Viewing 15 posts - 2,161 through 2,175 (of 6,105 total)
If you have audit failure logging turned on for your SQL Server (remember that once you make the configuration change you must stop and restart SQL Server for it to...
April 26, 2006 at 10:59 pm
It's not a good practice to leave a computer's administrator account as "administrator." That results in a known name in order to try and hack against. What is typically done...
April 26, 2006 at 10:56 pm
What Phill has said is all correct. Some other things to consider:
SQL Server security means the username/password pass over the wire. The "encryption" scheme on the password is weak... you...
April 26, 2006 at 10:51 pm
It should only contain MSSQLSvc with the appropriate servername and port. This article might be of some help:
April 26, 2006 at 10:45 pm
The nodes don't use the quorum in order to keep track of who is alive and who isn't.
One of the nodes is going to have the main cluster group. That...
April 26, 2006 at 1:16 pm
No. Brian's statement is correct: only one node owns the quorum at a time and that means only one node is going to see the quorum at a time. The...
April 26, 2006 at 12:22 pm
No. The quorum contains the cluster configuration and you should only have one of these. Likewise, if you're installing on Windows Server 2003 Enterprise Edition, you'll only need one drive...
April 26, 2006 at 11:43 am
Ultimately, though, it's not the system administrator's call (speaking with my system administrator's hat on). Data retention and recovery requirements are business requirements. They are driven by the users with...
April 26, 2006 at 11:37 am
This is an excellent site, too. Information on everything from query tuning to why not to use fibers in most environments.
April 26, 2006 at 11:21 am
First document what you've found, then outline the issue, if you can get an assessment on risk and potential cost to the company, put that together, and take it to...
April 26, 2006 at 9:27 am
I know you said you tried disabling the firewall, but did you take a look at the following?
April 25, 2006 at 10:20 pm
Yelena's documentation reference are what you need to look at to set up the supporting structure for Kerberos delegation. Without it, you can't use Windows authentication. I'll explain.
Windows NT used...
April 21, 2006 at 11:11 am
For #1, I go into detail in this article:
Basically, a [COMPILE] lock gets put on the object every time it is executed. This is because of...
April 21, 2006 at 11:02 am
They can't deny access to tempdb because that would kill off any temporary tables you might try to use. Master is required too because there are two objects within master...
April 21, 2006 at 10:58 am
Yes, Steve has been working on it and communicating with others. CS just isn't being very cooperative right now.
April 21, 2006 at 10:56 am
Viewing 15 posts - 2,161 through 2,175 (of 6,105 total)