Date: Thu, 28 Mar 2024 10:43:30 +0000 (UTC) Message-ID: <426745706.67855.1711622610714@ip-10-0-1-26.ec2.internal> Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_Part_67854_1158438897.1711622610711" ------=_Part_67854_1158438897.1711622610711 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Location: file:///C:/exported.html
The following report categories are included with IDERA SQL Comp= liance Manager. The activity, change, and history reports list events that = passed the SQL Server access check. To audit events that failed the SQL Ser= ver access check, generate the Permission Denied Activity report for the ap= propriate SQL Server instance.
Audit Reports
The Daily Audit Activity Statistics repor= t lists the amount of activity that occurred on the SQL Server instance or = designated database, on an hourly basis, for the dates specified. Use this = report to audit overall activity levels on your SQL Server instances and da= tabases.
Alerts Reports
The Alert Activity report lists alert det= ails, such as target object, event, and time of the alert. Use this report = to audit alerts triggered over a specified time period.
Application Audit Reports
These reports list activity details, such= as login, event, and time of activity, per application and database. Use t= hese reports to audit activity across multiple applications and databases.<= /p>
Configuration Check Reports
The configuration check report lists all = the configurations selected on a Server or Database. Use these reports to r= econcile the differences in regards to the configurations across different = servers and databases.
Database Object Audit Reports
The Backup and DBCC Activity report lists= backup, restore, DBCC, and database object activities on specific database= s. Use these reports to audit mass data movement or database object activit= y, such as SELECT or UPDATE, across multiple databases.
DDL Audit Reports
The Database Schema Change History report= lists schema changes applied to audited databases. Use these reports to au= dit data definition language (DDL) statements, such as dropped tables, exec= uted against one or more databases on a SQL Server instance.
DML Audit Reports
The DML Activity (Before-After) report li= sts DML events for which before and after data is available. Use this repor= t to audit UPDATE, INSERT, and DELETE activity on critical or sensitive dat= abases.
Host Audit Reports
The Host Activity report lists all host c= omputers from which specific logins executed an action. Use this report to = audit user behavior from multiple client computers, identifying the host co= mputer from which an activity request originated.
Policy Audit Reports
These reports list changes and updates ap= plied to the SQL Compliance Manager Agent deployed on a specific SQL Server= , and any integrity violations in your audit data. Use these reports to dia= gnose audit data integrity issues and track agent configuration changes as = well as agent activities, such as SQL Compliance Manager Agent service rest= arts.
Regulation Audit Reports=
These reports list all the regulations an= d their individual guidelines applied to your servers and databases. Use th= e Regulation Guideline report to audit the regulatory guidelines applied to= your SQL Server instance, or use the Regulation Compliance Check report to= ensure that your servers and databases continue to be in compliance with t= he selected regulatory guidelines.
Row Count Reports
The Row Count reports lists all informati= on about data access. Use this report to audit the frequency in which data = is accessed, identifying suspicious behavior.
Security Audit Reports= p>
These reports list permission changes by = object type as well as unauthorized attempts to execute activities. Use the= se reports to audit your SQL Server security settings and identify miscondu= ct.
SELECT Audit Reports
The Sensitive Column report lists all SEL= ECT events that were initiated by applications to read specific column= s that contain sensitive data. This report also includes the T-SQL statemen= ts that executed the corresponding commands. Use this report to audit colum= ns that require high security, such as employee Social Security numbers (SS= Ns).
User Audit Reports
These reports list user activities perfor= med on a specific SQL Server instance, and provide a history of login creat= ions and deletions. Use these reports to audit user behavior and login mana= gement.