Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. In the console tree pane, click Reports.
  2. In the view pane, select the report you want to generate.
  3. Specify the appropriate parameters for the selected report, and then click View Report.

Available general reports

...

Risk Assessment

...

Displays all policy and risk assessment results. You can customize this text using the Policy Properties window. For more information, see Internal Review Notes.

...

Activity History

...

Displays all SQL Secure activity history

...

You can find all the available reports in the following categories:

Exporting a report

To export a report, click the Export icon Image Added located on the top menu above the report, and choose the preferred option.

You can export a report in the following formats:

  • Excel
  • PDF
  • Word
Scroll pdf ignore
Excerpt
Newtabfooter
aliasIDERA
urlhttp://www.idera.com
|
Newtabfooter
aliasProducts
urlhttps://www.idera.com/productssolutions/sqlserver
|
Newtabfooter
aliasPurchase
urlhttps://www.idera.com/buynow/onlinestore
|
Newtabfooter
aliasSupport
urlhttps://idera.secure.force.com/
|
Newtabfooter
aliasCommunity
urlhttp://community.idera.com
|
Newtabfooter
aliasResources
urlhttp://www.idera.com/resourcecentral
|
Newtabfooter
aliasAbout Us
urlhttp://www.idera.com/about/aboutus
|
Newtabfooter
aliasLegal
urlhttps://www.idera.com/legal/termsofuse

Available entitlement reports

...

Available vulnerability reports

Report NameReport Description
Mixed Mode AuthenticationDisplays all SQL Server instances where Windows Authentication is not the only login method
Guest Enabled DatabasesDisplays all databases on a SQL Server instance where the Guest user has access
OS Vulnerability via XSPsDisplays all extended stored procedures that allow access to operating system features that could compromise system security
Vulnerable Fixed RolesDisplays all SQL Server instances that contain fixed roles assigned to public or guest
System Administrator VulnerabilityDisplays all SQL Server instances that include built-in Administrators as members of the sysadmin role
Dangerous Windows GroupsDisplays all SQL Server instances that grant access to any OS controlled Windows Group
Database Chaining EnabledDisplay all SQL Server instances that have cross-database ownership chaining enabled
Mail VulnerabilityDisplays all SQL Server instances with SQL Mail stored procedures
Login VulnerabilityDisplays any SQL logins that have weak (easily guessed or hacked) passwords and lists their security properties, including the state of their password health.

Available comparison reports

Report NameReport Description
Assessment ComparisonDisplays any differences identified in the security settings and findings of two assessments.
Snapshot ComparisonDisplays any differences identified in the configuration settings and audit data of two snapshots.

...