There are many things that can cause slowdowns in SQL Server, such as resources like disk, memory, and network. But the one place where database...
database-tools
Analyze deadlocking for SQL Server
Deadlocking is a common problem that can occur in an SQL Server database. This is like blocking. But instead of being blocked forever, SQL Server...
Analyze blocking for SQL Server
Blocking is a normal activity that occurs in SQL Server and it does that to control data integrity and make sure only one resource can change a set...
See the entire SQL Server environment
There are many advantages of using SQL Diagnostic Manager over building your own tools and one of these is the enterprise management view of all...
Identifying Multi-Language Online Documents (Part 1)
In the previous tip we pointed you to the official PowerShell Language Definition which is available online in many different languages. Which...
Benefits of SQL Diagnostic Manager for database administrators
As a database administrator, monitoring database systems for performance, corruption, and data issues is an ongoing task. It is also an overwhelming...
Benefits of SQL Diagnostic Manager for developers
Development is a big undertaking and most of the time it focuses on making sure all the features are in place and working. Once this is done, tuning...
Trade-off between database security and database performance
One can improve how secure databases are. However, that often degrades how well the database performs. The cost increases to improve database...
Worth a Read: PowerShell Language Definition
Today I like to point you to the official Microsoft PowerShell Language Definition. As a seasoned PowerShell scripter, you can gain a lot of inside...
Database auditing essentials: Track who did what to which data when
Stricter governmental and industry regulation coupled with the need for improving how secure the sensitive corporate data is has driven up the need...
Adopt a compliance and auditing mindset
It is easy and all too common to see the auditing team as adversaries. All the information they want takes time to gather. All the rules and...
Resolving URLs
URLs aren’t always (directly) pointing to a resource. Often, URL act as shortcuts or static addresses that always point to latest versions....
Meet security benchmarks and compliance with SQL Server
In the current IT landscape, we face meeting an ever-increasing number of laws, regulations, and industry standards. The good news is that most of...
Improve your protection for SQL Server backup
Not protecting physical backups You should think about the value of the data or the consequences of it getting into the wrong hands since a full...
Solutions to common methods of SQL Server intrusion
To understand how malicious actors can infiltrate SQL Server is the key to understanding how to prevent intrusions. The consequences for inadequate...
Simple Text-Based Filtering a la grep (Part 1)
PowerShell is object-oriented so there’s not much text filtering and regex magic required compared to Linux and grep. Yet occasionally, it would be...
SQL Server security best practices
There are several examples where data theft has brought organizations to a halt or resulted in a bad press that will leave a tarnished image. For...
SQL Server security threats are closer than you think
Today, business is about data. Database systems and the elements they store are the most valuable assets in any enterprise. Not only are business...
Reading Windows 10 Product Key
There are plenty of scripts available that promise to read the original Windows 10 product key from the registry by converting a series of binary...
Creating sudo for PowerShell (Part 2)
In our effort to create a sudo command for PowerShell – to elevate individual commands – in part 1 we created the sudo function body: function sudo...
Improve your planning for SQL Server backups
Not understanding recovery needs The whole point of creating backups is to retrieve data in case data is lost or there is a failure. But to set up...
Creating sudo for PowerShell (Part 1)
In Linux shells, there’s a command called “sudo” that lets you run a command with elevated privileges. In PowerShell, you’d have to open a...
Code-Signing PowerShell Scripts (Part 3)
In the previous parts, we created a code signing certificate and used it to add a digital signature to a PowerShell script file. Yet what good can a...
Code-Signing PowerShell Scripts (Part 2)
In our previous tip we explained how you can use New-SelfSignedCert to create a self-signed code signing certificate. Today, we’ll use a self-signed...