2021-06-07
556 reads
2021-06-07
556 reads
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Keeping databases secure is critical. In this article, Robert Sheldon explains what to monitor for SQL Server security.
2021-04-16
2021-04-12
501 reads
2021-04-09
482 reads
You need to make sure that nobody tampers with your production databases, or really any databases outside Development. Even if you weren't of a nervous disposition, you'd want to know if a database was stopped or removed. You'd also be intrigued by the sudden unrehearsed addition of a database to a production server.
2020-02-14
In this article we look at the steps you can follow to create a secure and locked down instance of SQL Server to only be used by the intended application on the same machine.
2020-01-07
2019-12-13
617 reads
SQL Server has many tools used to make it secure. In this article, Robert Sheldon demonstrates several of these features including SQL Server Configuration Manager and the Vulnerability Assessment tool.
2019-06-03
SQL Server has many tools used to make it secure. In this article, Robert Sheldon demonstrates several of these features including SQL Server Configuration Manager and the Vulnerability Assessment tool.
2019-05-31
This month, I prompted bloggers to discuss whether good enough is perfect. Thank you to all...
By Steve Jones
Recently a customer asked if SQL Compare and SQL Data Compare can be used...
I have a table. Structure in script below. I have to compare and see...
I have an application team that is insisting on daily (and for some, weekly)...
i see this in the definition of a linked server on our wh sql...
What does this code return in SSMS 20 from SQL Server 2019?
select '|' + CHAR(0)+'abc' + '|';See possible answers