In this article, I have shown how to use the power of custom server roles to help reduce your administration time. The custom security role is like using a security group to grant a bunch of people the same sets of permissions.
This article shows how to audit the logon events for SQL Server 2012 and beyond through the use of XEvents.
This article takes us to the edge with a couple of CRM related errors after changing the service account to a more secure Managed Service Account. Despite the CRM reports working properly within Report Manager (via SSRS), the reports would fail in CRM.
This article takes a look at an error that may occur depending on your use of linked servers and the use of openrowset.
So you come along one day to validate some service configurations for the SQL Server services and instead of the SQL Server Configuration Manager opening as expected, you are greeted with the following error message.
Cannot connect to WMI provider. You do not have permission or the server is unreachable.
Explore how to avoid unwanted results that oft occur due to lack of attention to detail, use of internet examples, misunderstanding of the requirements; and always from granting way too much access.
With a little planning and care, we can find various ways to fulfill user requests without compromising the environment.
Planning to upgrade/migrate requires a fair amount of prep work. Some of that prep work involves auditing your server for any users that may still be using the instance.
Quality data is a goal we all strive to attain. Nobody wants to have bad data. Yet, despite our best efforts, the problem of bad data has its way of presenting itself over and over again.
There are multiple ways of retrieving data from a table when you have a list of values. This article explores the use of the table value constructor.