Viewing Information About SQL Injection Detection

This section describes how to view SQL injection detection information of a database audit instance.

Prerequisites

  • Database audit has been enabled.

Procedure

  1. View information about SQL injection detection, as shown in Figure 1. For details about related parameters, see Table 1.

    **Figure 1** Viewing information about the SQL injection detection

    Figure 1 Viewing information about the SQL injection detection

    Note

    • Select a risk severity from the All risk severities drop-down list in the upper right corner of the list, or enter a key word of an SQL injection rule name to search.

    • Click Set Priority in the Operation column of an SQL injection rule to change its priority.

    Table 1 Parameters

    Parameter

    Description

    Name

    Name of the SQL injection detection

    Command Feature

    Command features of the SQL injection detection

    Risk Severity

    Risk level of the SQL injection detection. The options are as follows:

    • High

    • Moderate

    • Low

    • No risks

    Status

    Status of the SQL injection detection. The options are as follows:

    • Enabled

    • Disabled

    Operation

    Operations on an SQL injection rule. The options are as follows:

    • Set Priority

    • Disable

    • Edit

    • Delete