Click here to monitor SSC
SQLServerCentral is supported by Redgate
Log in  ::  Register  ::  Not logged in
Home       Members    Calendar    Who's On

Add to briefcase

SCCM Security Config for SQL Servers Expand / Collapse
Posted Monday, June 17, 2013 3:56 AM



Group: General Forum Members
Last Login: Tuesday, October 25, 2016 2:13 AM
Points: 193, Visits: 974
Hi All,

I prefer my systems to work on the least privilege wherever possible but I have an account connecting for SCCM and it has been put in a AD group that has sysadmin, and that makes me unhappy. I understand that this account has to connect and the reasoning but for some reason it creates two connections to every database on my server about every 5 mins. This worries me even more as the server in question has in excess of 1600 db's on it (don't ask - an old design, which is too expensive to change) and that means it's hammering the connections + 3200 which will have an effect on the other connections and threading

Does anyone know the required permissions for a SCCM SQL service account and what perms it needs at the db level (for monitored databases not SCCM itself)?

Every day is a school day, and don't trust anyone who tells you any different.
Post #1464050
Posted Monday, June 17, 2013 12:19 PM



Group: General Forum Members
Last Login: Friday, December 2, 2016 3:25 AM
Points: 7,933, Visits: 14,355
If all SCCM is doing in inspecting System Views, Catalog Views and DMOs then you may be able to go to something like this:

1. Create a Login for the SCCM service to use to login, or add the SCCM service account if that's how it authenticated to the DB instance (probably done already).
2. Create a User in every user database on the instance for that Login plus model (to support having a user in all new DBs) and leave the user in the public Database Role only, i.e. the user should not need any explicit permissions.
3. While in master grant VIEW SERVER STATE to the Login.
4. While in master grant VIEW ANY DEFINITION to the Login. The ANY is very important because it denotes a sever-level permission that permeates all databases as well, as long as the login has a user in the database.

That will offer the SCCM Login the ability to view all server-level and database-level metadata. Any permissions required to allow the SCCM login to modify server or database level settings will require additional grants.

There are no special teachers of virtue, because virtue is taught by the whole community. --Plato
Post #1464305
« Prev Topic | Next Topic »

Add to briefcase

Permissions Expand / Collapse