forked from docs/doc-exports
Reviewed-by: Belejkanic, Lukas <lukas.belejkanic@t-systems.com> Co-authored-by: Li, Qiao <qiaoli@huawei.com> Co-committed-by: Li, Qiao <qiaoli@huawei.com>
5.9 KiB
5.9 KiB
Viewing Information About SQL Injection Detection
This section describes how to view SQL injection detection information of a database audit instance.
Prerequisites
- Database audit has been enabled.
Procedure
- View information about SQL injection detection, as shown in Figure 1. For details about related parameters, see Table 1.
- Select a risk severity from the All risk severities drop-down list in the upper right corner of the list, or enter a key word of an SQL injection rule name to search.
- Click Set Priority in the Operation column of an SQL injection rule to change its priority.
Table 1 Parameters Parameter
Description
Name
Name of the SQL injection detection
Command Feature
Command features of the SQL injection detection
Risk Severity
Risk level of the SQL injection detection. The options are as follows:
- High
- Moderate
- Low
- No risks
Status
Status of the SQL injection detection. The options are as follows:
- Enabled
- Disabled
Operation
Operations on an SQL injection rule. The options are as follows:
- Set Priority
- Disable
- Edit
- Delete