Category Archives: Security

  1. Grant Deny Revoke

    2

    May 4, 2016 by Kenneth Fisher

    It always amazes me how often these three commands get confused. Heck it amazes me how long I confused them. …
    Continue reading

  2. Certificates, Proxies and Jobs! Oh My!

    2

    April 27, 2016 by Kenneth Fisher

    Oh Noes! I have a job that requires me to run an SSIS package, cmdshell script, etc. And I need …
    Continue reading

  3. I’m presenting for the Pass Security Virtual Chapter!

    1

    March 23, 2016 by Kenneth Fisher

    Tomorrow (3/24/2016) at noon CT I’ll be presenting my SQL Server Security Basics session for the Pass Security Virtual Chapter. …
    Continue reading

  4. What permissions do I need?

    Leave a comment

    March 16, 2016 by Kenneth Fisher

    Ever wondered how to tell what permissions are required to run a statement or perform a task? Well, sometimes it …
    Continue reading

  5. You don’t need to be a sysadmin

    11

    March 10, 2016 by Kenneth Fisher

    Hey, I need sysadmin access to ServerA. Ok. Why do you need sysadmin? Well I need to be able to …
    Continue reading

  6. How do I grant someone the ability to create a stored procedure?

    1

    March 2, 2016 by Kenneth Fisher

    The question of How to grant the ability to create/alter stored procedures and views came up today on dba.stackexchange.com. It’s …
    Continue reading

  7. You are not logged on as the database owner or system administrator.

    Leave a comment

    February 22, 2016 by Kenneth Fisher

    I had one of my developers ask me why he keeps seeing the following warning when he tries to modify …
    Continue reading

  8. Impersonation can give you the wrong answer

    1

    February 8, 2016 by Kenneth Fisher

    I use impersonation all the time to let me see additional permissions information I can only get that way and, …
    Continue reading

  9. The CONNECT permission

    4

    January 27, 2016 by Kenneth Fisher

    The CONNECT permission exists at the instance and database levels. Note: as of SQL 2012 it is CONNECT SQL at …
    Continue reading

  10. Do you check for TRUSTWORTHY databases as part of your security audits?

    7

    December 30, 2015 by Kenneth Fisher

    I ran a twitter poll the other day Do you check for databases with trustworthy turned on when you do …
    Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,223 other followers

Follow me on Twitter

ToadWorld Pro of the Month November 2013
Follow

Get every new post delivered to your Inbox.

Join 1,223 other followers