Chapter 4. Security

In this chapter, we will cover:

  • Listing SQL Server service accounts
  • Changing SQL Server service accounts
  • Listing authentication mode
  • Changing authentication mode
  • Listing SQL Server log errors
  • Listing failed login attempts
  • Enabling Common Criteria compliance
  • Listing logins, users, and database mappings
  • Listing login/user roles and permissions
  • Creating a user-defined server role
  • Creating a login
  • Assigning permissions and roles to a login
  • Creating a database user
  • Assigning permissions to a database user
  • Creating a database role
  • Fixing orphaned users
  • Creating a credential
  • Creating a proxy

Introduction

PowerShell can help database administrators and developers to automate security tasks. Whether you need to monitor repeated failed login attempts by ...

Get SQL Server 2014 with PowerShell v5 Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.