Microsoft SQL server 2012 security cookbook. (2012)
- Record Type:
- Book
- Title:
- Microsoft SQL server 2012 security cookbook. (2012)
- Main Title:
- Microsoft SQL server 2012 security cookbook
- Further Information:
- Note: By Rudi Bruchez.
- Other Names:
- Bruchez, Rudi
- Contents:
- Microsoft SQL Server 2012 Security Cookbook; Microsoft SQL Server 2012 Security Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Securing Your Server and Network; Introduction; Choosing an account for running SQL Server; How to do it ... How it works ... There's more ... ; How to give the Log on as a service right to an account; How to do it in Windows Server Core; Creating a domain account to use as a service account; See also; Managing service SIDs; How to do it ... ; How it works ... ; Using a managed service account; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Removing a managed account; See also; Using a virtual service account; How to do it ... ; How it works ... ; Encrypting the session with SSL; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Configuring a firewall for SQL Server access. How to do it ... How it works ... ; There's more ... ; Find specific ports used by SQL Server; Do it by script; Disabling SQL Server Browser; How to do it ... ; How it works ... ; There's more ... ; Stopping unused services; How to do it ... ; How it works ... ; Using Kerberos forMicrosoft SQL Server 2012 Security Cookbook; Microsoft SQL Server 2012 Security Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Securing Your Server and Network; Introduction; Choosing an account for running SQL Server; How to do it ... How it works ... There's more ... ; How to give the Log on as a service right to an account; How to do it in Windows Server Core; Creating a domain account to use as a service account; See also; Managing service SIDs; How to do it ... ; How it works ... ; Using a managed service account; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Removing a managed account; See also; Using a virtual service account; How to do it ... ; How it works ... ; Encrypting the session with SSL; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Configuring a firewall for SQL Server access. How to do it ... How it works ... ; There's more ... ; Find specific ports used by SQL Server; Do it by script; Disabling SQL Server Browser; How to do it ... ; How it works ... ; There's more ... ; Stopping unused services; How to do it ... ; How it works ... ; Using Kerberos for authentication; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Using extended protection to prevent authentication relay attacks; How to do it ... ; How it works ... ; See also; Using transparent database encryption; How to do it ... ; How it works ... ; There's more ... ; Securing linked server access. How to do it ... How it works ... ; There's more ... ; Configuring endpoint security; How to do it ... ; How it works ... ; There's more ... ; Limiting functionalities -- xp_cmdshell and OPENROWSET; How to do it ... ; How it works ... ; There's more ... ; You cannot prevent a sysadmin member from using xp_cmdshell; 2. User Authentication, Authorization, and Security; Introduction; Choosing between Windows and SQL authentication; How to do it ... ; How it works ... ; Creating logins; How to do it ... ; How it works ... ; There's more ... ; Checking the state of a login; Disabling a login; Changing a SQL login password. Copying SQL logins between instancesSee also; Protecting your server against brute-force attacks; How to do it ... ; How it works ... ; There's more ... ; Audit sa connection and sa failed connection attempts; See also; Limiting administrative permissions of the SA account; How to do it ... ; How it works ... ; There's more ... ; See also; What to do when you have no administrator account; Using fixed server roles; How to do it ... ; How it works ... ; Giving granular server privileges; How to do it ... ; How it works ... ; There's more ... ; Allowing logins to run a SQL trace; See also. … (more)
- Publisher Details:
- Birmingham, UK : Packt Publishing
- Publication Date:
- 2012
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.711
COMPUTERS -- Security -- Networking
Database security
COMPUTERS -- Data Processing
Database security
Electronic books - Languages:
- English
- ISBNs:
- 9781849685894
1849685894 - Related ISBNs:
- 9781849685887
1849685886 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.91407
- Ingest File:
- 01_063.xml