Database Audit Log Monitoring for Security and Compliance

Sort IPv4 and IPv6 Addresses Correctly

When you try and sort IPv4 addresses via Sort-Object, this fails: PS> '10.1.2.3', '2.3.4.5', '1.2.3.4' | Sort-Object 1.2.3.4 10.1.2.3 2.3.4.5 Alphanumeric Sorting by Default This is no surprise because the data is of type “string”, so Sort-Object uses alphanumeric...

The RDBMS is Dead

The RDBMS is Dead

If you suspected the title of this blog is click-bait, then you would be correct.  But bear with me anyway on a little retrospection of the relational database market, where it has been, and where I think it is going to end. What is an RDBMS? Anyone reading this...

Database Audit Log Monitoring for Security and Compliance

Sort IPv4 Addresses Correctly

Reviewing the Test-OnlineFast Function In the previous tip we published a super-fast function called Test-OnlineFast, and this function was able to ping an entire IP segment in record time: PS> $iprange = 1..200 | ForEach-Object { "192.168.189.$_" } PS>...

Final Super-Fast Ping Command

Final Super-Fast Ping Command

Revisiting the Test-Online Fast Function In the previous tip series, we developed a new function called Test-OnlineFast that can ping multiple computers in record time. For some reason, the final version of this function did not include the pipeline support we...

Database Audit Log Monitoring for Security and Compliance

Finding Registered Event Log Source Names

Understanding Event Log Source Names When you write events to an event log using Write-EventLog, you must specify a valid source name. However, there is no easy way of finding out which source files are registered for a particular event log. This can also bite you...

Database Audit Log Monitoring for Security and Compliance

Select-Object and -ExcludeProperty

Here is a line of code that often puzzles PowerShell users: Get-Service | Select-Object -ExcludeProperty Name Understanding the -ExcludeProperty Behavior When you use Select-Object, its -ExcludeProperty parameter does not seem to do anything. The truth is:...

Database Audit Log Monitoring for Security and Compliance

Converting PowerShell to Batch

Here is a fun PowerShell function called Convert-PowerShellToBatch. Provide it with the path to a PowerShell script, or pipe in the results from Get-ChildItem to batch-convert many scripts. How It Works: Batch File Generation The function creates a batch file per...

Database Audit Log Monitoring for Security and Compliance

How to monitor Always On availability groups

Always On availability groups are part of an integrated solution with the goal of achieving the highest level of data availability and disaster recovery for organizations. Availability groups grant database administrators the ability to automatically or manually...

How to monitor and diagnose SQL query performance

How to monitor and diagnose SQL query performance

Executing resource-intensive SQL queries requires a significant amount of processor time, memory, and bandwidth, and storage. Resource-intensive SQL queries prevent other SQL queries from using these resources. This can eventually lead to blocking. Common causes of...

Database Audit Log Monitoring for Security and Compliance

Alert Configuration Templates in SQL Diagnostic Manager

Introduction to Alert Configuration Templates Several versions ago, SQL Diagnostic Manager (SQLDM) introduced Alert Configuration Templates, which basically allowed users to preconfigure alert settings (metrics which are to be alerted upon and the thresholds set for...

Finding All Domain Controllers (no module required)

Finding All Domain Controllers (no module required)

Reviewing the ActiveDirectory Module Approach In the previous tip we explained how you can use the ActiveDirectory module and its cmdlets to find all domain controllers in your organization, or perform any other LDAP query. Leveraging Pure .NET Methods Here is the...

Database Audit Log Monitoring for Security and Compliance

Getting Cached Credentials

Managing Cached Credentials with PSCredentialManager In the previous tip we talked about a public module called PSCredentialManager that helps you manage cached credentials. Sometime, less is more, so when you look at the code you’ll soon discover that it is a...

Database Audit Log Monitoring for Security and Compliance

Installing Modules in PowerShell Core on Linux

Installing PowerShell Modules with Administrator Privileges When you’d like to install modules for all users from the PowerShellGet repository, you need Administrator privileges. On PowerShell Core on Linux, you can use the command “sudo” to enable Administrator...

Database Audit Log Monitoring for Security and Compliance

Parsing Distinguished Names

Using Split() for Parsing Distinguished Names Distinguished names are strings, and strings contain powerful ways of parsing data. The most powerful yet simple approach is the Split() method. Extracting the Last Element with Split() Check out how easy it is to get back...

Database Audit Log Monitoring for Security and Compliance

Registering Default PowerShell Repository

Using PowerShellGet to Install Scripts and Modules If you use the PowerShellGet module (which ships by default on Windows 10 and Server 2016), you can easily download and install shared PowerShell scripts and modules: PS> Find-Module -Tag Security Version Name...

Database Audit Log Monitoring for Security and Compliance

Logical to Physical Data Modeling

In the last article we learned how to create a data model from scratch using ER/Studio Data Architect. In part II we will explore about how to convert a Logical Data Model into a Physical Data Model. See also: IDERA's Guide to the Three Types of Data Model:...

1 8 9 10 11 12 16