• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
SQL Server: Security
 

SQL Server: Security

on

  • 651 views

Explore some of the best new security features in SQL Server.

Explore some of the best new security features in SQL Server.

Statistics

Views

Total Views
651
Views on SlideShare
647
Embed Views
4

Actions

Likes
1
Downloads
0
Comments
0

1 Embed 4

http://www.linkedin.com 4

Accessibility

Categories

Upload Details

Uploaded via as Apple Keynote

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • DEMO: rest of section\n
  • DEMO: rest of section\n
  • DEMO: rest of section\n
  • DEMO: rest of section\n

SQL Server: Security SQL Server: Security Presentation Transcript

  • SQL Server: Security Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security in SQL Server 2012 Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security in SQL Server 2012 • Rebuilt security from the ground up in SQL Server 2005 Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security in SQL Server 2012 • Rebuilt security from the ground up in SQL Server 2005 • New version builds on that new foundation Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security in SQL Server 2012 • Rebuilt security from the ground up in SQL Server 2005 • New version builds on that new foundation • Will explore some of the best new security features Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security in SQL Server 2012 • Rebuilt security from the ground up in SQL Server 2005 • New version builds on that new foundation • Will explore some of the best new security features • Are they enough to make an upgrade mandatory? Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good • Security Management Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good • Security Management • Default schema for groups Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good • Security Management • Default schema for groups • User-defined server roles Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good • Security Management • Default schema for groups • User-defined server roles • Authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good • Security Management • Default schema for groups • User-defined server roles • Authentication • Contained databases Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good • Security Management • Default schema for groups • User-defined server roles • Authentication • Contained databases • Data Protection Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good • Security Management • Default schema for groups • User-defined server roles • Authentication • Contained databases • Data Protection • Encryption enhancements Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good • Security Management • Default schema for groups • User-defined server roles • Authentication • Contained databases • Data Protection • Encryption enhancements • Auditing Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • What’s New in Security? • Not a lot, but it’s good • Security Management • Default schema for groups • User-defined server roles • Authentication • Contained databases • Data Protection • Encryption enhancements • Auditing • Lots of goodies for DBAs Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • Default schema for groups Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • Default schema for groups • Fixes a big hole Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • Default schema for groups • Fixes a big hole • Avoids creating implicit schemas Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • Default schema for groups • Fixes a big hole • Avoids creating implicit schemas • Less chance of wrong schema in queries Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • Default schema for groups • Fixes a big hole • Avoids creating implicit schemas • Less chance of wrong schema in queries • Default schema for users solved a problem Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • Default schema for groups • Fixes a big hole • Avoids creating implicit schemas • Less chance of wrong schema in queries • Default schema for users solved a problem • But caused others Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • Default schema for groups • Fixes a big hole • Avoids creating implicit schemas • Less chance of wrong schema in queries • Default schema for users solved a problem • But caused others • Allowing them for groups solves it Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal • Grant server-level permissions Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal • Grant server-level permissions • Mix of GRANT and DENY permissions Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal • Grant server-level permissions • Mix of GRANT and DENY permissions • T-SQL: CREATE/ALTER/DROP SERVER ROLE Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal • Grant server-level permissions • Mix of GRANT and DENY permissions • T-SQL: CREATE/ALTER/DROP SERVER ROLE • Can only assign server-level permissions Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal • Grant server-level permissions • Mix of GRANT and DENY permissions • T-SQL: CREATE/ALTER/DROP SERVER ROLE • Can only assign server-level permissions • Permissions needed Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal • Grant server-level permissions • Mix of GRANT and DENY permissions • T-SQL: CREATE/ALTER/DROP SERVER ROLE • Can only assign server-level permissions • Permissions needed • CREATE SERVER ROLE permission Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal • Grant server-level permissions • Mix of GRANT and DENY permissions • T-SQL: CREATE/ALTER/DROP SERVER ROLE • Can only assign server-level permissions • Permissions needed • CREATE SERVER ROLE permission • IMPERSONATE on the server principal for logins Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal • Grant server-level permissions • Mix of GRANT and DENY permissions • T-SQL: CREATE/ALTER/DROP SERVER ROLE • Can only assign server-level permissions • Permissions needed • CREATE SERVER ROLE permission • IMPERSONATE on the server principal for logins • ALTER for server roles used as the server principal Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Security Management • User-defined server roles • Server-level principal • Grant server-level permissions • Mix of GRANT and DENY permissions • T-SQL: CREATE/ALTER/DROP SERVER ROLE • Can only assign server-level permissions • Permissions needed • CREATE SERVER ROLE permission • IMPERSONATE on the server principal for logins • ALTER for server roles used as the server principal • Others if you assign server role ownership Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Authentication • Contained databases Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Authentication • Contained databases • Can create a SQL user with a password Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Authentication • Contained databases • Can create a SQL user with a password • Windows user in database Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Authentication • Contained databases • Can create a SQL user with a password • Windows user in database • Not associated with a login Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Authentication • Contained databases • Can create a SQL user with a password • Windows user in database • Not associated with a login • Authenticate against contained database Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Authentication • Contained databases • Can create a SQL user with a password • Windows user in database • Not associated with a login • Authenticate against contained database • Get a token for that database only Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Authentication • Contained databases • Can create a SQL user with a password • Windows user in database • Not associated with a login • Authenticate against contained database • Get a token for that database only • Security boundary is tightly scoped Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Authentication • Contained databases • Can create a SQL user with a password • Windows user in database • Not associated with a login • Authenticate against contained database • Get a token for that database only • Security boundary is tightly scoped • If authentication fails at database, doesn’t fall back to duplicate login, if any Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Request Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Request Initial catalog specified? Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Request Initial catalog specified? No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Request Initial Yes Initial catalog catalog specified? contained? No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Request Initial Yes Initial catalog catalog specified? contained? No No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Request Initial Yes Initial Yes Authent- catalog catalog ication specified? contained? type? No No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Request user in database ? SQL Server Initial Yes Initial Yes Authent- catalog catalog ication specified? contained? type? No No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Request user in database ? SQL Server No Initial Yes Initial Yes Authent- catalog catalog ication specified? contained? type? No No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Request user in Password database match? ? SQL Server No Initial Yes Initial Yes Authent- catalog catalog ication specified? contained? type? No No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Request user in Password database match? ? SQL Server No No Initial Yes Initial Yes Authent- catalog catalog ication Authentication specified? contained? type? failure No No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Yes Request user in Password database match? ? SQL Server No No Initial Yes Initial Yes Authent- Permis- catalog catalog ication Authentication sion in specified? contained? type? failure database ? No No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Yes Request user in Password database match? ? SQL Server No No Initial Yes Initial Yes Authent- No Permis- catalog catalog ication Authentication sion in specified? contained? type? failure database ? No No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Yes Request user in Password database match? ? SQL Server No No Initial Yes Initial Yes Authent- No Permis- catalog catalog ication Authentication sion in specified? contained? type? failure database ? No No Windows Matching login or group? Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Yes Request user in Password database match? ? SQL Server No No Initial Yes Initial Yes Authent- No Permis- catalog catalog ication Authentication sion in specified? contained? type? failure database ? No No Windows Matching login or group? No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Yes Request user in Password database match? ? SQL Server No No Initial Yes Initial Yes Authent- No Permis- catalog catalog ication Authentication sion in specified? contained? type? failure database ? No No Windows Matching Matching Yes principal login or in group? database ? No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Yes Request user in Password database match? ? SQL Server No No Initial Yes Initial Yes Authent- No Permis- catalog catalog ication Authentication sion in specified? contained? type? failure database ? No No No Windows Matching Matching Yes principal login or in group? database ? No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Yes Request user in Password database match? ? SQL Server No No Initial Yes Initial Yes Authent- No Permis- catalog catalog ication Authentication sion in specified? contained? type? failure database ? No No No Windows Matching Matching Yes principal Yes login or in group? database ? No Server-level authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Yes Request user in Password database match? ? SQL Server No No Initial Yes Initial Yes Authent- No Permis- Yes catalog catalog ication Authentication sion in specified? contained? type? failure database ? No No No Windows Matching Matching Yes principal Yes login or in group? database ? No Server-level Database authentication authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained DatabaseAuthentication Connection Matching Yes Yes Request user in Password database match? ? SQL Server No No Initial catalog Yes Initial catalog Yes Authent- ication * Authentication No Permis- sion in Yes specified? contained? type? failure database ? No No No Windows Matching Matching Yes principal Yes login or in group? database ? No Server-level Database authentication authentication Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained Database Issues Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained Database Issues • Security issues you have to be careful about Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained Database Issues • Security issues you have to be careful about • Accessing other databases using the guest account Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained Database Issues • Security issues you have to be careful about • Accessing other databases using the guest account • Duplicate logins Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained Database Issues • Security issues you have to be careful about • Accessing other databases using the guest account • Duplicate logins • Increased access when containment status changes Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Contained Database Issues • Security issues you have to be careful about • Accessing other databases using the guest account • Duplicate logins • Increased access when containment status changes • Attaching a contained database Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Data Protection Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Data Protection • Cryptography Enhancements Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Data Protection • Cryptography Enhancements • HASHBYTES supports SHA2 256 and 512 bits Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Data Protection • Cryptography Enhancements • HASHBYTES supports SHA2 256 and 512 bits • Passwords hashed with SHA512 Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Data Protection • Cryptography Enhancements • HASHBYTES supports SHA2 256 and 512 bits • Passwords hashed with SHA512 • RC4 is deprecated, supported only when compatibility set to 90 or 100. Don’t use it! Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Data Protection • Cryptography Enhancements • HASHBYTES supports SHA2 256 and 512 bits • Passwords hashed with SHA512 • RC4 is deprecated, supported only when compatibility set to 90 or 100. Don’t use it! • Maximum certificate key length increased to 4,096 from 3,456 Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Data Protection • Cryptography Enhancements • HASHBYTES supports SHA2 256 and 512 bits • Passwords hashed with SHA512 • RC4 is deprecated, supported only when compatibility set to 90 or 100. Don’t use it! • Maximum certificate key length increased to 4,096 from 3,456 • Service and database master keys now use AES instead of Triple-DES (for backups too) Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Data Protection • Cryptography Enhancements • HASHBYTES supports SHA2 256 and 512 bits • Passwords hashed with SHA512 • RC4 is deprecated, supported only when compatibility set to 90 or 100. Don’t use it! • Maximum certificate key length increased to 4,096 from 3,456 • Service and database master keys now use AES instead of Triple-DES (for backups too) • FROM BINARY option on CREATE CERTIFICATE Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Basic server auditing supported in all SQL Server editions! Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Basic server auditing supported in all SQL Server editions! • Database auditing only in Enterprise, Datacenter, Developer, and Evaluation editions Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Basic server auditing supported in all SQL Server editions! • Database auditing only in Enterprise, Datacenter, Developer, and Evaluation editions • No longer need to rely on SQLTrace Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Basic server auditing supported in all SQL Server editions! • Database auditing only in Enterprise, Datacenter, Developer, and Evaluation editions • No longer need to rely on SQLTrace • Multiple audits and targets Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Basic server auditing supported in all SQL Server editions! • Database auditing only in Enterprise, Datacenter, Developer, and Evaluation editions • No longer need to rely on SQLTrace • Multiple audits and targets • Better performance Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Basic server auditing supported in all SQL Server editions! • Database auditing only in Enterprise, Datacenter, Developer, and Evaluation editions • No longer need to rely on SQLTrace • Multiple audits and targets • Better performance • Persist state Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Basic server auditing supported in all SQL Server editions! • Database auditing only in Enterprise, Datacenter, Developer, and Evaluation editions • No longer need to rely on SQLTrace • Multiple audits and targets • Better performance • Persist state • Audit resilience Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Resilient to failure Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Resilient to failure • Can recover from failure to write to the log Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Resilient to failure • Can recover from failure to write to the log • From most file or network errors Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Resilient to failure • Can recover from failure to write to the log • From most file or network errors • Wee bit better than shutdown on failure! Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Resilient to failure • Can recover from failure to write to the log • From most file or network errors • Wee bit better than shutdown on failure! • FAIL_OPERATION option for the ON_FAILURE event in CREATE SERVER AUDIT Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Resilient to failure • Can recover from failure to write to the log • From most file or network errors • Wee bit better than shutdown on failure! • FAIL_OPERATION option for the ON_FAILURE event in CREATE SERVER AUDIT • If problem with audit initiation at startup, server instance won’t start Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Cap files without rollover Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Cap files without rollover • Formerly could have either: Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Cap files without rollover • Formerly could have either: • Indeterminate number of log files Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Cap files without rollover • Formerly could have either: • Indeterminate number of log files • Rollover after predefined number of files Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Cap files without rollover • Formerly could have either: • Indeterminate number of log files • Rollover after predefined number of files • Now can cap without rolling over Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Cap files without rollover • Formerly could have either: • Indeterminate number of log files • Rollover after predefined number of files • Now can cap without rolling over • Control amount of information without losing audit records Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Cap files without rollover • Formerly could have either: • Indeterminate number of log files • Rollover after predefined number of files • Now can cap without rolling over • Control amount of information without losing audit records • MAX_FILES option on CREATE SERVER AUDIT Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Cap files without rollover • Formerly could have either: • Indeterminate number of log files • Rollover after predefined number of files • Now can cap without rolling over • Control amount of information without losing audit records • MAX_FILES option on CREATE SERVER AUDIT • Blocks and rolls back operations until clear Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • User-defined audit events Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • User-defined audit events • Write what you want to the audit log Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • User-defined audit events • Write what you want to the audit log • sp_audit_write Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • User-defined audit events • Write what you want to the audit log • sp_audit_write • @user_defined_event_id Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • User-defined audit events • Write what you want to the audit log • sp_audit_write • @user_defined_event_id • @succeeded Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • User-defined audit events • Write what you want to the audit log • sp_audit_write • @user_defined_event_id • @succeeded • @user_defined_info (custom string) Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Filter audit events Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Filter audit events • Built on extended events Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Filter audit events • Built on extended events • Pretty fine control over what gets written Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • Filter audit events • Built on extended events • Pretty fine control over what gets written • Use the WHERE clause on the CREATE SERVER AUDIT statement Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • T-SQL stack frame information Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • T-SQL stack frame information • Determine if query from stored procedure or directly from application Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Auditing • T-SQL stack frame information • Determine if query from stored procedure or directly from application • See the nested frame for the query Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Learn More! Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Learn More!• This is an excerpt from a larger course. Visit www.learnnowonline.com for the full details! Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Learn More!• This is an excerpt from a larger course. Visit www.learnnowonline.com for the full details! Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Learn More!• This is an excerpt from a larger course. Visit www.learnnowonline.com for the full details!• Learn more about SQL Server on SlideShare: Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company
  • Learn More!• This is an excerpt from a larger course. Visit www.learnnowonline.com for the full details!• Learn more about SQL Server on SlideShare:  SQL 2012: Development & Programming Learn More @ http://www.learnnowonline.com Copyright © by Application Developers Training Company