473,761 Members | 10,365 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

SQL Server 2000 Audit for login

Is there a way to audit the login on SQL Server 2000? I'm looking for a
way to get a report login/logout events with the name of the database.

Thanks in advance.

Jan 27 '06 #1
3 2059
Take a look at what SQL Profiler has too offer, you could run the trace into
a table, picking up just the login/logoff events.

Tony

--
Tony Rogerson
SQL Server MVP
http://sqlserverfaq.com - free video tutorials
"Jacand4321 " <ja********@yah oo.com> wrote in message
news:11******** **************@ z14g2000cwz.goo glegroups.com.. .
Is there a way to audit the login on SQL Server 2000? I'm looking for a
way to get a report login/logout events with the name of the database.

Thanks in advance.

Jan 27 '06 #2
Thanks Tony for the reply. I'm wondering, if it is going to add any
significant overhead on the database.

Jan 27 '06 #3
Jacand4321 (ja********@yah oo.com) writes:
Thanks Tony for the reply. I'm wondering, if it is going to add any
significant overhead on the database.


As long as you only catch login events, there is not too much overhead.

However, it's better to use a server-side trace and trace to a file, and
this is leaner on resources. Look up the sp_trace procedures in Books
Online.
--
Erland Sommarskog, SQL Server MVP, es****@sommarsk og.se

Books Online for SQL Server 2005 at
http://www.microsoft.com/technet/pro...ads/books.mspx
Books Online for SQL Server 2000 at
http://www.microsoft.com/sql/prodinf...ons/books.mspx
Jan 27 '06 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
3473
by: rob | last post by:
Hello, Newbie of sorts. Been reading up on best practices though. I'm trying to optimize performance to the SQL DB vs. the Web server and an ASP application. I've read that you're supposed to open late/close early which makes sense. In the past I'd created a connection and thrown many queries against the same connection. Now, I'm working with a recordset object which is returned and the ActiveConnection is closed after each query. My...
1
6132
by: Rene | last post by:
We have an SQL server 2000 server with four Intel Xexon cpu's. The version of SQL Server is: Microsoft SQL Server 2000 - 8.00.760 (Intel X86) Dec 17 2002 14:22:05 Copyright (c) 1988-2003 Microsoft Corporation Standard Edition on Windows NT 5.0 (Build 2195: Service Pack 4) This database is an datawarehouse where multiple users are running an combination of small and big (measured in query time) SELECT Queries. The users run these...
2
5167
by: MUHAMAMD SALIM SHAHZAD | last post by:
dear respected gurus, I would like to share ideas...as i learned from you and wish to tell that i had developed the system where i can audit each and every users and their actions(like add/edit/save/cancel/unco) =======================start of modules======================================= Option Compare Database Option Explicit
2
31128
by: Blake Versiga | last post by:
I am pulling my hair out..... I am trying to put a bound data grid on a webform... I have 4 data connections in my server explorer, all of which connect successfully. But when I run the web page I get the error: Login failed for user '(null)'. Reason: Not associated with a trusted SQL Server connection. I use a connection string in my application in several other pages with no
2
2372
by: reycon | last post by:
I have a problem that has been doggin me for 2 days now. I have a web app that needs to access files on another server in the same domain. but nothing that I have tried has allowed the web app access to the files. the system is set up as follows: Server 2: Windows 2000 server contains report files needed by the webapp
8
3434
by: Nils Magnus Englund | last post by:
Hello, I am having trouble using Integrated Windows Authentication between our intranet server and our database server, both of which are on our local domain. Windows authentication works for our intranet server - my domain user "DOM\nme" is correctly authenticated and authorized to view the ASP.NET page on our intranet. The ASP.NET application uses impersonation (<identity impersonate="true"> in Web.config).
9
5451
by: Tim Baley | last post by:
I recently created some intranet web sevices to expose stored procedures on our SQL Servers (SQL2k). The stored procedures include an audit trail with user/login identification, so the web services are set up for Windows integrated authentication. The web sevices work well when they are hosted on IIS on my Win2k Pro development machine. I have tried accessing the services under several user accounts on several machines, including...
1
3040
by: Jacand4321 | last post by:
I'm trying to audit all the database activities using Server-side trace in SQL Server 2000. Basically I need to get the login information (login Id, Login time etc) along with the name of the database.Can some one suggest a way to do that? Thanks in advance. J
2
1315
by: Rob | last post by:
Hi, We have a MS Access front-end connecting to a SQL Server back-end. We use an ODBC connection using NT authentication, however the audit problem we have is that a user has the security to run stored procs outside the app e.g. open a blank Access db, connect to SQL Server using his NT account and create a query. What we want to do is to have the app use 1 SQL Server login, not NT, to connect to the app, however we want to encrypt...
0
9531
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9957
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9775
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8780
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7332
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5229
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
3881
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
3456
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2752
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.