Quantcast
Channel: SQL Server Security forum
Viewing all 3042 articles
Browse latest View live

Excel 2007 data connection to 2008 R2 -- login failed for user 'domain\username' Token-based server.. eventid: 18456

$
0
0

What settings do I have to set up for a new user to connect to a named instance database with Excel using "From SQL server". I keep getting the message below. I have other users that can connect. I don't know what I am missing. Users are Win7 Office 2007 connecting to SQL 2008 R2.

Many thanks

Login failed for user 'CORP\username'. Reason: Token-based server access validation failed with an infrastructure error. Check for previous errors. [CLIENT: xxx.xxx.xx.xx


sql server 2012 windows authentication mode but serverproperty isintegratedsecurityonly returns 0?

$
0
0

Hi we have a sql server 2012 r2 where we have set authentication mode to Sql server and windows authentication mode.



but when I query the server property

WHEN SERVERPROPERTY('IsIntegratedSecurityOnly') = 0 THEN 'Not Integrated security'

I get

My understanding is that "Sql server and windows authentication mode' is 'integrated security' do I have this wrong?

Do you think this SQL Server exam answer is correct?

$
0
0

Recently I have come across below exam questions for SQL Server 2012.


You administer a Windows Azure SQL Database database named Human_Resources. The database contains 2 tables named Employees and SalaryDetails.

You add two Windows groups as logins for the server:

 

CORPEmployees – All company employees

CORPHRAdmins – HR administrators only

HR Administrators are also company employees.

 

You need to grant users access according to the following requirements:

 

CORPEmployees should have SELECT access to the Employees table.

Only users in CORPHRAdmins should have SELECT access to the SalaryDetails table.

Logins are based only on Windows security groups.

 

What should you do?

 

A.

Create a database role called Employees.

Add CORPEmployees to the db_datareader role.

Add all company employees except HR administrators to the Employees role.

Deny SELECT access to the SalaryDetails table to the Employees role.

B.

Create a database role called HRAdmins.

Add all company employees except HR administrators to the db_datareader role,

Add all HR administrators to the HRAdmins role.

Grant SELECT access to the SalaryDetails table to the HRAdmins role.

Deny SELECT access to the SalaryDetails table to the db_datareader role.

C.

Create two database roles: Employees and HRAdmins.

Add all company employees to the Employees role.

Add HR administrators to the HRAdmins role.

Grant SELECT access to all tables except SalaryDetails to the Employees role.

Grant SELECT access to the SalaryDetails table to the HRAdmins role.

Deny SELECT access to the SalaryDetails table to the Employees role.

D.

Create a database role called Employees.

Add all HR administrators to the db_datareader role.

Add all company employees to the Employees role.

Grant SELECT access to all tables except the SalaryDetails table to the Employees role.

Deny SELECT access to the SalaryDetails table to the Employees role.

 

In the website where I saw this question, the correct answer is provided to be "D". But I definitely think it should be "A" not "D".

The answer is simple. In "D", "Add all company employees to the Employees role" will also add "HRAdmins" to the "Employees" role because the question specifically indicated the HRAdmins are also employees. So later on "Deny SELECT access to the SalaryDetails table to the Employees role" will cause "HRAdmins" to be denied for selecting from  "SalaryDetails" table, too.

Please let me know if my understanding is right?


Convert trace (.TRC) files into Syslog

$
0
0

Hi, 

We have an Audit related requirement in which the auditors want us to send the trace .trc files to a syslog server after converting it into a syslog format.

I just need to know whether it is possible to convert and send? 

The Auditors need it to review schema changes on the DB server.

We are using 'nxlogs' to send the logs.


aa

SQL Server is not shutting down

$
0
0

We are running SQL Server 2012 SP3 on Windows Server 2012 R2.  I am checking our trace files to ensure that when the disk is full, SQL Server will shutdown.  What I am finding, SQL Server is not shutting down when the disk is out of space.  I can stop and start SQL Server Service without any problems.

Attached is the code used to create the custom trace.

Is there any known issues with SQL Server not shutting down to space when it can't generate an audit entry?

