Microsoft SQL server 2012 security cookbook /
Over 70 practical, focused recipes to bullet-proof your SQL Server database and protect it from hackers and security threats.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2012.
|
Colección: | Quick answers to common problems.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Microsoft SQL Server 2012 Security Cookbook; Microsoft SQL Server 2012 Security Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Securing Your Server and Network; Introduction; Choosing an account for running SQL Server; How to do it ...
- How it works ... There's more ... ; How to give the Log on as a service right to an account; How to do it in Windows Server Core; Creating a domain account to use as a service account; See also; Managing service SIDs; How to do it ... ; How it works ... ; Using a managed service account; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Removing a managed account; See also; Using a virtual service account; How to do it ... ; How it works ... ; Encrypting the session with SSL; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Configuring a firewall for SQL Server access.
- How to do it ... How it works ... ; There's more ... ; Find specific ports used by SQL Server; Do it by script; Disabling SQL Server Browser; How to do it ... ; How it works ... ; There's more ... ; Stopping unused services; How to do it ... ; How it works ... ; Using Kerberos for authentication; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Using extended protection to prevent authentication relay attacks; How to do it ... ; How it works ... ; See also; Using transparent database encryption; How to do it ... ; How it works ... ; There's more ... ; Securing linked server access.
- How to do it ... How it works ... ; There's more ... ; Configuring endpoint security; How to do it ... ; How it works ... ; There's more ... ; Limiting functionalities
- xp_cmdshell and OPENROWSET; How to do it ... ; How it works ... ; There's more ... ; You cannot prevent a sysadmin member from using xp_cmdshell; 2. User Authentication, Authorization, and Security; Introduction; Choosing between Windows and SQL authentication; How to do it ... ; How it works ... ; Creating logins; How to do it ... ; How it works ... ; There's more ... ; Checking the state of a login; Disabling a login; Changing a SQL login password.
- Copying SQL logins between instancesSee also; Protecting your server against brute-force attacks; How to do it ... ; How it works ... ; There's more ... ; Audit sa connection and sa failed connection attempts; See also; Limiting administrative permissions of the SA account; How to do it ... ; How it works ... ; There's more ... ; See also; What to do when you have no administrator account; Using fixed server roles; How to do it ... ; How it works ... ; Giving granular server privileges; How to do it ... ; How it works ... ; There's more ... ; Allowing logins to run a SQL trace; See also.