Feed SQL Server logs into SIEM
Keeping track of all the security related logs can be hard. Using your security team to shoulder some of the load can help. Learn how in this article.
2024-12-16
3,580 reads
Keeping track of all the security related logs can be hard. Using your security team to shoulder some of the load can help. Learn how in this article.
2024-12-16
3,580 reads
In this article, we look at how to audit and monitor the use of SQL Server extended stored procedures in your database instance.
2024-10-28
This continues my series on auditing SQL Server. The fist parts covered discovery and documentation, server level hardware audits and SQL Server engine level audits. This section examines database configuration audits.
2024-09-18
This section gets into detailed SQL Server configuration details. This is less relevant in a cloud environment, but there are still items to confirm.
2024-08-21
This is the second part of my series on auditing SQL Server. In the first part, I discussed basic server discovery and documentation. It covered some items to check at the hardware level and configuration items, but this section gets into more detailed hardware auditing details.
2024-08-07
Your challenge for this week was to find out who keeps mangling the contents of the AboutMe column in the Stack Overflow database.
2024-06-03
2024-02-21
401 reads
An audit finding relating to production data, containing customer identifiable data, in a UAT environment, prompted this simple script, which completely scrambles data in such a way that the original value can not be reconstituted.
2023-05-24 (first published: 2023-05-19)
868 reads
2023-03-27
300 reads
I have worked in more than one regulated industry, and since the banking crisis of 2008, I have witnessed a sea change in the approach to regulation. The UK Financial Services Authority (FSA) was seen to be a toothless tiger. The UK government replaced the FSA with two separate bodies, each with its own more […]
2021-10-25
1,572 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
What is returned as a result set when I run this command without a new seed value?
See possible answers