DJ

-- Setup Custom Trace for Auditing

print 'Setup Custom Trace for Auditing'

if exists (select * from sys.traces where id = 1 )
   exec sp_trace_setstatus 1, 0
go

if exists (select * from sys.traces where id = 1 )
   exec sp_trace_setstatus 1, 2
go

if exists (select * from sys.objects where name = 'AFMIS_Audit' )
   drop procedure AFMIS_Audit;
go

CREATE PROCEDURE AFMIS_Audit
     with encryption  AS
-- Create a Queue
DECLARE @rc INT
DECLARE @TraceID INT
DECLARE @maxfilesize BIGINT
DECLARE @AFMIS_Audit_log NVARCHAR(128)
DECLARE @SHUTDOWN_ON_ERROR INT
DECLARE @options int
DECLARE @FileCount int = 65
DECLARE @StopTime DateTime = Null

SET @maxfilesize = 1000
SET @options = 6
-- Define custom @AFMIS_Audit_log to path\filename
SET @AFMIS_Audit_log = 'L:\SQL Server\Audit Files\afmisauditlog'

set @AFMIS_Audit_log = @AFMIS_Audit_log + convert(varchar(4),datepart(Year, getDate()))
    if datepart(Month, getdate()) < 10
       begin
          set @AFMIS_Audit_log = @AFMIS_Audit_log + '0' + convert(varchar(2),datepart(Month, getdate()))
       end
    else
       begin
          set @AFMIS_Audit_log = @AFMIS_Audit_log +convert(varchar(2),datepart(Month, getdate()))
       end

    if  datepart(Day, GetDate()) < 10
        begin
           set @AFMIS_Audit_log = @AFMIS_Audit_log + '0' + convert(varchar(2),datepart(Day, GetDate()))
        End
    Else
        begin
            set @AFMIS_Audit_log = @AFMIS_Audit_log + convert(varchar(2),datepart(Day, GetDate()))
        end

    if datepart(hour, GetDate()) < 10
       begin
           set @AFMIS_Audit_log = @AFMIS_Audit_log + '0' + convert(varchar(2),datepart(hour, GetDate()))
       End
    else
       Begin
           set @AFMIS_Audit_log = @AFMIS_Audit_log + convert(varchar(2),datepart(hour, GetDate()))
       End

    If datepart(Minute, GetDate()) < 10
       begin
           set @AFMIS_Audit_log = @AFMIS_Audit_log + '0' + convert(varchar(2),datepart(Minute, GetDate()))
       End
    Else
       begin
          set @AFMIS_Audit_log = @AFMIS_Audit_log + convert(varchar(2),datepart(Minute, GetDate()))
        end

    If datepart(Second, GetDate()) < 10
       begin
           set @AFMIS_Audit_log = @AFMIS_Audit_log + '0' + convert(varchar(2),datepart(Second, GetDate()))
       End
    Else
       begin
          set @AFMIS_Audit_log = @AFMIS_Audit_log + convert(varchar(2),datepart(Second, GetDate()))
       end

EXEC @rc = SP_TRACE_CREATE @TraceID output, @options, @AFMIS_Audit_log, @maxfilesize, @StopTime, @FileCount

IF (@rc != 0) GOTO Error
-- Client side File and Table cannot be scripted.
-- Set the events:

