Table of contents
No headers
Report of database access by user
Summary | A log is kept of all connection attempts and session activity with the database. This report summarizes the contents of that log. The report should be scanned for connections from multiple locations by single users (indicating that a login and password may have been shared) or repeated authentication failures that may indicate attempts to compromise an account. |
Maintainer | Information Technology |
Source | Internal |
Parameters | Start date (optional) - Starting date for log entries to report End date (optional) - End date for entries Purge log - Purge log entries after reporting |
Notes | Omitting the start- or end-date causes the report to include all log entries prior to the end-date, or after the start-date, respectively. Omitting both dates reports on existing log entries. Connections from state campuses all appear to come from a single IP, that of the campus proxy server. The report translates those addresses into campus names. Connections from off-campus are all proxied by shark.comfsm.fm, and similarly are all listed as "External." |