View and Manage Violations Report
Describes actions that can be take on reports and how to create custom reports.
Modifying Columns in a Violations Report
To add or remove columns in the report, do the following:
- Under Data Safe - Database Security, select SQL Firewall.
- Under SQL Firewall, select Violation reports.
- View a predefined or custom violations report.
-
Select the manage columns icon,
.
The Manage Columns window appears.
- Select columns that you want displayed in the report.
- Deselect columns that you want to hide in the report.
- Click Save changes.
Basic Filtering in a Violations Report
To apply basic filters in the report, do the following:
- Under Data Safe - Database Security, select SQL Firewall.
- Under SQL Firewall, select Violation reports.
- View a custom or predefined violations report.
- Use the Search and Filter bar and the Filter violations option under Actions to filer the report as necessary.
Advanced Filtering in a Violations Report
Advanced filtering of violations can provide flexibility in the way that data is analyzed and reviewed, by allowing organizations to specify complex conditions and multiple criteria that must be met in order for data to be included or excluded from the analysis.
To apply advanced filters in the report, do the following:
- View a predefined or custom violations report.
- Select Show Advanced SCIM Query Builder.
- Use the provided filter builder and
dropdowns to type in your filter(s). Advanced filtering uses System for
Cross-Domain Identity Management (SCIM) syntax and supported operators include:
co: matches resources with an attribute that contains a given stringeq: matches resources with an attribute that is equal to a given value (not case sensitive)eq_cs: matches resources with an attribute that is equal to a given value (case sensitive)ew: matches resources with an attribute that ends with a given stringge: matches resources with an attribute that is greater than or equal to a given valuegt: matches resources with an attribute that is greater than a given valuein: matches resources with an attribute that is equal to any of given values in listle: matches resources with an attribute that is less than or equal to a given valuelt: matches resources with an attribute that is less than a given valuene: matches resources with an attribute that is not equal to a given valuenot_in: matches resources with an attribute that is not equal to any of given values in listpr: matches resources with an attribute if it has a given valuesw: matches resources with an attribute that starts with a given string
Operators can be grouped using parentheses to specify the order.
Filters can also be combined using logical operators such as
andandor.Note:
If you have any basic filters currently applied they will appear in the query builder as well. - Select Update.
To clear the query builder, select Clear. This will clear any basic filters applied as well.
For more information about SCIM, see the protocol documentation at https://www.rfceditor.org/rfc/rfc7644.
For more information about filtering in SCIM, see the filtering section of the protocol documentation at https://www.rfc-editor.org/rfc/rfc7644#section-3.4.2.2.
Example 8-1 Context violations and SQL violations that are allowed advanced filter
(violationAction eq "ALLOWED") and ((violationCause eq "context violation") or (violationCause eq "SQL violation"))
Example 8-2 SQL violations on a specific target database advanced filter
(targetName eq "HRApps") and (violationCause eq "SQL violation")
Example 8-3 Actions taken on two specific databases since a specifc time advanced filter
(operationTime ge "2023-09-11T00:39:43.295Z") and ((targetName eq "HRApps") or (targetName eq "TF_AUTOMATION"))
Create a Custom Violations Report
You can create a custom report from any violations report, including the predefined All Violations report. The details saved to the custom reports are those that you are currently viewing on screen. You may want to create a custom report if you want to preserve the filters and columns displayed in a report that you are viewing online. You may also want to store your custom reports in specific compartments.
- Under Data Safe - Database Security, select SQL Firewall.
- Under SQL Firewall, select Violation reports.
- Click a report name and modify it as needed. If there aren't any custom reports saved, click the All violations report and make changes to it.
- Under the Actions menu, select Create
custom report.
The Create custom report dialog box is displayed.
- Enter a name for your custom report.
- (Optional) Enter a description for your custom report.
- Select the compartment to where you want to save your custom report.
- Click Create custom report, and wait for a message that tells you the custom report is created.
- (Optional) To open and view your custom report, click the click here link.
- (Optional) To return to the report displayed on the screen, click Close.
Update a Custom Violations Report
- Under Data Safe - Database Security, select SQL Firewall.
- Under SQL Firewall, select Violation reports.
- Click Custom reports tab.
- Click a custom report name.
- Modify the report as needed.
- Under the Actions menu, select Save
report.
The custom report is updated.
Delete a Custom Violations Report
When you delete a custom violations report, the report is permanently deleted and cannot berecovered. You cannot delete the predefined All violations report.
- Under Data Safe - Database Security, select SQL Firewall.
- Under SQL Firewall, select Violation reports.
- Click Custom reports tab.
- Click a custom report name.
-
Under the Actions menu, select Delete report.
A Delete report dialog box is displayed, asking you to confirm the deletion.
- Click Delete report.
Create or Manage a Schedule for a Violations Report
You can create a schedule for a predefined or custom violation report to generate a PDF or XLS report.
- Under Data Safe - Database Security, select SQL Firewall.
- Under SQL Firewall, select Violation reports.
- To view a predefined violation report, on the Predefined
reports tab, in the Report name column, click
the report name that you want to view.
The predefined report is displayed.
- To view a custom violation report, click the Custom report
tab. In the Report name column, click the name of your custom
report.
Your custom report is displayed.
- Under the Actions menu, select Manage
report schedule.
The Manage report schedule panel is displayed, pre-loaded with either the default or modified schedule.
- (Optional) In the Schedule report name box, enter a name for the PDF or XLS report.
- Select a compartment to store the reports generated by the schedule.
- For Report format, select either a PDF or XLS output.
- Select a Schedule frequency.
- If you select weekly, select the day of the week in the Every field.
- If you select monthly, select the day of the month in the Day field.
- In Time (in UTC), select a schedule time.
- In Events time span, select the time span for the violation
records.
For example, selecting Last months and entering 14 pulls violations from the last 14 months from the time the report is run.
- (Optional) Specify a row limit. If unspecified, the default row limit is 200 rows.
- Click Save Schedule.
You can access the generated PDF/XLS reports on the Violation report history page.
View and Manage Violation Report History
The Violation report history page lists all the PDF/XLS violations reports that are automatically generated via a schedule or on-demand by users. On this page, you can view the list of reports generated during the past three months, details about those reports, and download reports. Oracle Data Safe stores these reports for up to three months.
- Under Data Safe - Database Security, select SQL Firewall.
- Under SQL Firewall, select Violation
reports history.
The Violation report history table is displayed. It contains the following information:
- Name - The name of the violation report
- State - Either Active or Updating, shows if the report is currently accessible or if it is being updated
- Report definition - Specifies the name of the report that provides data for this scheduled or generated report
- Generated time - The time the report was created
- Report type - Generated or Scheduled. Where generated reports are on-demand reports produced outside of the scheduling system and scheduled reports are those produced by the scheduling system
- File format - PDF or XLS
- Download report - Option to download the report
- (Optional) Filter the list of results by selecting the Search and Filter field. Narrow down the report history page based on the Report definition, Report type, File format, and Created.
- Click on any report name to see further details including OCID and compartment information.