DECLARE @on BIT

SET @on = 1
-- Logins are audited based on SQL Server instance
-- setting Audit Level stored in registry
-- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server\MSSQL.[#]\MSSQLServer\AuditLevel
-- Audit Login
-- Occurs when a user successfully logs in to SQL Server.
EXEC SP_TRACE_SETEVENT @TraceID, 14, 1, @on -- TextData
EXEC SP_TRACE_SETEVENT @TraceID, 14, 6, @on -- NTUserName
EXEC SP_TRACE_SETEVENT @TraceID, 14, 7, @on -- NTDomainName
EXEC SP_TRACE_SETEVENT @TraceID, 14, 8, @on -- HostName
EXEC SP_TRACE_SETEVENT @TraceID, 14, 10, @on -- ApplicationName
EXEC SP_TRACE_SETEVENT @TraceID, 14, 11, @on -- LoginName
EXEC SP_TRACE_SETEVENT @TraceID, 14, 12, @on -- SPID
EXEC SP_TRACE_SETEVENT @TraceID, 14, 14, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 14, 23, @on -- Success
EXEC SP_TRACE_SETEVENT @TraceID, 14, 26, @on -- ServerName
EXEC SP_TRACE_SETEVENT @TraceID, 14, 35, @on -- DatabaseName
EXEC SP_TRACE_SETEVENT @TraceID, 14, 41, @on -- LoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 14, 60, @on -- IsSystem
EXEC SP_TRACE_SETEVENT @TraceID, 14, 64, @on -- SessionLoginName
-- Audit Logout
-- Occurs when a user logs out of SQL Server.
EXEC SP_TRACE_SETEVENT @TraceID, 15, 6, @on -- NTUserName
EXEC SP_TRACE_SETEVENT @TraceID, 15, 7, @on -- NTDomainName
EXEC SP_TRACE_SETEVENT @TraceID, 15, 8, @on -- HostName
EXEC SP_TRACE_SETEVENT @TraceID, 15, 10, @on -- ApplicationName
EXEC SP_TRACE_SETEVENT @TraceID, 15, 11, @on -- LoginName
EXEC SP_TRACE_SETEVENT @TraceID, 15, 12, @on -- SPID
EXEC SP_TRACE_SETEVENT @TraceID, 15, 13, @on -- Duration
EXEC SP_TRACE_SETEVENT @TraceID, 15, 14, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 15, 15, @on -- EndTime
EXEC SP_TRACE_SETEVENT @TraceID, 15, 23, @on -- Success
EXEC SP_TRACE_SETEVENT @TraceID, 15, 26, @on -- ServerName
EXEC SP_TRACE_SETEVENT @TraceID, 15, 35, @on -- DatabaseName
EXEC SP_TRACE_SETEVENT @TraceID, 15, 41, @on -- LoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 15, 60, @on -- IsSystem
EXEC SP_TRACE_SETEVENT @TraceID, 15, 64, @on -- SessionLoginName
-- Audit Server Starts and Stops
-- Occurs when the SQL Server service state is modified.
EXEC SP_TRACE_SETEVENT @TraceID, 18, 6, @on -- NTUserName
EXEC SP_TRACE_SETEVENT @TraceID, 18, 7, @on -- NTDomainName
EXEC SP_TRACE_SETEVENT @TraceID, 18, 8, @on -- HostName
EXEC SP_TRACE_SETEVENT @TraceID, 18, 10, @on -- ApplicationName
EXEC SP_TRACE_SETEVENT @TraceID, 18, 11, @on -- LoginName
EXEC SP_TRACE_SETEVENT @TraceID, 18, 12, @on -- SPID
EXEC SP_TRACE_SETEVENT @TraceID, 18, 14, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 18, 23, @on -- Success
EXEC SP_TRACE_SETEVENT @TraceID, 18, 26, @on -- ServerName
EXEC SP_TRACE_SETEVENT @TraceID, 18, 41, @on -- LoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 18, 60, @on -- IsSystem
EXEC SP_TRACE_SETEVENT @TraceID, 18, 64, @on -- SessionLoginName
-- Audit Login Failed
-- Indicates that a login attempt to SQL Server from a client failed.
EXEC SP_TRACE_SETEVENT @TraceID, 20, 1, @on -- TextData
EXEC SP_TRACE_SETEVENT @TraceID, 20, 6, @on -- NTUserName
EXEC SP_TRACE_SETEVENT @TraceID, 20, 7, @on -- NTDomainName
EXEC SP_TRACE_SETEVENT @TraceID, 20, 8, @on -- HostName
EXEC SP_TRACE_SETEVENT @TraceID, 20, 10, @on -- ApplicationName
EXEC SP_TRACE_SETEVENT @TraceID, 20, 11, @on -- LoginName
EXEC SP_TRACE_SETEVENT @TraceID, 20, 12, @on -- SPID
EXEC SP_TRACE_SETEVENT @TraceID, 20, 14, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 20, 23, @on -- Success
EXEC SP_TRACE_SETEVENT @TraceID, 20, 26, @on -- ServerName
EXEC SP_TRACE_SETEVENT @TraceID, 20, 31, @on -- Error
EXEC SP_TRACE_SETEVENT @TraceID, 20, 35, @on -- DatabaseName
EXEC SP_TRACE_SETEVENT @TraceID, 20, 60, @on -- IsSystem
EXEC SP_TRACE_SETEVENT @TraceID, 20, 64, @on -- SessionLoginName

