Whenever the database system and database tools are in operation, log files are written. To better locate errors, you can also make use of various traces, which log additional actions. Traces can contain extracts from inserted data.
You can read traces and log files using either a text editor, Database Studio, or Database Manager CLI.
An unauthorized user reads sensitive data in a log or trace file
An unprivileged operating system user reads a trace or log file and thus gains information about the operation of the database and possibly data from the database.
Use traces only to search for errors. Delete the trace files when you have finished evaluating them