Page History
...
- In the console tree pane, click click Reports.
- In the view pane, select the report you want to generate.
- Specify the appropriate parameters for the selected report, and then click Applyclick View Report.
Available general reports
Report Name | Report Description |
---|---|
Audited SQL ServersSQL Servers | Displays all the SQL Server SQL Server instances that are being audited by SQL Secure |
Cross Server Login Check | Displays all SQL Server SQL Server instances where a selected user has access |
Data Collection Filters | Displays the data collection filters for all SQL Server SQL Server instances |
Activity History | Displays all SQL Secure activity history |
Risk Assessment | Displays all policy and risk assessment results. You can customize this text using the Policy Properties window. For more information, see Internal Review Notes.Activity History |
Displays all SQL Secure activity historySQL Secure Users | Displays all SQL Secure users |
...
Report Name | Report Description |
---|---|
Suspect Windows Accounts | Displays all the suspect Windows Accounts that have Server LoginsServer Logins. For more information, see Suspect Windows accounts. |
Server Logins and User Mappings | Displays all Server Logins and associated Database User Mappings for each SQL Server SQL Server instance being audited |
User Permissions | Displays permissions for a user across all SQL Server SQL Server instances |
All User Permissions | Displays all objects with permissions in the database for all SQL Server SQL Server instances |
Server Roles | Displays all direct members of Server Roles on all SQL Server SQL Server instances |
Database Roles | Displays all direct members of Database Roles on all SQL Server SQL Server instances |
Available vulnerability reports
Report Name | Report Description |
---|---|
Mixed Mode Authentication | Displays all SQL Server SQL Server instances where Windows Authentication is not the only login method |
Guest Enabled Databases | Displays all databases on a SQL Server SQL Server instance where the Guest user has access |
OS Vulnerability OS Vulnerability via XSPs | Displays all extended stored procedures that allow access to operating system features that could compromise system security |
Vulnerable Fixed Roles | Displays all SQL Server SQL Server instances that contain fixed roles assigned to public or guest |
System Administrator Vulnerability | Displays all SQL Server SQL Server instances that include built-in Administrators as members of the sysadmin role |
Dangerous Windows Groups | Displays all SQL Server SQL Server instances that grant access to any OS controlled OS controlled Windows Group |
Database Chaining Enabled | Display all SQL Server SQL Server instances that have cross-database ownership chaining enabled |
Mail Vulnerability | Displays all SQL Server SQL Server instances with SQL Mail SQL Mail stored procedures |
Login Vulnerability | Displays any SQL logins that have weak (easily guessed or hacked) passwords and lists their security properties, including the state of their password health. |
...