-- Audit Statement GDR Event
-- Occurs every time a GRANT, DENY, REVOKE for a statement
-- permission is issued by any user in SQL Server.
EXEC SP_TRACE_SETEVENT @TraceID, 102, 1, @on -- TextData
EXEC SP_TRACE_SETEVENT @TraceID, 102, 6, @on -- NTUserName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 7, @on -- NTDomainName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 8, @on -- HostName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 10, @on -- ApplicationName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 11, @on -- LoginName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 12, @on -- SPID
EXEC SP_TRACE_SETEVENT @TraceID, 102, 14, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 102, 19, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 102, 23, @on -- Success
EXEC SP_TRACE_SETEVENT @TraceID, 102, 26, @on -- ServerName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 28, @on -- ObjectType
EXEC SP_TRACE_SETEVENT @TraceID, 102, 34, @on -- ObjectName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 35, @on -- DatabaseName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 37, @on -- OwnerName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 39, @on -- TargetUserName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 40, @on -- DBUserName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 41, @on -- LoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 102, 42, @on -- TargetLoginName
EXEC SP_TRACE_SETEVENT @TraceID, 102, 43, @on -- TargetLoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 102, 60, @on -- IsSystem
EXEC SP_TRACE_SETEVENT @TraceID, 102, 64, @on -- SessionLoginName
-- Audit Object GDR Event
-- Occurs every time a GRANT, DENY, REVOKE for an object
-- permission is issued by any user in SQL Server.
EXEC SP_TRACE_SETEVENT @TraceID, 103, 1, @on -- TextData
EXEC SP_TRACE_SETEVENT @TraceID, 103, 6, @on -- NTUserName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 7, @on -- NTDomainName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 8, @on -- HostName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 10, @on -- ApplicationName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 11, @on -- LoginName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 12, @on -- SPID
EXEC SP_TRACE_SETEVENT @TraceID, 103, 14, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 103, 19, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 103, 23, @on -- Success
EXEC SP_TRACE_SETEVENT @TraceID, 103, 26, @on -- ServerName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 28, @on -- ObjectType
EXEC SP_TRACE_SETEVENT @TraceID, 103, 34, @on -- ObjectName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 35, @on -- DatabaseName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 37, @on -- OwnerName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 39, @on -- TargetUserName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 40, @on -- DBUserName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 41, @on -- LoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 103, 42, @on -- TargetLoginName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 43, @on -- TargetLoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 103, 44, @on -- ColumnPermissions
EXEC SP_TRACE_SETEVENT @TraceID, 103, 59, @on -- ParentName
EXEC SP_TRACE_SETEVENT @TraceID, 103, 60, @on -- IsSystem
EXEC SP_TRACE_SETEVENT @TraceID, 103, 64, @on -- SessionLoginName
-- Audit AddLogin Event
-- Occurs when a SQL Server login is added or removed;
-- for sp_addlogin and sp_droplogin.
EXEC SP_TRACE_SETEVENT @TraceID, 104, 6, @on -- NTUserName
EXEC SP_TRACE_SETEVENT @TraceID, 104, 7, @on -- NTDomainName
EXEC SP_TRACE_SETEVENT @TraceID, 104, 8, @on -- HostName
EXEC SP_TRACE_SETEVENT @TraceID, 104, 10, @on -- ApplicationName
EXEC SP_TRACE_SETEVENT @TraceID, 104, 11, @on -- LoginName
EXEC SP_TRACE_SETEVENT @TraceID, 104, 12, @on -- SPID
EXEC SP_TRACE_SETEVENT @TraceID, 104, 14, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 104, 23, @on -- Success
EXEC SP_TRACE_SETEVENT @TraceID, 104, 26, @on -- ServerName
EXEC SP_TRACE_SETEVENT @TraceID, 104, 35, @on -- DatabaseName
EXEC SP_TRACE_SETEVENT @TraceID, 104, 41, @on -- LoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 104, 42, @on -- TargetLoginName
EXEC SP_TRACE_SETEVENT @TraceID, 104, 43, @on -- TargetLoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 104, 60, @on -- IsSystem
EXEC SP_TRACE_SETEVENT @TraceID, 104, 64, @on -- SessionLoginName
-- Audit Login GDR Event
-- Occurs when a Windows login right is added or removed;
-- for sp_grantlogin, sp_revokelogin, and sp_denylogin.
EXEC SP_TRACE_SETEVENT @TraceID, 105, 6, @on -- NTUserName
EXEC SP_TRACE_SETEVENT @TraceID, 105, 7, @on -- NTDomainName
EXEC SP_TRACE_SETEVENT @TraceID, 105, 8, @on -- HostName
EXEC SP_TRACE_SETEVENT @TraceID, 105, 10, @on -- ApplicationName
EXEC SP_TRACE_SETEVENT @TraceID, 105, 11, @on -- LoginName
EXEC SP_TRACE_SETEVENT @TraceID, 105, 12, @on -- SPID
EXEC SP_TRACE_SETEVENT @TraceID, 105, 14, @on -- StartTime
EXEC SP_TRACE_SETEVENT @TraceID, 105, 23, @on -- Success
EXEC SP_TRACE_SETEVENT @TraceID, 105, 26, @on -- ServerName
EXEC SP_TRACE_SETEVENT @TraceID, 105, 35, @on -- DatabaseName
EXEC SP_TRACE_SETEVENT @TraceID, 105, 41, @on -- LoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 105, 42, @on -- TargetLoginName
EXEC SP_TRACE_SETEVENT @TraceID, 105, 43, @on -- TargetLoginSid
EXEC SP_TRACE_SETEVENT @TraceID, 105, 60, @on -- IsSystem
EXEC SP_TRACE_SETEVENT @TraceID, 105, 64, @on -- SessionLoginName
-- Audit Login Change Property Event
-- Occurs when a property of a login, except passwords,
-- is modified; for sp_defaultdb and sp_defaultlanguage.
EXEC SP_TRACE_SETEVENT @TraceID, 106, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 106, 64, @on
-- Audit Login Change Password Event
-- Occurs when a SQL Server login password is changed.
-- Passwords are not recorded.
EXEC SP_TRACE_SETEVENT @TraceID, 107, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 107, 64, @on
-- Audit Add Login to Server Role Event
-- Occurs when a login is added or removed from a fixed server role;
-- for sp_addsrvrolemember, and sp_dropsrvrolemember.
EXEC SP_TRACE_SETEVENT @TraceID, 108, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 38, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 108, 64, @on
-- Audit Add DB User Event
-- Occurs when a login is added or removed as a database user
-- (Windows or SQL Server) to a database; for sp_grantdbaccess,
-- sp_revokedbaccess, sp_adduser, and sp_dropuser.
EXEC SP_TRACE_SETEVENT @TraceID, 109, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 21, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 38, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 39, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 44, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 51, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 109, 64, @on
-- Audit Add Member to DB Role Event
-- Occurs when a login is added or removed as a database user
-- (fixed or user-defined) to a database; for sp_addrolemember,
-- sp_droprolemember, and sp_changegroup.
EXEC SP_TRACE_SETEVENT @TraceID, 110, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 38, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 39, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 110, 64, @on
-- Audit Add Role Event
-- Occurs when a login is added or removed as a database user to a
-- database; for sp_addrole and sp_droprole.
