The following table describes all Guardium domains. Your company may have defined additional custom domains.
Access to the query builder for each domain is controlled by security roles, so each user role typically has access to a separate set of domains.
Some domains are available only when optional components are installed (CAS, for example).
On the default admin portal, all query builders can be opened from the menu of the Tools > Report Building tab. On the default user portal, many query builders can be opened from the Custom Reporting application: Monitor/Audit > Build Reports.
Following a short description of the domain, the Description column lists the default security role assigned for each domain, and indicates how to access the domain from the default user portal (if available).
Domain |
Description |
Access |
All of the client/server, session, SQL, and access periods related data. This is the data collected by the inspection engines every time a request is sent to a server being monitored. Roles: all |
Aggregation/Archive |
Aggregation and archiving activity, including the date, time, and status of each operation (archive, send, purge, etc.). Roles: admin |
Alert |
All alerts generated and sent by Guardium. Roles: all |
Application |
Connection, session, and application data recorded for special non-Guardium application (Siebel and SAP, for example). Roles: admin |
Audit Process |
The execution of audit processes and the distribution of results. Roles: all |
Auto-discovery |
Database auto-discovery activity, including all processes that have been run, and the hosts and ports discovered. Roles: all |
CAS Changes |
All changes detected by CAS, including any changed data recorded. Roles: cas |
CAS Config |
CAS instance configurations, describing the use of templates on specific hosts. Roles: cas |
CAS Host History |
History of CAS changes applied to CAS agent hosts. Roles: cas |
CAS Templates |
Reports on the contents of CAS templates (which define the items to monitor). Roles: cas |
Classifier Results |
Reports on classifier process runs and results. Roles: admin |
Comment |
User defined comments for various Guardium components. Roles: all |
Custom |
Custom domains have been defined for uploading commonly used tables and products. See Custom Domains for more information. |
Custom Query |
User defined domains can define any tables of data uploaded to the Guardium appliance. Roles: all |
Exceptions |
All of the exceptions and exception-related data. These are SQL exceptions sent from a database server and collected by inspection engines, as well as exceptions generated by Guardium itself. Roles: all |
Flat Log |
Flat log processing activity. Roles: none |
Group |
Membership in Guardium groups. Roles: all |
Guardium Activity |
All modifications performed by Guardium users to any Guardium entity, such as a report or query definition or modification. Roles: admin |
Guardium Login |
All Guardium user login and logout information. Roles: admin |
Installed Policy |
Provides description of policy parameters and rules for the installed policy. Roles: all |
Policy Violations |
All policy violation data, for all violations of the policy detected by the Guardium inspection engines. Roles: all |
Rogue Connections |
Local database server processes that have circumvented S-TAP to connect to the database via shared memory, named pipes, or other non-standard means. Applies to Unix S-TAP only, when the TEE monitoring method used. Roles: all |
Security Assessment Result |
Records the results of vulnerability assessment processes. Roles: none |
Sniffer Buffer |
Inspection engine statistics. Roles: none |
User/Role/Application |
Relates Guardium users, roles and applications (to report on who has access to which Guardium applications). Roles: admin |
Value Change |
New in 7.0. All changes tracked by the trigger-based value change tracking application. Roles: admin |