SQL Server provides robust capabilities to monitor itself and it can be easy to be overwhelmed with the choices presented through catalog/dynamic management views, extended events, server side traces (for older versions of SQL Server), or performance counters. This is true on the security side as well. In this whitepaper we’ll present the top five items you should be auditing on all of your SQL Servers, and how to do them. Keeping an eye on these items will help you verify database security and access in your environment.
Who has administrative access to SQL Server?
Who has been granted CONTROL and IMPERSONATE permissions?
Who are the database owners?
What are the respective database permissions?
What failed logins are you getting on your SQL Servers?
To access materials please fill out the form below.