2011-10-31 (first published: 2011-10-19)
2,267 reads
2011-10-31 (first published: 2011-10-19)
2,267 reads
2011-07-22
2,040 reads
We're pretty confident that we have locked down and encrypted our financial data, but a lot of our customer's PII (Personally Identifiable Information) data is still held in unencrypted form. This data is able to be selected directly by read only business users on many of our downstream reporting, datawarehouse and standby servers. The rise of identity theft makes protecting this data imperative. DBAs are the custodians of this information and must protect it like we protect our own personal information. Recent publicity over the theft of Sony PSN data underscores both the economic and ethical importance of protecting personal data.
2011-07-14
2,864 reads
Arshad Ali examines the different types and different layers of security that SQL Server Service Broker provides during communication and while accessing Service Broker objects.
2011-07-04
1,810 reads
I'm trying to set up SQL Server and I know that I'm not supposed to use an account that's an administrator on the system, as per best practices. I see that the System account is a possibility, but I've been advised not to use it. Why not? Check out this tip to learn more.
2011-06-07
5,306 reads
2011-05-30
2,468 reads
Query Active Directory to get information on user logins.
2013-01-18 (first published: 2011-05-16)
3,862 reads
View login information for all accounts that use SQL authentication.
2011-05-12 (first published: 2011-05-09)
2,942 reads
2011-05-02
2,355 reads
This script is used for drop and create a new or existing user. IF User is already exists in database then first it will dropped and then recreate.
2011-05-11 (first published: 2011-04-28)
1,788 reads
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
By Brian Kelley
Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...
Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...
I am trying to create a filter on a SQL Server audit to capture...
I've come across what appears to be a strange deadlock anomaly. As seen in...
Comments posted to this topic are about the item Stairway to Azure SQL Hyperscale...
From T-SQL, without requiring an XEvent session, can I tell which deprecated features are being used on my instance?
See possible answers