Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 846    Older >>
 

Data Mining Part 23: Security

In this chapter we will talk about security recommendations for SQL Server Data Mining.  Read more...
By Daniel Calbimonte 2015/01/27 | Source: SQLServerCentral.com | Category: roles
Rating: |  Discuss |   Briefcase | 1,274 reads

Find Deny permissions on database objects

This script allows the DBA to quickly determine if a deny statement is stopping a user from accessing db objects.  Read more...
Rating: |  Discuss |   Briefcase | 548 reads

Verify Login SID and Machine SID

This script is to verify which login accounts have SID values that don’t match the correct SID values defined on the machine or in the domain.  Read more...
Rating: |  Discuss |   Briefcase | 918 reads

SQL Server PCI DSS Security Patching Checklist

PCI DSS has strict requirements about implementing security updates and using only applications which are supported by the vendors. How do you create a patching policy for SQL Servers?  Read more...
By Additional Articles 2015/01/12 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 4,947 reads

What counts for a DBA: Responsibility

Whose fault is it if a database is hacked and its contents appear on a hacker’s site? Louis Davidson suggests that, regardless of limitations, the DBA always bears some responsibility.  Read more...
By Louis Davidson (@drsql) 2014/12/22 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 116 reads

Investigate Report Server Security

List the role that every user have on the directories  Read more...
By Leonardo Campos 2014/12/15 | Source: SQLServerCentral.com | Category: report server
Rating: |  Discuss |   Briefcase | 669 reads

It's Not Just Poor Coding

It's not just poor coding that threatens security, as a new survey shows.  Read more...
By Steve Jones 2014/11/13 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 225 reads

Database Master Keys

By Steve Jones 2014/11/13 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,749 reads

Backup Keys

By Steve Jones 2014/11/10 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,416 reads

Permissions

By Steve Jones 2014/11/07 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,640 reads

A Fundamental Security Mistake

Steve Jones thinks Microsoft is making a fundamental security mistake in the way they build features for the various editions of SQL Server. Read today's editorial and see if you agree.  Read more...
By Steve Jones 2014/11/03 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 398 reads

Have You Been Hacked?

Security is a big deal, and Steve Jones wonders if most data professionals would be aware that they had been hacked.  Read more...
By Steve Jones 2014/10/30 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 151 reads

SETSPN

By Steve Jones 2014/10/17 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,595 reads

Who Watches the Watchers?

Who checks on those who manage our systems? Is there auditing in place for those accidental DBAs?  Read more...
By Brandie Tarvin 2014/10/16 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 280 reads

Stairway to SQL Server Security Level 4: Permissions

A permission gives a principal access to an object to perform certain actions on or with the object. SQL Server has a mind-numbingly huge number of permissions that you can grant to a principal, and you can even deny or revoke those permissions. This sounds a bit complicated, but by the end of this stairway level you’ll understand how SQL Server permissions work and how you can exert very granular control over object creation, data access, and other types of actions on database and server objects.  Read more...
By Don Kiely 2014/10/15 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 3,396 reads

Connecting to Analysis Services in Another Domain

Connecting to resources in untrusted domains with windows authentication can be tricky. Here's how to make it easy.  Read more...
By Ian Massi 2014/10/06 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,209 reads

Protect Confidential SQL Server Data Q and A

Following on from a webcast, Tim Smith answers some questions on SQL Server security like: Is It Better To Mask At the Application Level Or The SQL Server Database Level? Are there any options to find SSNs in SQL Server besides RegEx? And, why would anyone store sensitive data un-encrypted in SQL Server?   Read more...
By Additional Articles 2014/10/02 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 7,589 reads

Prevent Confidential Data at the Application Layer from getting into SQL Server

In this tip Tim Smith looks at different approaches to stop confidential data from getting into the database.  Read more...
By Additional Articles 2014/09/22 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 7,594 reads

List all permissions in all databases

This script will allow you get all the users and roles with permission on objects on all databases.  Read more...
By Alejandro Pelc 2014/09/18 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 16,608 reads

A few reflections on security by a weary application developer

Data security? No worries! Tell me how much you are willing to pay.  Read more...
By George Copeland 2014/09/03 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 113 reads
   Items 1 to 20 of 846    Older >>
 
Tags
editorial (122)    
sql server 7 (105)    
administration (68)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (36)    
t-sql (31)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
permissions (22)    
auditing (21)    
miscellaneous (15)    
sql server 2008 (14)    
passwords (13)    
backup / restore (12)    
logins (12)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
configuring (9)    
reporting services (ssrs) (9)    
roles (9)    
sql injection (9)    
database design (8)    
role (8)    
best and worst practices (7)    
friday poll (7)    
grant (7)    
integration services (ssis) (7)    
software development (7)    
sql agent (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
sql server (6)    
sql server 2008 r2 (6)    
stored procedures (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
login (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
schema (4)    
server roles (4)    
sql server 2000 (4)    
stairway series (4)    
users (4)    
active directory (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
sid (2)    
spn (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
alerts (1)    
alias (1)    
analysis services (1)    
architecture (1)    
asymmetric keys (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
data driven (1)    
data mining (1)    
data security (1)    
database mail (1)    
database object permissions (1)    
database owner (1)    
database permissions (1)    
database users (1)    
ddl (1)    
deny (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
privilege escalation (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
revert (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server 2014 (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)