Security Questions: Removing Logins From Databases

As I mentioned in the introductory post, during the Introduction to SQL Server Security session for Pragmatic Work's Training on the T's, I received a large number of questions that there wasn't time to answer.  Instead of just a re-cap of all of the questions, instead I've opted to put together a post per topic.  Hopefully, this will … Continue reading Security Questions: Removing Logins From Databases

Security Questions: Server Role Tips

As I mentioned in the introductory post, during the Introduction to SQL Server Security session for Pragmatic Work's Training on the T's, I received a large number of questions that there wasn't time to answer.  Instead of just a re-cap of all of the questions, instead I've opted to put together a post per topic.  Hopefully, this will … Continue reading Security Questions: Server Role Tips

Security Questions: Logins, Credentials, and Proxies

As I mentioned in the introductory post, during the Introduction to SQL Server Security session for Pragmatic Work's Training on the T's, I received a large number of questions that there wasn't time to answer.  Instead of just a re-cap of all of the questions, instead I've opted to put together a post per topic.  Hopefully, this will … Continue reading Security Questions: Logins, Credentials, and Proxies

Security Questions: Logins Not In Use

As I mentioned in the introductory post, during the Introduction to SQL Server Security session for Pragmatic Work's Training on the T's, I received a large number of questions that there wasn't time to answer.  Instead of just a re-cap of all of the questions, instead I've opted to put together a post per topic.  Hopefully, this will … Continue reading Security Questions: Logins Not In Use

Security Questions: Prioritizing Security

As I mentioned in the introductory post, during the Introduction to SQL Server Security session for Pragmatic Work's Training on the T's, I received a large number of questions that there wasn't time to answer.  Instead of just a re-cap of all of the questions, instead I've opted to put together a post per topic.  Hopefully, this will … Continue reading Security Questions: Prioritizing Security

Try out SQL Server 2014 CTP1 on Windows Azure

When SQL Server 2014 CTP 1 was announced last week, I was on it and getting ready to download within a half hour of hearing about it.  I quickly ran into a small issue.  I didn't have a machine prepped for the install.  There's no way I would install a CTP on my laptop, I've been … Continue reading Try out SQL Server 2014 CTP1 on Windows Azure

Install Windows Server 2012 on VMWare Workstation 8

Sometimes we try an do things that just shouldn't work.  Maybe they aren't supported or there technology isn't designed for that type of activity.  Whatever the reason, we tend to do this every so often, adding even more gusto to the task when people tell us that it can't be done.  Low and behold, I … Continue reading Install Windows Server 2012 on VMWare Workstation 8

July 2013 – Monthly SQL Server Checklist

First Monday of the month and time to update the monthly SQL Server checklist.  Monthly SQL Server checklist, you ask?  Oh yes, if you aren't in the habit, you and your co-workers should really be doing this. Checking your SQL Server environment is about making sure that things that can go wrong, don't go wrong. … Continue reading July 2013 – Monthly SQL Server Checklist

Security Questions: Migrate Logins Between Servers

As I mentioned in the introductory post, during the Introduction to SQL Server Security session for Pragmatic Work's Training on the T's, I received a large number of questions that there wasn't time to answer.  Instead of just a re-cap of all of the questions, instead I've opted to put together a post per topic.  Hopefully, this will … Continue reading Security Questions: Migrate Logins Between Servers