The security administrator can create audit policies to control what is audited within a database. The following objects can have an audit policy defined on them:
- The entire database: All auditable events that occur within the database are audited.
- Tables: All DML and XQUERY access to the tables, MQTs, and nicknames are audited. The only event category applicable to tables is EXECUTE.
- Trusted contexts: All auditable events that happen within a trusted connection defined by the particular trusted context are audited.
- Authorization IDs representing users, groups, and roles: All auditable events that are initiated by the specified user are audited.
- Authorities: All auditable events that are initiated by a user that holds the ...