Change DB Owner to sa for multiple DB's
Changes DB owner to sa for Online DB's where owner is not sa
2013-04-26 (first published: 2013-04-12)
2,719 reads
Changes DB owner to sa for Online DB's where owner is not sa
2013-04-26 (first published: 2013-04-12)
2,719 reads
This week Steve Jones talks encryption and why you shouldn't be implementing anything you've invented.
2013-03-18
188 reads
Why do stored procedures help with security? In this piece, MVP Brian Kelley explains why SQL Injection and information gathering are hampered with stored procedures.
2015-06-12 (first published: 2013-02-18)
21,024 reads
2013-02-28 (first published: 2013-02-12)
1,146 reads
I want to backup my SQL Server databases to a folder, but I want to minimize who has access to the folder. In other words, I want to make sure that members of the Windows Local Administrators group don't get to the backups without intentionally trying to bypass the security. How do I do that?
2012-10-02
3,264 reads
Recently I was supporting a third party application. It queries to determine what tables it has permissions to before it proceeds with the rest of its functionality. We had implemented permissions based on the best practice of creating roles, assigning the permissions to the roles, and then making the users members of the roles. The application was querying INFORMATION_SCHEMA.TABLE_PRIVILEGES and of course didn't find any permissions directly against the user in question. We ended up granting explicit permissions to the user so the application would work, but I'm more interested in the general case. How can I determine permissions for an individual user?
2012-08-02
3,152 reads
2012-05-25
2,278 reads
This article describes how to create user defined server roles and use stored procedures and queries related.
2012-05-25
4,574 reads
With SQL Server 2000 no default server, database or application role was available to be able to execute all stored procedures. With SQL Server 2005, SQL Server 2008 and SQL Server 2008 R2 has this changed with all of the new security features? If not, what options do I have to grant execute rights to the needed database roles?
2012-04-19
2,470 reads
2012-03-22
2,404 reads
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
By Brian Kelley
Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...
Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...
I am trying to create a filter on a SQL Server audit to capture...
I've come across what appears to be a strange deadlock anomaly. As seen in...
Comments posted to this topic are about the item Stairway to Azure SQL Hyperscale...
From T-SQL, without requiring an XEvent session, can I tell which deprecated features are being used on my instance?
See possible answers