Ask Learn
Preview
Please sign in to use this experience.
Sign inThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
SQL Server 2005 includes a variety of highly precise, configurable security features. These features can empower administrators to implement defense-in-depth that is optimized for the specific security risks of their environment.
The following table lists important security-related topics.
Topic | Description |
---|---|
Provides an overview of securing SQL Server. |
|
Describes preparing the Windows server and network for an installation of SQL Server 2005. |
|
Describes the minimum Windows-related rights and file permissions that are required by services that are installed by SQL Server 2005. |
|
Describes how to minimize the vulnerable surface area of an installation of SQL Server 2005. |
|
Security Considerations for Databases and Database Applications |
Describes the security features of the SQL Server 2005 Database Engine. |
Provides an overview of security in SQL Server 2005 Analysis Services (SSAS). |
|
Provides an overview of security in SQL Server 2005 Integration Services (SSIS). |
|
Provides a general overview of security in replication. |
|
Describes the options for configuring security in SQL Server 2005 Reporting Services (SSRS). |
|
Provides an overview of security in SQL Server 2005 Notification Services. |
|
Provides a general description of security in SQL Server 2005 Service Broker. |
|
Provides an overview of security-related aspects of CLR Integration. |
|
Lists the security-related metadata visible in catalog views that are optimized for performance and utility. |
|
Lists the functions that return information that is useful in managing security. |
|
Lists the functions that support encryption, decryption, digital signing, and the validation of digital signatures. |
Please sign in to use this experience.
Sign in