This section describes how to view SQL injection detection information of a database audit instance.
Prerequisites
- Database audit has been enabled.
Procedure
- View information about SQL injection detection, as shown in Figure 1. For details about related parameters, see Table 1.
Figure 1 Viewing information about the SQL injection detection
- Select a risk severity from the All risk severities drop-down list in the upper right corner of the list, or enter a key word of an SQL injection rule name to search.
- Click Set Priority in the Operation column of an SQL injection rule to change its priority.
Table 1 Parameters Parameter
|
Description
|
Name
|
Name of the SQL injection detection
|
Command Feature
|
Command features of the SQL injection detection
|
Risk Severity
|
Risk level of the SQL injection detection. The options are as follows:
|
Status
|
Status of the SQL injection detection. The options are as follows:
|
Operation
|
Operations on an SQL injection rule. The options are as follows:
- Set Priority
- Disable
- Edit
- Delete
|