SQL Server security – Providing a security model using user-defined roles
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Security roles can simplify permissions in SQL Server. In this article, Greg Larsen explains fixed server and database roles.
2021-04-22
Keeping databases secure is critical. In this article, Robert Sheldon explains what to monitor for SQL Server security.
2021-04-16
Learn how to manage and troubleshoot Kerberos authentication for SQL Server using the Kerberos Configuration Manager.
2021-03-30
Phil Factor demonstrates how to use Extended Events to detect acquisition of Intent locks, and so determine which databases are active or apparently 'dormant', and then on which tables data has been modified recently, or which views and stored procedures have been run.
2021-01-28
Learn about how ownership chaining allows you to limit permissions on specific database objects yet give users access through other objects such as views and stored procedures.
2020-10-01
A colleague left the company, a couple of days after SQL Server processes start failing...what do you do?
2020-09-29
6,180 reads
If you own a database with encrypted modules but you don't have a decrypted version, this can be a horror story.
Learn how to get back the code of the encrypted modules using dbatools.
2020-08-18
2,845 reads
Being able to get information and save it on a Excel as a report can be a common and tedious task. What if we could join dbatools and ImportExcel PorwerShell modules to accomplish this in a easier and fast way? We will see how to export roles and its' member and save that info on a multi spreadsheet Excel file with handy tables ready to be explored.
2020-06-30
6,300 reads
SQL Server Machine Learning allows you to run R and Python scripts from SQL Server. When SQL Server 2019 was released, Microsoft enhanced the security for this functionality, but it caused some existing code writing to the file system to to break. In this article, Dennes Torres explains the security enhancement and describes three ways to work with it.
2020-03-11
By Steve Jones
vicarous – adj. curious to know what someone else would do if they were...
Say we have a database that we want to migrate a copy of into...
We are trying to get apps and users off of using SQL accounts to...
Hi I have this view to check if a job is running: SELECT...
All, if you are like me and do not care for the built-in color...
Certain internal SQL Server actions cause internal checkpoints. Which of these actions does not cause an internal checkpoint?
See possible answers