Part 2 of 20 How to create an audit to monitor the creation, modification and deletion of Jobs in SQL Server June 5, 2015 4 min read Continue reading
Part 3 of 20 How to create an audit trigger to log object manipulation in SQL Server July 18, 2015 6 min read Continue reading
Part 4 of 20 SQL Server - How to Implement Login Audit and Control (Logon Trigger) July 19, 2015 9 min read Continue reading
Part 5 of 20 monitorar-operacoes-de-ddl-e-dcl-utilizando-a-fn_trace_gettable-do-sql-server Continue reading
Part 6 of 20 utilizando-o-trace-padrao-do-sql-server-para-auditar-eventos-fn_trace_gettable Continue reading
Part 7 of 20 SQL Server - Audit Trigger for Permissions and Privileges at Database and Instance Level (GRANT / REVOKE) July 19, 2017 2 min read Continue reading
Part 8 of 20 SQL Server - How to monitor and audit data changes in tables using Change Data Capture (CDC) February 7, 2018 9 min read Continue reading
Part 9 of 20 SQL Server 2016 - How to "travel through time" using Temporal Tables February 9, 2018 8 min read Continue reading
Part 10 of 20 SQL Server - How to Use Auditing to Map Real Required Permissions for a User January 20, 2019 8 min read Continue reading
Part 11 of 20 SQL Server - Trigger to Prevent and Block Changes in Tables February 4, 2018 3 min read Continue reading
Part 12 of 20 SQL Server - How to create a data change history for your tables (audit logs) July 17, 2016 7 min read Continue reading
Part 13 of 20 SQL Server - How to avoid brute force attacks on your database February 11, 2019 21 min read Continue reading
Part 14 of 20 SQL Server - Security Checklist - A stored procedure with more than 70 security items to validate your database May 12, 2019 4 min read Continue reading
Part 15 of 20 SQL Server - How to Find the Last Login Date of a User November 9, 2020 9 min read Continue reading
Part 16 of 20 SQL Server - How to avoid and protect yourself from Ransomware attacks, like WannaCry, on your database server February 12, 2019 10 min read Continue reading
Part 17 of 20 SQL Server - Beware of the SecurityAdmin Server Role: Using Privilege Escalation to Become Sysadmin April 18, 2022 5 min read Continue reading
Part 18 of 20 SQL Server - How to avoid SQL Injection? Stop using Dynamic Query with EXEC(@Query). Now. February 24, 2019 16 min read Continue reading
Part 19 of 20 SQL Server - Understanding the Risks of the TRUSTWORTHY Property Enabled in a Database February 24, 2019 7 min read Continue reading
Part 20 of 20 SQL Server - Password Policies: Expiration, Mandatory Change and Login Lockout After N Attempts May 21, 2022 11 min read Continue reading