Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Available general reports

Report NameReport Description
Audited SQL ServersDisplays all the SQL Server instances that are being audited by SQL Secure
Cross Server Login CheckDisplays all SQL Server instances where a selected user has access
Data Collection FiltersDisplays the data collection filters for all SQL Server instances

Risk Assessment

Displays all policy and risk assessment results. You can customize this text using the Policy Properties window. For more information, see Internal Review Notes.

Activity History

Displays all SQL Secure activity history

SQL Secure UsersDisplays all SQL Secure users

Available entitlement reports

Report NameReport Description
Suspect Windows AccountsDisplays all the suspect Windows Accounts that have Server Logins or Server Files Permissions. For more information, see Suspect Windows accounts.
Suspect SQL LoginsDisplays all the suspect SQL Server Accounts that do not have any assigned permissions, i.e. databases, objects, or server files.
Server Logins and User MappingsDisplays all Server Logins and associated Database User Mappings for each SQL Server instance being audited
User PermissionsDisplays permissions for a user across all SQL Server instances
All User PermissionsDisplays all objects with permissions in the database for all SQL Server instances
Server RolesDisplays all direct members of Server Roles on all SQL Server instances
Database RolesDisplays all direct members of Database Roles on all SQL Server instances

Available vulnerability reports

Report NameReport Description
Mixed Mode AuthenticationDisplays all SQL Server instances where Windows Authentication is not the only login method
Guest Enabled DatabasesDisplays all databases on a SQL Server instance where the Guest user has access
OS Vulnerability via XSPsDisplays all extended stored procedures that allow access to operating system features that could compromise system security
Vulnerable Fixed RolesDisplays all SQL Server instances that contain fixed roles assigned to public or guest
System Administrator VulnerabilityDisplays all SQL Server instances that include built-in Administrators as members of the sysadmin role
Dangerous Windows GroupsDisplays all SQL Server instances that grant access to any OS controlled Windows Group
Database Chaining EnabledDisplay all SQL Server instances that have cross-database ownership chaining enabled
Mail VulnerabilityDisplays all SQL Server instances with SQL Mail stored procedures
Login VulnerabilityDisplays any SQL logins that have weak (easily guessed or hacked) passwords and lists their security properties, including the state of their password health.

Available comparison reports

Report NameReport Description
Assessment ComparisonDisplays any differences identified in the security settings and findings of two assessments.
Snapshot ComparisonDisplays any differences identified in the configuration settings and audit data of two snapshots.
Scroll pdf ignore
Excerpt
SQL Secure manages SQL Server security and permissions.
 | Products Buy Support Community About Us | Resources