16.10 - About the Investigation Process - Teradata Database
Teradata Database Security Administration
- Teradata Database
- June 2017
- Investigate the log of user access privilege checks that result from the logging rules set up.
- Become familiar with the security-related tables and views that can assist you in understanding aid in investigations of user behavior and security events. See Investigating Database Access Attempts.
- Identify users who make unsuccessful attempts to access data, and if necessary, take remedial action according to your site security policy.