening your system is critical. Please ensure you have reviewed your platform security using the Security Hardening Checklist
Appendix E. Kerberos based proxy user's authentication in Oracle — NetBackup IT Analytics 11.8 | Cohesity Documentation
Kerberos based proxy user's authentication in Oracle