EXEC SP_TRACE_SETEVENT @TraceID, 111, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 38, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 111, 64, @on
-- Audit App Role Change Password Event
-- Occurs when a password of an application role is changed.
EXEC SP_TRACE_SETEVENT @TraceID, 112, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 38, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 112, 64, @on
-- Audit Statement Permission Event
-- Occurs when a statement permission (such as CREATE TABLE) is used.
EXEC SP_TRACE_SETEVENT @TraceID, 113, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 19, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 113, 64, @on
-- Audit Backup/Restore Event
-- Occurs when a BACKUP or RESTORE command is issued.
EXEC SP_TRACE_SETEVENT @TraceID, 115, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 115, 64, @on
-- Occurs when DBCC commands are issued.
EXEC SP_TRACE_SETEVENT @TraceID, 116, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 44, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 116, 64, @on
-- Audit Change Audit Event
-- Occurs when audit trace modifications are made.
EXEC SP_TRACE_SETEVENT @TraceID, 117, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 44, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 117, 64, @on
-- Audit Object Derived Permission Event
-- Occurs when a CREATE, ALTER, and DROP object commands are issued.
EXEC SP_TRACE_SETEVENT @TraceID, 118, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 118, 64, @on
-- Audit Database Management Event
-- Occurs when a CREATE, ALTER, or DROP statement executes on
-- database objects, such as schemas.
EXEC SP_TRACE_SETEVENT @TraceID, 128, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 128, 64, @on
-- Audit Database Object Management Event
-- Occurs when a CREATE, ALTER, or DROP statement executes on
-- database objects, such as schemas.
EXEC SP_TRACE_SETEVENT @TraceID, 129, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 129, 64, @on
-- Audit Database Principal Management Event
-- Occurs when principals, such as users, are created, altered, or
-- dropped from a database.
EXEC SP_TRACE_SETEVENT @TraceID, 130, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 130, 64, @on
-- Audit Schema Object Management Event
-- Occurs when server objects are created, altered, or dropped.
EXEC SP_TRACE_SETEVENT @TraceID, 131, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 59, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 131, 64, @on
-- Audit Server Principal Impersonation Event
-- Occurs when there is an impersonation within server scope, such
-- as EXECUTE AS LOGIN.
EXEC SP_TRACE_SETEVENT @TraceID, 132, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 132, 64, @on
-- Audit Database Principal Impersonation Event
-- Occurs when an impersonation occurs within the database scope,
-- such as EXECUTE AS USER or SETUSER.
EXEC SP_TRACE_SETEVENT @TraceID, 133, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 38, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 133, 64, @on
-- Audit Server Object Take Ownership Event
-- Occurs when the owner is changed for objects in server scope.
EXEC SP_TRACE_SETEVENT @TraceID, 134, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 39, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 134, 64, @on
-- Audit Database Object Take Ownership Event
-- Occurs when a change of owner for objects within database scope
-- occurs.
EXEC SP_TRACE_SETEVENT @TraceID, 135, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 39, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 135, 64, @on
-- Audit Change Database Owner
-- Occurs when ALTER AUTHORIZATION is used to change the owner of a
-- database and permissions are checked to do that.
EXEC SP_TRACE_SETEVENT @TraceID, 152, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 39, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 152, 64, @on
-- Audit Schema Object Take Ownership Event
-- Occurs when ALTER AUTHORIZATION is used to assign an owner to an
-- object and permissions are checked to do that.
EXEC SP_TRACE_SETEVENT @TraceID, 153, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 39, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 59, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 153, 64, @on
-- Audit Server Scope GDR Event
-- Indicates that a grant, deny, or revoke event for permissions in
-- server scope occurred, such as creating a login.
EXEC SP_TRACE_SETEVENT @TraceID, 170, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 19, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 170, 64, @on
-- Audit Server Object GDR Event
-- Indicates that a grant, deny, or revoke event for a schema object,
-- such as a table or function, occurred.
EXEC SP_TRACE_SETEVENT @TraceID, 171, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 19, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 171, 64, @on
-- Audit Database Object GDR Event
-- Indicates that a grant, deny, or revoke event for database
-- objects, such as assemblies and schemas, occurred.
EXEC SP_TRACE_SETEVENT @TraceID, 172, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 19, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 39, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 172, 64, @on
-- Audit Server Operation Event
-- Occurs when Security Audit operations such as altering settings,
-- resources, external access, or authorization are used.
EXEC SP_TRACE_SETEVENT @TraceID, 173, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 173, 64, @on
-- Audit Server Alter Trace Event
-- Occurs when a statement checks for the ALTER TRACE permission.
EXEC SP_TRACE_SETEVENT @TraceID, 175, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 175, 64, @on
-- Audit Server Object Management Event
-- Occurs when server objects are created, altered, or dropped.
EXEC SP_TRACE_SETEVENT @TraceID, 176, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 45, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 46, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 176, 64, @on
-- Audit Server Principal Management Event
-- Occurs when server principals are created, altered, or dropped.
EXEC SP_TRACE_SETEVENT @TraceID, 177, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 39, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 42, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 43, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 45, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 177, 64, @on
-- Audit Database Operation Event
-- Occurs when database operations occur, such as checkpoint or
-- subscribe query notification.
EXEC SP_TRACE_SETEVENT @TraceID, 178, 1, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 6, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 7, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 8, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 10, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 11, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 12, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 14, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 23, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 26, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 28, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 34, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 35, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 37, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 40, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 41, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 60, @on
EXEC SP_TRACE_SETEVENT @TraceID, 178, 64, @on

