Cargando…

Microsoft SQL server 2012 security cookbook /

Over 70 practical, focused recipes to bullet-proof your SQL Server database and protect it from hackers and security threats.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bruchez, Rudi
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2012.
Colección:Quick answers to common problems.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Microsoft SQL Server 2012 Security Cookbook; Microsoft SQL Server 2012 Security Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Instant Updates on New Packt Books; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Securing Your Server and Network; Introduction; Choosing an account for running SQL Server; How to do it ...
  • How it works ... There's more ... ; How to give the Log on as a service right to an account; How to do it in Windows Server Core; Creating a domain account to use as a service account; See also; Managing service SIDs; How to do it ... ; How it works ... ; Using a managed service account; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Removing a managed account; See also; Using a virtual service account; How to do it ... ; How it works ... ; Encrypting the session with SSL; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Configuring a firewall for SQL Server access.
  • How to do it ... How it works ... ; There's more ... ; Find specific ports used by SQL Server; Do it by script; Disabling SQL Server Browser; How to do it ... ; How it works ... ; There's more ... ; Stopping unused services; How to do it ... ; How it works ... ; Using Kerberos for authentication; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Using extended protection to prevent authentication relay attacks; How to do it ... ; How it works ... ; See also; Using transparent database encryption; How to do it ... ; How it works ... ; There's more ... ; Securing linked server access.
  • How to do it ... How it works ... ; There's more ... ; Configuring endpoint security; How to do it ... ; How it works ... ; There's more ... ; Limiting functionalities
  • xp_cmdshell and OPENROWSET; How to do it ... ; How it works ... ; There's more ... ; You cannot prevent a sysadmin member from using xp_cmdshell; 2. User Authentication, Authorization, and Security; Introduction; Choosing between Windows and SQL authentication; How to do it ... ; How it works ... ; Creating logins; How to do it ... ; How it works ... ; There's more ... ; Checking the state of a login; Disabling a login; Changing a SQL login password.
  • Copying SQL logins between instancesSee also; Protecting your server against brute-force attacks; How to do it ... ; How it works ... ; There's more ... ; Audit sa connection and sa failed connection attempts; See also; Limiting administrative permissions of the SA account; How to do it ... ; How it works ... ; There's more ... ; See also; What to do when you have no administrator account; Using fixed server roles; How to do it ... ; How it works ... ; Giving granular server privileges; How to do it ... ; How it works ... ; There's more ... ; Allowing logins to run a SQL trace; See also.