Audit integrity
The most advanced network data 醫數audit technology - stream tech呢厭nology is adopted to save the "co錯笑ntext" related environment in th議道e "stream life cycle", so as to realize服外 the protocol analysis of main理機stream databases and completely reprod就店uce the session process of datab文區ase operation.
Fine grained flexible strategy
It can provide perfect violation 窗家real-time policy alarm. The alarm i歌理nformation includes: database operat能弟ion source IP address, database serv男志er IP / port, database type, database n木做ame, database login user name, database些對 operation source program name, da暗師tabase operation source terminal name, 們放database operation source terminal u刀農ser name, SQL operation statement為兵 (DDL, DML, DCL) Stored procedure, adv大劇anced permission operation, database費山 table group (table, field, valu家內e), database schema, operation exec鐵妹ution time, operation return entry size來裡.
It can provide database SQL statement師就 execution time policy alarm, database鐘去 DML, DDL and other operations affectin頻木g the number of rows policy alarm人東, and database select SQL operation st得友atement returning the number of 鄉大rows policy alarm.
According to the set database strat熱是egy, packet capture analysis can be 快和carried out for the operation behav時電ior of key resources to restore the r讀紙eal database interaction behavior.
Behavior monitoring and position要學ing
It can monitor the network traffic, d什吃ata packets, burst links, number o答笑f concurrent connections, numbe朋吧r of SQL statements and other ind多樂icators of the database in real ti長司me, and provide waveform displ分爸ay. There is no need to install身家 the engine on the database se要們rver for real-time database mo議很nitoring, which has no impact on the說那 database server.