-- Set the Filters.
DECLARE @intfilter INT
DECLARE @bigintfilter bigint
-- Set the trace status to start.

EXEC SP_TRACE_SETSTATUS @TraceID, 1
-- Display trace ID for future references.
SELECT TraceID = @TraceID
GOTO Finish

Error:
SELECT ErrorCode = @rc

Finish:
GO
EXEC SP_PROCOPTION 'AFMIS_Audit', 'startup', 'true'
GO

EXEC AFMIS_Audit
go


Manage Logins in SQL Server

$
0
0

Hi I may need some guidelines on Implementing Security in SQL Server Environment, right now i feel like we dont have best practice in our environment.

When ever a new Person joins the company, he/she  is added to AD, and then I create a SQL login and give read/write permissions to a database and if required i will restrict to just select (read only) on few tables.

What i am thinking is , when ever a new Person joins the company, he/she  is added to AD, then all i want to do is add him/her to a group in SQL (NOT in AD) or  add to a user defined server role, so that i have control on giving specific permissions instead of Adding them to a specific group in AD( ex: SQL_Developers).

I read about User defined Server roles but never worked on it, how is that works?

is it best practice to create a windows group in AD and add members to it via AD ? but here i will not have control of AD

or 

Create a group in SQl Server and i add members to it

or 

is there a way to create a Group in Windows AD and then ADD member to it via SQL  Server instead of AD?

Please share your thoughts 

having trouble removing account from SQL server of someone who has left.

$
0
0

Hi need some help, I need to remove an account of someone who has left, from our sql servers.

its saying I have to revoke the permissions before dropping the server principal.

I have ran a script to find out what permissions have been granted.

the output is

class   105

class_desc ENDPOINT

Major_ID 65536

Minor Id 0

Grantee_principal_ID 269

Grantor_principal_ID 259

type CO

Permission_Name CONNECT

state G

State_desc GRANT

I am lost what todo next ?? any help appricated.

Thanks

Mark

The target principal name is incorrect. Cannot generate SSPI context. (Microsoft SQL Server, Error: 0)

$
0
0

Hi Everybody,

I got this message when I try to connect SQL Server with windows authentication.

When I try the setspn -x -f command

it found 0 group of duplicate SPNs

I read a lot of articles about this issue but no solution find.

Thanks for your help.

