In the left menu, select Report Center > Preview Report to enter the Preview Report page, select the report type, asset or asset group, and report time range you want to view, and the required report file will be generated.
You can directly read the generated reports, or click Export in the upper right corner, and select the export format (HTML, PDF, PNG, WORD, EXCEL or CSV) to export the report to the local server in a specified file format.
See the table below for the built-in report types of Database Audit.
Type | Description |
SOX Report | Comprehensively analyzes the database security status from four aspects: planning and organization, ensuring and controlling, risk assessment, and comprehensive situation. |
Comprehensive Analysis Report | Comprehensively analyzes the database situation from four perspectives: SQL statement execution, session connection, risk events, and SQL performance. |
Performance Analysis Report | Analyzes the database performance from five aspects: performance change trends, database/SID with the worst performance, SQL consuming the longest time, SQL with the worst performance, and SQL with the most executions. |
MLPS Reference Analysis Report | Strictly complies with the Multi-Level Protection Scheme (MLPS) standard GB/T 28448-2019 (hereinafter referred to as Level Protection 2.0), and analyzes intrusion prevention, malicious code monitoring, security audit monitoring, etc. in security audits that are set forth in Level Protection 2.0 and the results are displayed. |
Statement Analysis Reports | Analyzes and displays the statement information from five dimensions: SQL statements, failed statements, SQL statement change trends, audit trends, and SQL template with the highest number of executions. |
Session Analysis Reports | Contains four reports for session quantity change trend analysis, new session analysis, concurrent session analysis, and failed session analysis. |
Alarm Analysis Reports | Analyzes the current alarm situation from four dimensions: alarm change trends, alarm sources, alarm objects, and rule hits. |
Other Reports | There are mainly six reports for table analysis, client tool analysis, database account analysis, database/SID analysis, database access source IP analysis, and database/instance name access analysis. |
Custom Reports | User-defined reports. |