473,385 Members | 1,357 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

SQL Security related

We had been running SQL Server without any control of security (since
the company is very small -100 employees). All of us know the admin
password and has been accessing the database as admin. Our database
server crashed due to hardware failure twice last month and we lost a
lot of important data. Now the management is taking the control of
server access seriously.

SQL Enterprise manager is installed on many PCs and any one can delete
any database with a right click.

My question is:

1. Can the enterprise manager be installed on client's PC with a
limited right (or as a user not as admin)?
We need to limit the user's access of using the Enterprise Manager.
In other words, how can we set this up for different users.
2. How can we keep running SQL Server if one server fails?
Clustering or Replication or Mirroring? O
I would highly appreciate if you could direct me to any website or
resources on how to set up security of SQL Server (2000 with the latest
service pack).
Thanks a million in advance.
Best regards,

Mamun

Aug 11 '05 #1
2 1140
Enterprise Manager runs with whatever permissions are assigned to the
login specified when you register the server in EM on each machine.

If everyone is logging in as SA then you should make everyone
re-register their servers in EM using different logins - either SQL
Server or Integrated (domain) logins. Then change the SA password. I
suggest you use Integrated security if you can. Assign users to domain
groups according to what level of access they need, then assign roles
to those groups.

For high availability options see:
http://www.microsoft.com/sql/techinf...ilability.mspx

--
David Portas
SQL Server MVP
--

Aug 11 '05 #2
microsoft.public.dotnet.languages.vb (ma******@hotmail.com) writes:
We had been running SQL Server without any control of security (since
the company is very small -100 employees). All of us know the admin
password and has been accessing the database as admin. Our database
server crashed due to hardware failure twice last month and we lost a
lot of important data.
Sounds as if you need to review your backup strategy.
2. How can we keep running SQL Server if one server fails?
Clustering or Replication or Mirroring? O


Clustering, log-shipping and replication are all possible to use for
high-availability solutions. Clustering is the most heavy-duty, but
also requires more money for hardware. And you need Enterprise Edition
of SQL Server.

Log shipping is leaner, but still requires Enterprise, if you want to do
it simple. (It's possible to do log shipping with Standard, but you need
to roll your own.)

Replication is definitely the low-budget solution. The main purpose of
replication is not to provide high availability, but it can be used for
this aim.

Some of the articles on
http://www.microsoft.com/technet/pro.../dbengine.mspx
may be useful to you.

--
Erland Sommarskog, SQL Server MVP, es****@sommarskog.se

Books Online for SQL Server SP3 at
http://www.microsoft.com/sql/techinf...2000/books.asp

Aug 11 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

28
by: grahamd | last post by:
Who are the appropriate people to report security problems to in respect of a module included with the Python distribution? I don't feel it appropriate to be reporting it on general mailing lists.
11
by: TC | last post by:
Hello All, I have recently had the pleasure of installing Norton Internet Security 2005 and finding that I can no longer create or open a web-based application in Visual Studio .Net. The IDE...
12
by: A.M. | last post by:
Hi at all, how can I do to insert into a HTML page a file .txt stored in the same directory of the server where is the html file that must display the text file.txt? Thank you very much P.Pietro
2
by: Matt Theule | last post by:
Where can I find information about Runtime Security Policies? I have a winform that is hosted in a webform that needs to access the filesystem. Using the Configuration mmc snapin, I have created a...
5
by: Norsoft | last post by:
I have a .Net 1.1 application which is downloaded into an aspx page. It is a dll which inherits from System.Windows.Forms.UserControl. It works fine on a PC with only the 1.1 Framework. However,...
7
by: Magdelin | last post by:
Hi, My security team thinks allowing communication between the two IIS instances leads to severe security risks. Basically, we want to put our presentation tier on the perimeter network and the...
3
by: Velvet | last post by:
I ran FxCop on one of the components for my web site and the security rules what me to add " tags like the ones listed below: This breaks my ASP.NET application. So my question is,...
6
by: google | last post by:
I have a few general questions. I am working on a new database to be used within my company. I would like to give a couple of people, particularly HR, the ability to add and delete Access users,...
2
by: ThunderMusic | last post by:
hi, I have 2 services running, one doing a job and the other monitoring the job is done and that the other service (the one doing the job) is still running. The thing is, the 1st service fire some...
3
by: Manish | last post by:
I think this question has been asked number of times. However, I am looking for some specific information. Perhaps some of you can help close the gap. Or perhaps you can point me towards right...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.