what are the main events that can be used to detect following kind of unusual activity ?
Unusual Data Transfer like copying large data outside the instance
Any sql queries that export or copy the data from unauthorized users or ips
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.
