2021-06-07
556 reads
2021-06-07
556 reads
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Keeping databases secure is critical. In this article, Robert Sheldon explains what to monitor for SQL Server security.
2021-04-16
2021-04-12
501 reads
2021-04-09
482 reads
You need to make sure that nobody tampers with your production databases, or really any databases outside Development. Even if you weren't of a nervous disposition, you'd want to know if a database was stopped or removed. You'd also be intrigued by the sudden unrehearsed addition of a database to a production server.
2020-02-14
In this article we look at the steps you can follow to create a secure and locked down instance of SQL Server to only be used by the intended application on the same machine.
2020-01-07
2019-12-13
615 reads
SQL Server has many tools used to make it secure. In this article, Robert Sheldon demonstrates several of these features including SQL Server Configuration Manager and the Vulnerability Assessment tool.
2019-06-03
SQL Server has many tools used to make it secure. In this article, Robert Sheldon demonstrates several of these features including SQL Server Configuration Manager and the Vulnerability Assessment tool.
2019-05-31
By Steve Jones
vicarous – adj. curious to know what someone else would do if they were...
Say we have a database that we want to migrate a copy of into...
We are trying to get apps and users off of using SQL accounts to...
Hi I have this view to check if a job is running: SELECT...
All, if you are like me and do not care for the built-in color...
Certain internal SQL Server actions cause internal checkpoints. Which of these actions does not cause an internal checkpoint?
See possible answers