SQL Server security – Providing a security model using user-defined roles
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Security roles can simplify permissions in SQL Server. In this article, Greg Larsen explains fixed server and database roles.
2021-04-22
Keeping databases secure is critical. In this article, Robert Sheldon explains what to monitor for SQL Server security.
2021-04-16
Learn how to manage and troubleshoot Kerberos authentication for SQL Server using the Kerberos Configuration Manager.
2021-03-30
Phil Factor demonstrates how to use Extended Events to detect acquisition of Intent locks, and so determine which databases are active or apparently 'dormant', and then on which tables data has been modified recently, or which views and stored procedures have been run.
2021-01-28
Learn about how ownership chaining allows you to limit permissions on specific database objects yet give users access through other objects such as views and stored procedures.
2020-10-01
A colleague left the company, a couple of days after SQL Server processes start failing...what do you do?
2020-09-29
6,125 reads
If you own a database with encrypted modules but you don't have a decrypted version, this can be a horror story.
Learn how to get back the code of the encrypted modules using dbatools.
2020-08-18
2,810 reads
Being able to get information and save it on a Excel as a report can be a common and tedious task. What if we could join dbatools and ImportExcel PorwerShell modules to accomplish this in a easier and fast way? We will see how to export roles and its' member and save that info on a multi spreadsheet Excel file with handy tables ready to be explored.
2020-06-30
6,170 reads
SQL Server Machine Learning allows you to run R and Python scripts from SQL Server. When SQL Server 2019 was released, Microsoft enhanced the security for this functionality, but it caused some existing code writing to the file system to to break. In this article, Dennes Torres explains the security enhancement and describes three ways to work with it.
2020-03-11
Have you ever wanted to filter a visual by selecting a range of values...
By Steve Jones
I wrote a post recently about pruning branches in git. That’s part of the...
By James Serra
I talked about Microsoft Fabric shortcuts in my blog post Microsoft Fabric – the...
Comments posted to this topic are about the item Truncate tables where Referential Integrity...
Hi all, We have a SSIS package that does 2 things in parallel: moves...
We have pretty big tables very sensitive to stats with many updates. Our systems...
I backup the Resource database from my SQL Server 2022 instance. I then install CUs 1, 2, 3, and 4. I have an issue and need to restore my Resource database from backup. Is there anything I need to do after restoring this database?
See possible answers