David


Hide database names from unauthroized users in SSMS

$
0
0

If a user is not authorized to see a database can I exclude that database from even appearing in Management Studio for that user

 

TIA,

 

Barkingdog

 

 

TDE Encryption_State = 2 But Percentage = 0 For A Long Time On A Small DB & Recycling Keys

$
0
0

Hello,

I wanted to recycle some encryption keys so I went through to completely remove TDE and recreate it on the DBs.  This is probably the 'hard' way to do it, but wasn't sure what the best way to do it to ensure it works completely.  If someone has a better idea on how to do that feel free to let me know on the best way to recycle keys.

Main issue I want to resolve is that 1 DB shows a encryption_state of 2 and percentage -.  I am not able to execute a SET ENCRYPTION OFF as I get this error:

Msg 33109, Level 16, State 1, Line 2
Cannot disable database encryption while an encryption, decryption, or key change scan is in progress.
Msg 5069, Level 16, State 1, Line 2
ALTER DATABASE statement failed.

Other DBs are fine, 1 already worked.  Any thoughts?  Thanks.

Edit: DBCC CHECKDB returns 0 errors.

Edit 2:  
-I'd rather not restart the service/de-attach reattach the DB if possible. Trying to avoid any downtime but if we need to, then we need to.

Edit 3:
ALTER DATABASE x SET ENCRYPTION ON says 'command completed' but it stays at 0% and still stuck on state 2.


SQL SERVER SECURITY Update KB2977321 and KB2716436 Error Code 1642

$
0
0

I had gone through some of the related question that has been shared over here but since for me there was a definite Error Pop up statingSQL SERVER SET UP FAILER "NT Service Unable to start MSSQLSERVER" but i noticed that after each of the update the version had changed and the database is running normally, just want to confirm if the updates are working fine or some other measures has to be taken.

I Ran the discovery report and it shows the latest version

Can i take this as a successfull installation and no issues will occur?

Please suggest.

Social Security Numbers

$
0
0

Hi All.  I have an mvc application.  In my mvc application I have a model with a Social Security Number property.  To make sure the user enters in the correct format, I have a regular expression that looks like the following...

 [RegularExpression(@"^\d{3}[-. ]\d{2}[-. ]\d{4}$", ErrorMessage = "Invalid Social Security Number")]

I would like to encrypt the ssn once it passes through the model and goes into the database.  Is there some way I can automatically do this in sql server 2008 while still using this regular expression?  And then when we do need the ssn, a way to decrypt it?

Create failed for Login

$
0
0

I have a Windows Server 2008 R2 new clean install , not a VM, that I have added to a Windows Server 2003 based domain using my account which has domain admin rights. I performed a clean install of SQL Server 2008 R2 using my account which has domain admin rights. The installation completed without any errors. I logged into SSMS and attempted to add another domain account by clicking Search, Advanced and finding the user in the domain. When I return to the "Dialog - New" window and click OK I receive the following error:

Create failed for Login 'Domain\User'.  (Microsoft.SqlServer.Smo)

An exception occurred while executing a Transact-SQL statement or batch. (Microsoft.SqlServer.ConnectionInfo)

Windows NT user or group 'Domain\User' not found. Check the name again. (Microsoft SQL Server, Error: 15401)

I have verified that the firewall is off, tried adding a different domain user, tried using SA to add a user, installed the hotfix for KB976494 and verified that the Local Security Policy for

Domain Member: Digitally encrypt or sign secure channel

Domain Member: Digitally encrypt secure channel

Domain Member: Digitally sign secure channel

were disabled none of which have made a difference. I can RDP to a Server 2003 server running SQL 2008 and add the same domain user without issue.

 

 

TDE Alternatives for 2008 R2 Standard Edition

$
0
0

We have a number of SQL Server 2008 R2 Standard Edition installations on Windows Server 2008R2.  I need to protect the data at rest - i.e., encrypt the data and log files.  TDE would have been the ideal choice, but Standard Edition does not support TDE.

Can you recommend any alternatives?  One product I saw is DBDefence, but I could find practically no reviews or comments about it, good or bad.  Regardless, the thought of interjecting a third party tool between Windows OS and SQL OS sounds scary to me.

What do people normally do in this situation? Do they bite the bullet and get Enterprise Edition? Or do they use Bitlocker or something similar where the drive itself is encrypted?  Does SQL Server even work in a bitlocker environment?

Any help/suggestions would be welcome.  Thank you.

SYSTEM suddenly changed to ANONYMOUS LOGON after update

$
0
0

After installing recent windows updates on a server, a script that accessed SQL server from the SYSTEM account suddenly gets rejected with "Msg 18456 ... ANONYMOUS LOGON".  This is a much simpler scenario than what I have seen in other threads.

There is no domain, this is a standalone server outside the firewall.

This is not really a network access, everything happens on one server.

Both server OS and SQL Server are version 2008 R2.

