Effective Rights Analysis
Analysis of users’ effective rights shows you how and where each right is granted, making it easy to pinpoint exactly what changes need to be made in order to close security holes.
Database Roles Permissions
View SQL Server role members and sub-roles assigned and their effective permissions.
Server Object Settings
Browse and analyze all files, directories and registry settings associated with SQL Server and determine ownership as well as explicit and inherited security rights.
Weak Password Detection
Analyzes password health of SQL Server logins and reports on when passwords are weak or blank which would cause a susceptible to intrusion situation.
Surface Area And Protocols
Identify services, ports, protocols and APIs that may allow SQL Server to be attacked by a malicious user. Enables you to understand and standardize which services you really need started or activated in your environment in order to reduce risk.
OS Security Analysis
Assess the OS setup to identify issues that would compromise SQL Server security.
Powerful User Analysis
Analyze membership to powerful server roles and groups such as administrators, system administrators and security administrators so you can ensure this level of access is warranted.
Detection of Unresolved Windows Accounts
View all logins on the target server, as well as any unresolved Windows accounts or groups.
Server Security Properties
Show all security related properties for servers including: version and patch level, authentication mode, audit mode, proxy account, and cross database chaining.
SQL Secure can monitor all activity related to SQL Secure administration.
Pre-defined Policy Templates
Combines the most well-known industry standards into 3 distinct levels, (Basic-Balanced-Strong) that define realistic guidelines for protecting SQL Server from the most common intrusion attacks
Shows details of services such as log-on and configuration.
Lists potential security concerns on your SQL Servers such as cross-database chaining and allows you to drilldown to view the full details of the diagrammed relationships.
History and Baselining
The SQL Secure repository keeps a complete history of SQL Server security settings, providing the ability to designate a baseline to compare against future snapshots to detect changes. This also provides a valuable audit trail for forensic analysis.
Built-in standard reports provide detailed information for security auditing and compliance purposes. Produce custom reports detailing the specific information required for SLA’s or perform custom analysis via the data stored on the SQL Secure repository. Data can be extracted and imported to Excel.
Security audit rules provide visibility for database access checks, configuration checks and permission checks.
Shows security state from a global view (e.g. all instances with guest accounts enabled).
Provides an easy-to-use single point of control to manage the creation of collection rules and policies, view risks and assessments, monitor collection history, analyze user access rights and much more.
Configurable Data Collection
Define exactly what SQL Server security information you want to gather and when. Gathers from SQL Server, OS, File System, Registry and Active Directory.
All security data collected by SQL Secure is stored in a central repository for easy reporting and forensic analysis.
Use the flexible grid view to audit and analyze user permissions. Sort, group, or export all SQL Server logins in your enterprise. View all users' assigned and effective rights and permissions at the server, database and object level.
Automated Server Registration
CSV import process provides improved support for large SQL Server environments with significant gains in time to value.
Server Group Tagging
Enables DBA teams to assign servers to groups, then view and manage security policies according to group designations.