SQL Server security – Providing a security model using user-defined roles
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
Security roles can simplify permissions in SQL Server. In this article, Greg Larsen explains fixed server and database roles.
2021-04-22
Keeping databases secure is critical. In this article, Robert Sheldon explains what to monitor for SQL Server security.
2021-04-16
Learn how to manage and troubleshoot Kerberos authentication for SQL Server using the Kerberos Configuration Manager.
2021-03-30
Phil Factor demonstrates how to use Extended Events to detect acquisition of Intent locks, and so determine which databases are active or apparently 'dormant', and then on which tables data has been modified recently, or which views and stored procedures have been run.
2021-01-28
Learn about how ownership chaining allows you to limit permissions on specific database objects yet give users access through other objects such as views and stored procedures.
2020-10-01
A colleague left the company, a couple of days after SQL Server processes start failing...what do you do?
2020-09-29
6,228 reads
If you own a database with encrypted modules but you don't have a decrypted version, this can be a horror story.
Learn how to get back the code of the encrypted modules using dbatools.
2020-08-18
2,877 reads
Being able to get information and save it on a Excel as a report can be a common and tedious task. What if we could join dbatools and ImportExcel PorwerShell modules to accomplish this in a easier and fast way? We will see how to export roles and its' member and save that info on a multi spreadsheet Excel file with handy tables ready to be explored.
2020-06-30
6,511 reads
SQL Server Machine Learning allows you to run R and Python scripts from SQL Server. When SQL Server 2019 was released, Microsoft enhanced the security for this functionality, but it caused some existing code writing to the file system to to break. In this article, Dennes Torres explains the security enhancement and describes three ways to work with it.
2020-03-11
By Steve Jones
The episode on data masking and subetting is out. You can see it here:...
By Brian Kelley
I'm listening to Effortless by Greg McKeon (link to author's page) through Audible.com. He...
This book was making its rounds on social media, and the concept seems interesting...
Moss Trim Gummies sind eine köstliche und praktische Möglichkeit, Ihre Gesundheit und Ihr Wohlbefinden...
Hi Dbatools is used to copy table data from domain a to domain b...
I am using the following sql to convert rows into columns for each pid,...
What are the two inputs called to a hash join operation in SQL Server? (choose 2)
See possible answers