Ready to Boost Your Startup? Click to Start Up Your Free Subscription!

DAC

How to Review Audit Logs

November 29, 2024

Curious?
Reveal the Magic!

Please fill out the form to unlock your exclusive content!

QueryPie values your privacy. Please check out our Terms & Privacy Policy.

Overview

You can view logs related to Database Access Control in the Databases section of QueryPie Audit. This includes information on granted and revoked DB access permissions, DB access history, executed queries, and DML query snapshots. Additionally, you can check and release connection lock records due to password failures or prolonged inactivity.

Logs provided by QueryPie DAC

DB Access History

  • This section records the history of DB connection attempts and disconnections.

Query Audit

  • QueryPie records the history of executed queries and actions performed on the database.

Running Queries

  • You can view currently running queries in QueryPie. Once a query execution is completed, the details are recorded in the Query Audit log.

DML Snapshots

Precondition: These snapshots are saved if the DML Snapshot setting is enabled for each DB connection.

  • QueryPie records pre- and post-data snapshots when INSERT, UPDATE, or DELETE queries are executed.

Account Lock History

Precondition: It follows the Maximum Login Failures and Specified Time Interval Before Lockout policies for the connection.

  • QueryPie displays connection lock history due to password failures and prolonged inactivity for each user.
  • All failed connection attempts, such as incorrect password entries or attempts from unauthorized IPs, are counted. When the failed attempts reach the threshold set by the administrator, the connection account is locked.

Access Control Logs

  • QueryPie records the history of granting and revoking access permissions to DB connections for users and groups.
  • The granting and revocation of DB connection permissions are managed in the Access Control menu.

3 Minutes to Wow !

Let us show you how QueryPie can transform the way you govern and share your sensitive data.

Take a Virtual Tour