Author: K. Brian Kelley

Home » Archives for K. Brian Kelley
TitleCategoryDate
Automating SQL Server BuildsDatabase Administration2025-08-28
Configuring Critical SQL Server AlertsSQL Server Agent2025-08-11
Microsoft SQL Server Sample DatabasesTesting2025-07-21
Using the Default Trace in SQL ServerProfiler and Trace2025-03-26
SQL Server Static Data Masking with DataVeilSecurity2025-03-13
Beyond Log Shipping, a Smarter Approach to DRLog Shipping2025-01-30
Implementing SQL Server Security with Stored Procedures and ViewsSecurity2020-09-03
Understanding SQL Server Ownership ChainingSecurity2020-04-09
Dealing with a No NULL Requirement for Data Modeling in SQL ServerDatabase Design2020-01-28
Skip-2.0 Malware Impacts SQL Server – Should I Be Worried?Security2019-10-24
SQL Server Implicit Conversions Performance IssuesData Types2019-10-23
SQL Server Forensics Analysis Based on Database Backup SizeMonitoring2019-07-15
Statement Backup Log is Not Allowed for a SQL Transaction Log BackupBackup2019-03-15
Data Modeling: Understanding First Normal Form in SQL ServerDatabase Design2018-08-16
Understanding and Using SQL Server sys.dm_exec_requestsFunctions System2018-06-20
Understanding and Using sys.dm_exec_sessions in SQL ServerFunctions System2018-06-06
Return SQL Server Connection Information with sys.dm_exec_connectionsDynamic Management Views and Functions2018-05-18
Application Database Security Design Part 2 – Multiple Levels of Access to SQL ServerSecurity2018-01-10
Script to find failed SQL Server Backups and validate re-running code was successfulSQL Server Agent2017-11-01
Audit SQL Server Logins without filling up the Error LogAuditing and Compliance2017-10-27
Auditing for New SQL Server Agent JobsSQL Server Agent2017-09-22
Is disabling xp_cmdshell in SQL Server really secure?Security2017-09-06
Protecting SQL Server from RansomwareSecurity2017-08-29
Practice of Using Privileged Accounts to Access SQL ServerSecurity2017-08-07
Verify Connectivity to SQL ServerDatabase Configurations2017-04-25
Application Security Design – Part 1 – Authentication for SQL ServerSecurity2017-03-03
Quickly Find Failed SQL Server Logins Using the Windows Event LogSecurity2016-08-04
Migrate the Correct Logins with a SQL Server DatabaseSecurity2016-04-28
Where Does SQL Server Store Its CertificatesEncryption2016-04-26
SQL Server Permissions Granted to All Users By DefaultSecurity2016-03-28
Suppressing SQL Server Alerts to Reduce EmailsSQL Server Agent2016-02-17
Scripting SQL Server Database Owners for Disaster RecoveryDisaster Recovery2015-12-30
Why You Should Avoid SELECT * in SQL Server T-SQL CodeViews2015-12-10
Minimum Permissions for SQL Server TRUNCATE TABLETSQL2015-12-01
Best Practices to Secure the SQL Server sa AccountSecurity2015-08-18
Script SQL Server Logins for Disaster RecoveryScripts2015-06-18
How to Clone a SQL Server Login, Part 3 of 3Security2015-06-04
How to Clone a SQL Server Login, Part 2 of 3Security2015-05-29
How to Clone a SQL Server Login, Part 1 of 3Security2015-04-13
Recovering a SQL Server TDE Encrypted Database SuccessfullyRestore2015-04-01
Retrieving SQL Server Server Roles for Disaster RecoveryDisaster Recovery2015-03-22
Understanding how SQL Server Agent Jobs can share schedulesSQL Server Agent2015-03-18
Automated way to get all port information for SQL Server instancesSecurity2015-03-09
Finding Encrypted Data in a SQL Server DatabaseEncryption2015-01-14
Catalog SQL Server Services Installed on ServersSQL Server Configurations2014-12-17
What Windows Server Groups Should I Audit on my SQL Servers?Auditing and Compliance2014-10-23
Auditing Critical Windows Files and Folders for SQL ServerSecurity2014-09-08
Add a Salt with the SQL Server HASHBYTES FunctionSecurity2014-07-25
How to Audit for SQL Server Users in Contained DatabasesContained Databases2014-04-11
How come I can create SQL Server objects but not access these objectsSecurity2014-04-09
Understanding how SQL Server handles Service IsolationSecurity2013-11-26
