logo
February 17, 2023 | Joe Dibley

Compromising SQL Server with PowerUpSQL

If you’re after a toolkit to own Microsoft SQL Server from end to end, what you need is PowerUpSQL. Implemented in PowerShell and as complete as they come, PowerUpSQL has tools to discover, compromise and own just about any SQL system. It’s the whole kill chain in one tool. This...
November 18, 2022 | Joe Dibley

Public Role in SQL Server

Database roles are similar to Windows groups — rather than revoking or granting access to each user separately, administrators manage access by granting or revoking permissions from roles and  by changing role membership. Using roles makes it easier to accurately grant and revoke privileges for...
October 16, 2020 | Jeff Melnick

Guide to SQL Server Permissions

For anyone managing a SQL Server database, understanding permissions is critical to ensuring that only authorized users are able to view and modify data. This article explains the different types of SQL Server permissions, including server-level and database-level user permissions, and provides...
February 4, 2020 | Jeff Melnick

Top 5 SQL Server Monitoring Tools for High Performance and Strong Security

Your organization's SQL Server is a critical asset, providing storage for your valuable data and serving as the back-end database for many enterprise applications and websites. This article explains what's involved in ensuring high performance and explores four of the top SQL Server performance...
June 27, 2019 | Jeff Melnick

How to Implement Row and Column Level Security in SQL Server

SQL Server includes a range of security features. Two of the most valuable are column level security and row level security, which enable you to granularly grant users access to rows and columns in a table. This article explains how to implement these features in your environment. Securables,...
June 13, 2019 | Russell Smith

SQL Server Encryption Explained: TDE, Column-Level Encryption and More

Data protection is critical for ensuring that your organization is compliant with regulatory compliance standards like the GDPR and for meeting the expectations of your clients and business partners. Not only can data breaches result in large fines, but the reputational damage can be just as great....
May 30, 2019 | James Anderson

6 SQL Server Security Basics Every Database Admin Should Know

Data breaches often stem from poorly secured database servers. Being a popular enterprise solution, MS SQL Server databases often become a prime target for attackers. They frequently target these databases and exploit common vulnerabilities such as SQL injection, misconfigured permissions, and weak...
May 23, 2019 | Russell Smith

How to Enable SQL Server Audit and Review the Audit Log

Auditing Microsoft SQL Server is critical to identifying security issues and breaches. In addition, auditing SQL Server is a requirement for compliance with regulations like PCI DSS and HIPAA. Handpicked related content: [Free Guide] SQL Server Hardening Best Practices The first step...
October 5, 2011 | Chris Rich

Top-3 demands for SQL Server auditing

This month’s poll results revealed some very interesting details on what administrators are looking for to support their SQL server environments. Of those polled, 33.6% stated they want SQL configuration settings audited. 22.9% expressed the need for security auditing such as logins and role...
...