Join Gerry O'Brien for an in-depth discussion in this video Network security considerations, part of Securing SQL Server 2012.
Your SQL Server instance can be accessed from a variety of different mechanisms.…Users can access SQL Server locally on the computer through some…of the SQL Server tools such as the SQL Server Management Studio.…Users can access your instance remotely across…the network by using these same tools.…Or you may have software developers in the organization who…are accessing a database through the applications that they are writing.…Clients access SQL Server either…locally or over a network connection as the…two typical mechanisms for gaining access to the server.…
In this video we'll take a look at…some of the considerations surrounding your network security.…To start with, once you've installed SQL Server on…a physical machine, it's important to go in and…double check the Window's firewall, or whatever other firewall…software you may have installed on that particular computer.…To ensure that it is configured to allow SQL Server…to function, but while also providing security for that machine as well.…Here, I'm currently in the System and…
- Understanding security best practices
- Managing logins and users
- Understanding how SQL Server checks permissions
- Creating and assigning logins and roles
- Securing SQL on the network