16.10 - About the Investigation Process - Teradata Database

Teradata Database Security Administration

prodname
Teradata Database
vrm_release
16.10
created_date
June 2017
category
Administration
Security
featnum
B035-1100-161K
  1. Investigate the log of user access privilege checks that result from the logging rules set up.
  2. Become familiar with the security-related tables and views that can assist you in understanding aid in investigations of user behavior and security events. See Investigating Database Access Attempts.
  3. Identify users who make unsuccessful attempts to access data, and if necessary, take remedial action according to your site security policy.