Wireless Office Headset User Manual

EMBARCADERO TECHNOLOGIES > DSAUDITOR 4.5 USER GUIDE 10
Top 25 Largest Data Returns: Queries returning a large amount of data can affect performance. Use a detailed
report to analyze these queries and determine if they can be optimized.
Top 25 Longest Running Queries: Long running queries affect application performance. By analyzing the full
SQL statements in a detailed report you may be able to better optimize the queries for improved transaction times.
Performance Charts - Table Joins
If tables were joined less in the past month than in the same period of the previous year, that may indicate that their
indexes can be deleted. An increased number of joins may indicate the need to optimize the join order or create an
aggregation table to improve performance.
Table Join Summary - Month-to-Date: Shows usage for each table that was joined in a query.
Table Join Summary - Last Year, Month-to-Date: Shows usage for each table that was joined in a query.
Performance Charts - Table Usage
Table usage is important to continuously monitor in order to understand historical trends for data warehousing
optimization as well as security. Table usage charts are used to assess the proper usage of the DSS data. The Table
usage charts will identify the most heavily used tables. This information can then be used to reorganize the ETL
process to insure that the most important table are loaded first.
Table Accesses: Shows usage for each table that was used in a Select query.
Table Updates: Shows usage for each table that was used in a Delete, Insert, or Update query.
Privacy Charts - Non-Privileged Users
One of the major components of data privacy is having a record of who simply viewed Personally Identifiable
Information (PII) or Protected Health Information (PHI). This requires the monitoring of SELECT statements, and
ensures that companies can respond to customer's inquiries about who has seen their information.
Unusual variations in activity could indicate unauthorized viewing or downloading of data to a local system and
detailed audit trails will enable companies to accurately determine the extent of a breach, limiting the losses. While
you would expect application users to frequently access a small number of records, generally it would be unusual for
them to SELECT most or all of the database records. All SELECT activity that does not come from an authorized
application should be investigated.
References
Non-privileged User Data Access: PCI-DSS 10.2.1, HIPAA 164.308(a)(1)(ii)(D), CMS-ARS 11.6, GLBA §314.3(b)(3),
Basel II/ISO 17799 §10.10.1
Failed Selects by Non-Privileged Users: Through the normal course of business various things can happen to
cause a command to fail. A consistently large volume in comparison to overall activity could indicate problems with
your application(s) or users attempting to access the data outside of the approved applications. An unusual spike in
activity; however, likely indicates that someone is “probing” the database for access points.