Printed 2017/07/25 07:06AM

Looking for Buried Treasure in the Transaction Log

By Robert Davis, 2013/05/27

Lately, I’ve been finding more and more reasons to look in the transaction log for investigative purposes. Questions come up quite regularly asking how to determine who performed some action such as deleting data, changing logins, or disabling jobs. The first reaction may be that if you aren’t auditing for the specific action, you’re out Read More →
Copyright © 2002-2017 Redgate. All Rights Reserved. Privacy Policy. Terms of Use. Report Abuse.