Audit SQL Server Extended Stored Procedures Usage
In this article, we look at how to audit and monitor the use of SQL Server extended stored procedures in your database instance.
2024-10-28
In this article, we look at how to audit and monitor the use of SQL Server extended stored procedures in your database instance.
2024-10-28
This is the second part of my series on auditing SQL Server. In the first part, I discussed basic server discovery and documentation. It covered some items to check at the hardware level and configuration items, but this section gets into more detailed hardware auditing details.
2024-08-07
I have worked in more than one regulated industry, and since the banking crisis of 2008, I have witnessed a sea change in the approach to regulation. The UK Financial Services Authority (FSA) was seen to be a toothless tiger. The UK government replaced the FSA with two separate bodies, each with its own more […]
2021-10-25
1,582 reads
This trigger will work even if you don't have the primary key on any table. Mechanism to configure the primary key in config table has been provided. This can be very helpful to solve the system audit requirements without much efforts.
Disclaimer : Audit Log trigger has performance overhead. It’s meant for table which is not frequently updated, deleted or inserted. Please take precaution when creating the trigger on the table having too many columns.
2019-10-15 (first published: 2019-10-10)
3,100 reads
Security is often something people think about only after they have had a problem. Given that the average cost of a data breach is $3.92 million (SecurityIntelligence 2019) and ransomware attacks have increased 97% over the past 2 years (PhishMe 2019), the "if it's not broke, don't fix it" approach can clearly be catastrophic. Here […]
2019-10-07
9,367 reads
Ensuring that your SQL Server is secure is the job of every Database Administrator. In this article I will provide a script to help perform easier audits of your system.
2019-04-11 (first published: 2016-02-02)
8,701 reads
This article explains how default trace can be used for auditing purposes when combined with PowerShell scripts
2015-05-05
4,406 reads
By Vinay Thakur
As discussed introduction of Always Encryption blog and initial Encryption at rest as TDE...
By Vinay Thakur
Transparent Data Encryption(TDE): TDE was initially introduced in SQL Server 2008 Enterprise Edition; this...
By Steve Jones
Only a little break for me. I’m actually heading to Las Vegas today for ...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item This Week's AI Trust Problem...
Comments posted to this topic are about the item Migrate SSRS Reports to PowerBI...
When thinking of the Identity property for auto incrementing columns and sequences for the same action, which can be used with the BIGINT data type?
See possible answers