Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Information about SQL Server security.
Documenting Full-Text Indexes
Top-notch security requires a complete set of documentation to help DBAs remain aware of what...
Author: Quantum John Date: 12/17/2009
Project Oslo, a.k.a. SQL Server Modeling Services
Interesting. Project Oslo has an official name now, "SQL Server Modeling Services." It's interesting...
Author: Quantum John Date: 11/20/2009
SQL Server vs. Oracle Security Vulnerabilities
Think Oracle's "Unbreakable" advertising implies it has the fewest vulnerabilties? Think again. This...
Author: Quantum John Date: 11/18/2009
Custom Auditing
If auditing had no cost, we'd always audit everything, but it can have major performance costs, so...
Author: Quantum John Date: 10/29/2009
SQL Server 2005, List of Events Captured by the Default Trace
Looking for a quick list of the events monitored/captured by SQL Server 2005's default trace? Here...
Author: Quantum John Date: 10/29/2009
Making STIG Compliance Much Easier, Part II
Securing a system requires efforts that can be dropped into 3 buckets: Configuration, Alerting, and...
Author: Quantum John Date: 10/26/2009
Mission Assurance Category
This is old news to all of you who have memorized the Department of Defense Instruction (DoDI)...
Author: Quantum John Date: 10/15/2009
Making STIG Compliance Much Easier
Tired of struggling to implement the Database STIG on a server, only to have to repeat the process...
Author: Quantum John Date: 10/13/2009
Changing the Domain of SQL Server
The following are areas of concern you should consider when changing the ___domain of a SQL Server or...
Author: Quantum John Date: 10/13/2009
What's a STIG?
STIGs STIG stands for Security Technical Implementation Guide, and there are many STIGs created by...
Author: Quantum John Date: 10/07/2009