Summary

In this chapter, you learned about the best practices related to SQL Server 2008 security. First, you learned about the importance of creating security baselines and the tools available for creating them. These tools included the GPO Accelerator, the Security Templates and Security Configuration and Analysis snap-ins, and the Security Configuration Wizard.

Next, you learned about the actions required to implement the best practice of least privilege. These actions included implementing proper authorization schemes, using credentials, and understanding ownership chains. From here, you moved on to auditing SQL Server. You learned about SQL Server Audits, event notifications, DDL triggers, and logon triggers.

You also learned about surface ...

Get SQL Server® 2008 Administration: Real World Skills for MCITP Certification and Beyond now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.