Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

<< Newer    Items 21 to 40 of 878    Older >>
 

Move DB roles

This script will script the role members for all roles on the database.  Read more...
By Shanjan Sapra 2015/03/10 | Source: SQLServerCentral.com | Category: restore
Rating: |  Discuss |   Briefcase | 1,124 reads

Creating schemas

By Steve Jones 2015/03/03 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,722 reads

Signing options

By Steve Jones 2015/02/20 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,660 reads

Not Again!

By Steve Knox 2015/02/18 | Category: aggregates
Rating: (not yet rated) |  Discuss |   Briefcase | 2,364 reads

SQL Injection, Still?

We still have problems with SQL Injection. Steve Jones has a few thoughts on why.  Read more...
By Steve Jones 2015/02/17 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 267 reads

Master Key creation

By Steve Jones 2015/02/10 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,393 reads

Signing Procedures

By Steve Jones 2015/02/09 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,564 reads

Login options

By Steve Jones 2015/02/05 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,843 reads

Stairway to SQL Server Security Level 6: Execution Context and Code Signing

A fundamental way that SQL Server determines whether a principal has the permissions necessary to execute code is with its execution context rules. It’s all complicated by the possibility that a principal has permission to execute code but doesn’t have permission on the underlying objects accessed by the code, such as the data in a table. This stairway level will explore SQL Server’s execution context, ownership chains, and impersonation, as well as show you how you can control access to data via T-SQL code.  Read more...
By Don Kiely 2015/02/04 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,614 reads

Users , Roles and Logins

Useful script in cases where auditors would like to know roles for each user in each database of an instance as well as the status of associated logins.  Read more...
By Kenneth Igiri 2015/02/03 | Source: SQLServerCentral.com | Category: auditing
Rating: |  Discuss |   Briefcase | 2,371 reads

Alter database owner to SA from any user details on all user databases

Alter database owner to SA from any other user details against all user databases  Read more...
Rating: |  Discuss |   Briefcase | 1,274 reads

Database ownership and TRUSTWORTHY

Database ownership is an old topic for SQL Server pro's. Check this simple lab to learn the risks your databases can be exposed to.  Read more...
By Raul Gonzalez 2015/01/29 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,421 reads

Data Mining Part 23: Security

In this chapter we will talk about security recommendations for SQL Server Data Mining.  Read more...
By Daniel Calbimonte 2015/01/27 | Source: SQLServerCentral.com | Category: roles
Rating: |  Discuss |   Briefcase | 2,046 reads

Find Deny permissions on database objects

This script allows the DBA to quickly determine if a deny statement is stopping a user from accessing db objects.  Read more...
Rating: |  Discuss |   Briefcase | 824 reads

Verify Login SID and Machine SID

This script is to verify which login accounts have SID values that don’t match the correct SID values defined on the machine or in the domain.  Read more...
Rating: |  Discuss |   Briefcase | 1,435 reads

SQL Server PCI DSS Security Patching Checklist

PCI DSS has strict requirements about implementing security updates and using only applications which are supported by the vendors. How do you create a patching policy for SQL Servers?  Read more...
By Additional Articles 2015/01/12 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 5,322 reads

What counts for a DBA: Responsibility

Whose fault is it if a database is hacked and its contents appear on a hacker’s site? Louis Davidson suggests that, regardless of limitations, the DBA always bears some responsibility.  Read more...
By Louis Davidson (@drsql) 2014/12/22 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 130 reads

Investigate Report Server Security

List the role that every user have on the directories  Read more...
By Leonardo Campos 2014/12/15 | Source: SQLServerCentral.com | Category: report server
Rating: |  Discuss |   Briefcase | 862 reads

It's Not Just Poor Coding

It's not just poor coding that threatens security, as a new survey shows.  Read more...
By Steve Jones 2014/11/13 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 226 reads

Database Master Keys

By Steve Jones 2014/11/13 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,820 reads
<< Newer    Items 21 to 40 of 878    Older >>
 
Tags
editorial (127)    
sql server 7 (105)    
administration (69)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (39)    
t-sql (33)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (22)    
permissions (22)    
logins (19)    
miscellaneous (15)    
sql server 2008 (15)    
passwords (13)    
backup / restore (12)    
programming (11)    
roles (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
sql injection (10)    
configuring (9)    
reporting services (ssrs) (9)    
database design (8)    
role (8)    
software development (8)    
stored procedures (8)    
best and worst practices (7)    
friday poll (7)    
grant (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server 2008 r2 (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
sql server (6)    
stairway series (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
news (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
users (4)    
active directory (3)    
best practices (3)    
cloud computing (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
advanced (2)    
central management server (cms) (2)    
certificates (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
analysis services (1)    
architecture (1)    
asymmetric keys (1)    
automation (1)    
azure (1)    
azure sql database (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data driven (1)    
data mining (1)    
data security (1)    
database mail (1)    
database master key (dmk) (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbcc (1)    
ddl (1)    
deny (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
revert (1)    
row-level security (rls) (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)