There are several ways that you can secure SQL Server, including: Enabling authentication and authorization: This helps ensure that only authorized users can access the SQL Server instance and the data it stores. Encrypting data: Encrypting data can help protect it from being accessed by unauthorized users, even if it is stolen or compromised. Using firewalls: Firewalls can help block …

Securing SQL Server: Basic Security Measures Read more »

In a Microsoft SQL Server database, several components can become corrupt, including: * Data pages: Data pages store the actual data in a SQL Server database. Corruption can occur in these pages if the data becomes inconsistent or is written to disk incorrectly. * Index pages: Index pages provide an optimized way to access data in a SQL Server database. …

SQL Server Corruption: What Can Get Corrupted Read more »

The Hide Instance option in SQL Server allows you to hide a specific instance of SQL Server from the list of available instances on the network. This can be useful for security purposes, as it can help to reduce the attack surface of your SQL Server installation by making it more difficult for attackers to discover the existence of the …

Securing SQL Server: Hide Instance Server Setting Read more »

There are many ways to increase SQL performance, some of the most common and effective include: It’s worth noting that these methods are not mutually exclusive, and the best approach will depend on the specific needs of your application and the characteristics of your dataset. Learn the techniques to boost your SQL performance……….. With our FREE SQL Server Performance Tuning Email …

Ways to Increase SQL Server Performance Read more »

There are several methods you can use to detect corruption in your Microsoft SQL Server database: * Use the DBCC CHECKDB command: The DBCC CHECKDB command is a database consistency checker that scans the entire database and its associated objects to identify and report any corruption. Running DBCC CHECKDB is the most comprehensive way to detect corruption in your SQL …

SQL Server Corruption: How To Detect Corruption Read more »

Each month we report on the most common waits that we see reported by our daily monitoring customers. All the data is sanitized, so there is no private client information to expose here. For this month, here are the details. CXPACKET PREEMPTIVE_OS_PIPEOPS ASYNC_NETWORK_IO SP_SERVER_DIAGNOSTICS_SLEEP OLEDB MEMORY_ALLOCATION_EXT XE_LIVE_TARGET_TVF LCK_M_SCH_S CXCONSUMER LCK_M_SCH_M Our daily monitoring product scans your SQL Server hourly and …

Common Waits Reported by Daily Monitoring This Month Read more »

CLR (Common Language Runtime) is a feature of SQL Server that allows you to create and run managed code within the database engine. Enabling CLR on SQL Server allows you to create stored procedures, triggers, and functions using languages such as C# and VB.NET. The “CLR strict security” option is an important security feature of CLR that allows you to …

Securing SQL Server: Securing CLR Read more »