After opening the audit log, user information, execution time and execution commands will be recorded, which can effectively improve database security.