![]() ![]() ![]() Imagine which user you tried most to use to access my bank? After a few days, I saw in the SQL Server error log that they were already trying to break into my base. In fact, this is one of the security items of the FREE SQL Server Checkup that Fabrício Lima is offering to want to know the company.įor a few days I left public for the Web, an instance of SQL Server and Power BI Report Server to do some testing. ![]() As I had already commented in the article SQL Server - How to enable / enable sa user, it is a good security practice to keep the “sa” user deactivated and renamed, since that user is in the role sysadmin (cannot be removed), cannot be deleted from the instance and is a standard user, that is, is present on any instance of SQL Server, making that user the preferred target for potential attackers. In this article, I would like to extend the security theme a little and share with you how to disable the “sa” login minimizing impacts. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |