Announcement

Collapse
No announcement yet.

Some Network Security Issues over SQL server:

Collapse

Ads on showthread pages

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • Some Network Security Issues over SQL server:

    WordPress Hosting on SSD Servers
    Some Network Security Issues over SQL server:

    Although your servers may be physically inaccessible, they're most likely connected to a network of some kind. This could be just an isolated company LAN with no outside connections, or it could be a direct connection to the Internet. No matter what the situation, there are some things you need to consider:

    • Ensure that the Windows server has proper network security configured.
    • Decide which network protocols to allow, and disable any that are not required.
    • Ensure there is a firewall set up (such as Windows Firewall) and configure it to allow access to SQL Server (as shown in Figure 1).
    • Decide whether to encrypt connections to SQL Server and configure appropriately.
    • If Kerberos will be used, register a Server Principal Name. Kerberos is an authentication mechanism that underpins Windows authentication but it is poorly understood.
    • Decide whether to use the SQL Server Browser Service to help clients find installed SQL Server instances, and decide whether you want to hide some instances. Hiding an instance means client applications and users will need to know the connection details of the SQL Server instance, but it prevents people from trawling the network to look for SQL Server instances.

  • #2
    ASP.Net Hosting starts @ $3.18/Mo.
    Re: Some Network Security Issues over SQL server:

    To providing the more precise and control to security of data, SQL Server makes significant attachments to the security modal of the data base with the database platform.

    Platform and Network Security

    Physical hardware and networking systems connecting clients to the database servers, as well as the binary files used to process database requests.
    Physical Security
    Best practices for physical security strictly limit access to the physical server and hardware components.

    Comment

    Working...
    X
    Sign up for a News Letter Click here to sign up