Your browser does not support this video.
SQL 2012 Admin, Part 3 of 5: Security and Resource Mgmt
with Chris Bell
Security is becoming a concern of everyone. In this course we will dive into some of the features in SQL Server 2012 that relate to security. We will take a look at the encryption keys that SQL Server creates and uses, along with certificates, to protect everything from cell level data to entire databases. Then we will see how Transparent Data Encryption can help to quickly bring a database into compliance with most regulations and requirements. We will also see what exactly is required to move an encrypted database to a new server without losing any data. User defined server roles is a new SQL 2012 feature that makes administration easier when it comes to security. We will go over this and even create our own Server Role for members of the data team. Next we will look at ways to protect individual objects in your databases using security permissions and show how, as the DBA, you can test your configuration using the Execute As capabilities of SQL Server. Next we are going to look into the Resource Governor and Policy Based management. We will go through the Components of the Resource Governor and show how you can use this great feature of Enterprise edition to classify incoming connections and identify specific users or groups that are using excessive resources on the server. We will then look at the Policy Group Management feature of SQL Server. We will create policies that check and enforce naming conventions and ensure proper backups are being configured on your servers.Course Outline