Page History
...
- In the console tree pane, click Reports.
- In the view pane, select the report you want to generate.
- Specify the appropriate parameters for the selected report, and then click View Report.
Available general reports
...
Risk Assessment
...
Displays all policy and risk assessment results. You can customize this text using the Policy Properties window. For more information, see Internal Review Notes.
...
Activity History
...
Displays all SQL Secure activity history
...
You can find all the available reports in the following categories:
Exporting a report
To export a report, click the Export icon located on the top menu above the report, and choose the preferred option.
You can export a report in the following formats:
- Excel
- Word
Available entitlement reports
...
Available vulnerability reports
Report Name | Report Description |
---|---|
Mixed Mode Authentication | Displays all SQL Server instances where Windows Authentication is not the only login method |
Guest Enabled Databases | Displays all databases on a SQL Server instance where the Guest user has access |
OS Vulnerability via XSPs | Displays all extended stored procedures that allow access to operating system features that could compromise system security |
Vulnerable Fixed Roles | Displays all SQL Server instances that contain fixed roles assigned to public or guest |
System Administrator Vulnerability | Displays all SQL Server instances that include built-in Administrators as members of the sysadmin role |
Dangerous Windows Groups | Displays all SQL Server instances that grant access to any OS controlled Windows Group |
Database Chaining Enabled | Display all SQL Server instances that have cross-database ownership chaining enabled |
Mail Vulnerability | Displays all SQL Server instances with SQL Mail stored procedures |
Login Vulnerability | Displays any SQL logins that have weak (easily guessed or hacked) passwords and lists their security properties, including the state of their password health. |
Available comparison reports
Report Name | Report Description |
---|---|
Assessment Comparison | Displays any differences identified in the security settings and findings of two assessments. |
Snapshot Comparison | Displays any differences identified in the configuration settings and audit data of two snapshots. |
...