This access is from a scheduled task (Windows Scheduler, AT command) running as Local System .

A similar machine which hasn't received the same Windows updates doesn't fail.

Here is a simplified proof-of-concept batch file demonstrating the problem:

------- Typed this in because IE refuses to let me paste in this forum -------
SET COMPUTER >%TMP%\testout.txt 2>&1
SET USER >>%TMP%\testout.txt 2>&1
whoami >>%TMP%\testout.txt 2>&1
sqlcmd -Q "USE master;" >>%TMP%\testout.txt 2>&1
------- End of file -------

Ran this with the command

AT hh:mm "C:\Windows\Temp\test.bat"

and then waited until hh:mm to grab testout.txt.

Output on computer where this fails (I replaced computer name with BAD and workgroup name with CONTOSO):

------- Typed this in because IE refuses to let me paste in this forum -------
COMPUTERNAME=BAD
USERDOMAIN=CONTOSO
USERNAME=BAD$
USERPROFILE=C:\Windows\system32\config\systemprofile
nt authority\system
Msg 18456, Level 14, State 1, Server BAD, Line 1
Login failed for user 'NT AUTHORITY\ANONYMOUS LOGON'.
------- End of file -------

Output on very similar computer with fewer windows updates applied (I replaced computer name with GOOD and workgroup name with CONTOSO):

------- Typed this in because IE refuses to let me paste in this forum -------
COMPUTERNAME=GOOD
USERDOMAIN=CONTOSO
USERNAME=GOOD$
USERPROFILE=C:\Windows\system32\config\systemprofile
nt authority\system
Changed database context to 'master'.
------- End of file -------



backup strategy over the network

$
0
0

We have situation where i want to take a backup to the Network share path

SQL Service is running on local account or a domain account e.g domain\contoso

since we have a different SQL Service accounts running for different servers,  we cannot add all the accounts to the network path

so we crated an domain account e.g. domain\myaccount, and grated the permissions for this account in the network path 

so is there a way without creating proxy or credential, i can create a mapped drive using the domain account domain\myaccount (good if we dont use the passwords, as our password will be changing)

or else is there any Backup good strategywhere we want to store all the backup over the network using a domain account and keeping in mind that we dont have to change passwords as we change passwords frequently

SQL Connection Error in Build

$
0
0

Initialization method.Project.FetchQuestionDetailsTests.test threw exception.System.Data.Entity.Core.EntityException: System.Data.Entity.Core.EntityException: The underlying provider failed on Open. ---> System.Data.SqlClient.SqlException: A network-related or instance-specific error occurred while establishing a connection to SQL Server. The server was not found or was not accessible. Verify that the instance name is correct and that SQL Server is configured to allow remote connections. (provider: SQL Network Interfaces, error: 50 - Local Database Runtime error occurred. Error occurred during LocalDB instance startup: SQL Server process failed to start. ).

I am getting this error in my build because of the fail of Unit tests due to the above reasons.

Please give an answer.

Encoded sa hash

$
0
0

Hello forum,

I tried to recover the sa password using this statement: SELECT password_hash FROM sys.sql_logins where name='sa'.

The problem occurs when the SELECt statement finishes and shows me this string (just an example): &#x2;&#x0;Žjð×4©ãfdŒ`&#x11;&#x19;ï_€CRŽ•&#x7;Š©-&#x10;éq]¶F6i )ø$.

As you can see this is not the proper hash, maybe am I wrong in my select?, or how can I revover the proper hash?. I am using SQL Server 2012.

Thank you

Cross Platform Password Methods

$
0
0

Hi,

I am use to MySQL and moving my databse to SQL Server but my web applications will remain on PHP.

I want to know what's the best method to store user login password in my portal_users table and can be used in PHP?

Thanks,

Jassim

Transparent Data Encryption (TDE) stuck in State 2 – Encryption in Progress

$
0
0

I am using SQL server 2012 11.0.5592.0  Enterprise Edition 64-bit , VM, netapp SAN

When trying to  use TDE, run ALTER DATABASE <name> SET ENCRYPTION ON then get this error. "Database Encryption scan for database <name> was aborted. Reissue ALTER DB to resume the scan".

DBCC CHECKDB and querying msdb.dbo.suspect_pages showed no corruption,

Rerun ALTER DATABASE <name> SET ENCRYPTION ON

get the same error: "Database Encryption scan for database <name> was aborted. Reissue ALTER DB to resume the scan".

Try the following site, and no luck:

http://blogs.msdn.com/b/samlester/archive/2015/06/23/transparent-data-encryption-tde-stuck-in-state-2-encryption-in-progress.aspx

http://www.sqlballs.com/2012/08/database-corruption-transparent-data.html

Thanks million


Viewing all 3042 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>