Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. In the console tree pane, click click Reports.
  2. In the view pane, select the report you want to generate.
  3. Specify the appropriate parameters for the selected report, and then click Applyclick View Report.

Available general reports

Report NameReport Description
Audited SQL ServersSQL ServersDisplays all the SQL Server SQL Server instances that are being audited by SQL Secure
Cross Server Login CheckDisplays all SQL Server SQL Server instances where a selected user has access
Data Collection FiltersDisplays the data collection filters for all SQL Server SQL Server instances
Activity HistoryDisplays all SQL Secure activity history
Risk AssessmentDisplays all policy and risk assessment results. You can customize this text using the Policy Properties window. For more information, see Internal Review Notes.Activity History
Displays all SQL Secure activity historySQL Secure UsersDisplays all SQL Secure users

...

Report NameReport Description
Suspect Windows AccountsDisplays all the suspect Windows Accounts that have Server LoginsServer Logins. For more information, see Suspect Windows accounts.
Server Logins and User MappingsDisplays all Server Logins and associated Database User Mappings for each SQL Server SQL Server instance being audited
User PermissionsDisplays permissions for a user across all SQL Server SQL Server instances
All User PermissionsDisplays all objects with permissions in the database for all SQL Server SQL Server instances
Server RolesDisplays all direct members of Server Roles on all SQL Server SQL Server instances
Database RolesDisplays all direct members of Database Roles on all SQL Server SQL Server instances

Available vulnerability reports

Report NameReport Description
Mixed Mode AuthenticationDisplays all SQL Server SQL Server instances where Windows Authentication is not the only login method
Guest Enabled DatabasesDisplays all databases on a SQL Server SQL Server instance where the Guest user has access
OS Vulnerability OS Vulnerability via XSPsDisplays all extended stored procedures that allow access to operating system features that could compromise system security
Vulnerable Fixed RolesDisplays all SQL Server SQL Server instances that contain fixed roles assigned to public or guest
System Administrator VulnerabilityDisplays all SQL Server SQL Server instances that include built-in Administrators as members of the sysadmin role
Dangerous Windows GroupsDisplays all SQL Server SQL Server instances that grant access to any OS controlled OS controlled Windows Group
Database Chaining EnabledDisplay all SQL Server SQL Server instances that have cross-database ownership chaining enabled
Mail VulnerabilityDisplays all SQL Server SQL Server instances with SQL Mail SQL Mail stored procedures
Login VulnerabilityDisplays any SQL logins that have weak (easily guessed or hacked) passwords and lists their security properties, including the state of their password health.

...