Join Gerry O'Brien for an in-depth discussion in this video Securing network protocols, part of Securing SQL Server 2012.
Securing your network protocols involves a couple of different tool sets.…Configuring protocols for incoming and outgoing connections on SQL…Server is done through the SQL Server Configuration Manager.…However, depending on the network infrastructure that…you have set up in your organization.…Configuring incoming and outgoing connections will…also be done on the firewall.…Due to the amount of different types of firewall…software and hardware products on the market today, this lesson will not discuss…how to open or close connections or ports on the specific firewall products.…
It's important for you to understand those…firewalls or work closely with your network administrator…to ensure that the necessary ports for…SQL Server are available on those firewall products.…Instead in this lesson, we'll focus on how…to use SQL Server Configuration Manager to configure…these SQL Server Network Configuration and the SQL Native Client Configuration.…The first thing we'll focus on is our SQL Server Network Configuration.…
- Understanding security best practices
- Managing logins and users
- Understanding how SQL Server checks permissions
- Creating and assigning logins and roles
- Securing SQL on the network