Using Triggers to Mitigate Some SQL Injection EffectsSQL Injection2013-11-19
How to Enable Secondary Decryption of SQL Server Symmetric KeysSecurity2013-11-11
Using Views to Expose Encrypted Data in SQL ServerSecurity2013-10-21
Determining Permission Issues for a SQL Server ObjectSecurity2013-09-24
Determining Drive Letters in Use by SQL Server DatabasesDatabase Administration2013-09-16
SQL Server Security Community Questions on Windows, Server Level, Database, Roles and moreSecurity2013-08-06
What to Audit at the SQL Server Instance LevelAuditing and Compliance2013-07-30
Understanding the importance of key length with the SQL Server asymmetric encryption algorithmsSecurity2013-07-23
Understanding the SQL Server Symmetric Encryption AlgorithmsSecurity2013-07-19
Understanding the SQL Server HASHBYTES hashing algorithmsSecurity2013-07-11
Can I stop a System Admin from enabling SQL Server xp_cmdshell?Security2013-07-03
Disaster Recovery Planning for Microsoft SQL Server – Getting Backups and Restores RightDisaster Recovery2013-05-22
SQL Server Case Sensitive Collations and DMVsDynamic Management Views and Functions2013-03-22
The Power of the SQL Server Database OwnerSecurity2013-03-15
Blocking SQL Server db_datareader, db_datawriter, and db_owner PermissionsSecurity2013-03-06
Understanding GRANT, DENY, and REVOKE in SQL ServerSecurity2013-02-27
SQL Server Agent Job Email Notifications via PowerShellSQL Server Agent2012-12-27
SQL Server Encryption To Block DBAs Data AccessAuditing and Compliance2012-12-19
How to Automate SQL Server Restores for a Test ServerRestore2012-12-11
How to Identify and Backup the Latest SQL Server Database in a SeriesBackup2012-11-20
Auditing SQL Server 2012 Server RolesAuditing and Compliance2012-11-14
Viewing VMware Counters in PerfMon for SQL ServerVirtualization2012-11-07
Protecting the SQL Server Backup folderSecurity2012-09-19
Using a Backup to Find SQL Server Security ChangesAuditing and Compliance2012-09-11
Using PowerShell to Audit for Blank SA PasswordsSecurity2012-09-04
How to Unlock a SQL Login Without Resetting the PasswordSecurity2012-08-28
Parsing all the files in a directory using PowerShellPowerShell2012-08-22
Using nmap to scan for SQL Servers on a networkSecurity2012-08-16
How to Audit Login Changes on a SQL ServerAuditing and Compliance2012-07-30
Issues Determining an Individual SQL Server User’s PermissionsSecurity2012-07-25
Why Can’t I Set a Default SQL Server Schema for Windows Group Login?Security2012-05-29
Identifying the Tie Between Logins and UsersSecurity2012-05-23
Export data to an earlier SQL Server versionImport and Export2012-04-25
Why Can’t I Restore a Database to an Older Version of SQL Server?Restore2012-04-17
Using Friendly Names for SQL Servers via DNSSQL Server Configurations2012-03-28
How to Connect to a SQL Server Named InstanceSecurity2012-03-22
Get Back into SQL Server After You’ve Locked Yourself OutSecurity2012-03-09
Potential Security Exploit Using CONTROL SERVER Permissions in SQL ServerSecurity2012-02-24
Identifying What Runs at Startup on SQL ServerAuditing and Compliance2012-01-30
Auditing sysadmin on multiple servers using PowerShellAuditing and Compliance2012-01-23
Understanding the SQL Server SELECT @@VERSION commandSQL Server Configurations2011-12-13
How to Create Secure SQL Server Service AccountsSecurity2011-09-28
Understanding First Normal Form in SQL ServerDatabase Design2011-06-28
Identify Local Administrators on a SQL Server box using PowerShellSecurity2011-06-15
Why System Account is a bad idea for SQL Server Service AccountSecurity2011-05-25
Unable to see a SQL Server tableSecurity2011-05-18
Auditing SQL Server Password AgeAuditing and Compliance2011-05-11
Understanding SQL Server inserted and deleted tables for DML triggersTriggers2011-03-22
Understanding When SQL Server Kerberos Delegation is NeededSecurity2011-02-22
Retrieving SQL Server Fixed Database Roles for Disaster RecoverySecurity2011-02-04
How to Setup Row Level Security for SQL ServerSecurity2010-12-17
