Tag Archives: security

  1. You don’t need to be a sysadmin

    29

    March 10, 2016 by Kenneth Fisher

    Hey, I need sysadmin access to ServerA. Ok. Why do you need sysadmin? Well I need to be able to …
    Continue reading

  2. How do I grant someone the ability to create a stored procedure?

    2

    March 2, 2016 by Kenneth Fisher

    The question of How to grant the ability to create/alter stored procedures and views came up today on dba.stackexchange.com. It’s …
    Continue reading

  3. You are not logged on as the database owner or system administrator.

    Leave a comment

    February 22, 2016 by Kenneth Fisher

    I had one of my developers ask me why he keeps seeing the following warning when he tries to modify …
    Continue reading

  4. Impersonation can give you the wrong answer

    1

    February 8, 2016 by Kenneth Fisher

    I use impersonation all the time to let me see additional permissions information I can only get that way and, …
    Continue reading

  5. The CONNECT permission

    11

    January 27, 2016 by Kenneth Fisher

    The CONNECT permission exists at the instance and database levels. Note: as of SQL 2012 it is CONNECT SQL at …
    Continue reading

  6. Do you check for TRUSTWORTHY databases as part of your security audits?

    7

    December 30, 2015 by Kenneth Fisher

    I ran a twitter poll the other day Do you check for databases with trustworthy turned on when you do …
    Continue reading

  7. Hiding one or more columns

    Leave a comment

    November 12, 2015 by Kenneth Fisher

    This isn’t something you have to do frequently, but sometimes you don’t want the users to have access to certain …
    Continue reading

  8. Questions from “SQL Server Security for Everyone”

    2

    November 4, 2015 by Kenneth Fisher

    I recently gave my SQL Server Security for Everyone session at Summit 2015. (I’m still in awe about that by …
    Continue reading

  9. Administrative Logins and Users

    3

    November 2, 2015 by Kenneth Fisher

    If you’ve ever worked through an audit you have probably gotten a request that looks a lot like this: Please …
    Continue reading

  10. Zombie AD Groups

    4

    September 21, 2015 by Kenneth Fisher

    I spent something like 2 hours today trying to figure out how a particular user had access to one of …
    Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 3,975 other subscribers

Follow me on Twitter

Archives

ToadWorld Pro of the Month November 2013