Category Archives: Security

  1. You are not logged on as the database owner or system administrator.

    Leave a comment

    February 22, 2016 by Kenneth Fisher

    I had one of my developers ask me why he keeps seeing the following warning when he tries to modify …
    Continue reading

  2. Impersonation can give you the wrong answer

    1

    February 8, 2016 by Kenneth Fisher

    I use impersonation all the time to let me see additional permissions information I can only get that way and, …
    Continue reading

  3. The CONNECT permission

    11

    January 27, 2016 by Kenneth Fisher

    The CONNECT permission exists at the instance and database levels. Note: as of SQL 2012 it is CONNECT SQL at …
    Continue reading

  4. Do you check for TRUSTWORTHY databases as part of your security audits?

    7

    December 30, 2015 by Kenneth Fisher

    I ran a twitter poll the other day Do you check for databases with trustworthy turned on when you do …
    Continue reading

  5. Hiding one or more columns

    Leave a comment

    November 12, 2015 by Kenneth Fisher

    This isn’t something you have to do frequently, but sometimes you don’t want the users to have access to certain …
    Continue reading

  6. Questions from “SQL Server Security for Everyone”

    2

    November 4, 2015 by Kenneth Fisher

    I recently gave my SQL Server Security for Everyone session at Summit 2015. (I’m still in awe about that by …
    Continue reading

  7. Administrative Logins and Users

    3

    November 2, 2015 by Kenneth Fisher

    If you’ve ever worked through an audit you have probably gotten a request that looks a lot like this: Please …
    Continue reading

  8. The powerpoint for my SQL Server Security Basics session

    2

    October 5, 2015 by Kenneth Fisher

    Well I’ve done it. I’ve spoken at an event. I’ll discuss how I felt about it and what I learned …
    Continue reading

  9. Zombie AD Groups

    4

    September 21, 2015 by Kenneth Fisher

    I spent something like 2 hours today trying to figure out how a particular user had access to one of …
    Continue reading

  10. Permissions Posters

    3

    July 27, 2015 by Kenneth Fisher

    I’ve been doing a lot of research recently for my permissions session and for a project at work. During said …
    Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 3,975 other subscribers

Follow me on Twitter

Archives

ToadWorld Pro of the Month November 2013