Network communications mechanisms for SQL ServerSecurity2010-12-10
Implicit Permissions Due to Ownership Chaining or Scopes in SQL ServerSecurity2010-11-23
Implicit Permissions Due to SQL Server Database RolesSecurity2010-11-17
Retrieving SQL Server Permissions for Disaster RecoverySecurity2010-10-27
Auditing SQL Server User and Role Permissions for DatabasesAuditing and Compliance2010-10-20
Filtering SQL Server Columns Using Column Level PermissionsSecurity2010-09-30
Filtering Columns in SQL Server Using ViewsSecurity2010-09-21
Cannot make a role a member of itself error in SQL ServerSecurity2010-08-30
SQL Server Security Auditing to Match Logins And UsersAuditing and Compliance2010-08-13
SQL Server Policy Management to Enforce Database Settings in DevelopmentPolicy Based Management2010-07-15
Why listing all of your SQL Servers does not always workSQL Server Configurations2010-07-09
Auditing SQL Server Permissions and Roles for the ServerAuditing and Compliance2010-06-29
Understanding How A User Gets Database Access in SQL ServerSecurity2010-06-14
Tables and Views for Auditing SQL Server LoginsAuditing and Compliance2010-05-24
Replace xp_cmdshell command line use with SQL Server AgentSecurity2010-05-19
SQL Server nested securable permissionsSecurity2010-04-13
Nesting Database Roles in SQL ServerSecurity2010-04-07
Configure Password Enforcement Options for Standard SQL Server LoginsSecurity2009-12-28
SSRS Report FiltersReporting Services Dynamic Reports2009-12-23
Understanding SQL Server fixed database rolesSecurity2009-12-14
Understanding SQL Server fixed server rolesSecurity2009-11-24
SQL Server Encryption Symmetric vs. Asymmetric KeysEncryption2009-11-23
Understanding why there is still downtime for SQL Server with Microsoft ClusteringClustering2009-11-17
On Demand Linked Server Creation with a SQL Server LoginLinked Servers2009-10-14
On demand creation and destruction of a SQL Server Linked ServerLinked Servers2009-09-25
Dynamic SQL and Ownership Chaining in SQL ServerSecurity2009-08-24
Breaking ownership chaining within a schema in SQL ServerSecurity2009-08-11
Grant limited permissions to create SQL views in another schema Part 2Security2009-07-27
Grant limited permissions to create SQL views in another schema Part 1Security2009-07-20
Understanding Cross Database Ownership Chaining in SQL ServerSecurity2009-06-29
Ownership chaining in SQL Server security feature or security riskSecurity2009-06-23
Using authenticators with SQL Server encryptionEncryption2009-05-27
Automate collection and saving of failed logins for SQL ServerAuditing and Compliance2009-05-13
Auditing Failed Logins in SQL ServerAuditing and Compliance2009-04-22
Database level permissions for SQL Server 2005 and 2008Security2009-03-30
Server level permissions for SQL Server 2005 and SQL Server 2008Security2009-03-24
How to move a SQL Server database within the same instance without losing settingsDatabase Administration2009-02-16
SQL Server Surface Area Configuration for Features Option SelectionSurface Area Configuration Manager2009-02-11
SQL Server security settings using the Surface Area Configuration toolSurface Area Configuration Manager2009-01-22
How to setup security features for SQL ServerSQL Server Configurations2009-01-15
New Security Catalog Views in SQL Server 2005 and SQL 2008Security2008-12-24
Auditing SELECT statements in SQL Server 2008Auditing and Compliance2008-12-18
Connecting to SQL Server with a Bad Logon TriggerTriggers2008-11-20
SQL Server 2005 SysAdmin Login AuditingTriggers2008-11-14
How to setup and use a SQL Server aliasSQL Server Configurations2008-11-05

Recent Articles

MSSQLTips.com delivers SQL Server resources to solve real world problems for DBAs, Architects, DevOps Engineers, Developers, Analysts, Cloud and Business Intelligence Pros – all for free. The content we serve is all human written and based on our authors’ real-world experience. Check out tips, articles, scripts, videos, tutorials, live events and more all related to SQL Server on-premises and in the cloud.