Preview Reports

2025-06-10 09:02:40

In the left menu, select Report Center > Preview Report to enter the Preview Report page, select the report type, asset or asset group, and report time range you want to view, and the required report file will be generated.

You can directly read the generated reports, or click Export in the upper right corner, and select the export format (HTML, PDF, PNG, WORD, EXCEL or CSV) to export the report to the local server in a specified file format.

See the table below for the built-in report types of Database Audit.

Type

Description

SOX Report

Comprehensively analyzes the database security   status from four aspects: planning and organization, ensuring and   controlling, risk assessment, and comprehensive situation.

Comprehensive Analysis Report

Comprehensively analyzes the database   situation from four perspectives: SQL statement execution, session   connection, risk events, and SQL performance.

Performance Analysis Report

Analyzes the database performance from five   aspects: performance change trends, database/SID with the worst performance,   SQL consuming the longest time, SQL with the worst performance, and SQL with   the most executions.

MLPS Reference Analysis Report

Strictly complies with the Multi-Level   Protection Scheme (MLPS) standard GB/T 28448-2019 (hereinafter referred to as   Level Protection 2.0), and analyzes intrusion prevention, malicious   code monitoring, security audit monitoring, etc. in security audits that are   set forth in Level Protection 2.0 and the results are displayed.

Statement Analysis Reports

Analyzes and displays the statement   information from five dimensions: SQL statements, failed statements, SQL   statement change trends, audit trends, and SQL template with the highest   number of executions.

Session Analysis Reports

Contains four reports for session quantity   change trend analysis, new session analysis, concurrent session analysis, and   failed session analysis.

Alarm Analysis Reports

Analyzes the current alarm situation from   four dimensions: alarm change trends, alarm sources, alarm objects, and rule   hits.

Other Reports

There are mainly six reports for table   analysis, client tool analysis, database account analysis, database/SID   analysis, database access source IP analysis, and database/instance name   access analysis.

Custom Reports

User-defined reports.


hBBn3bA2yKpM