<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SQL Security Archives - The SERO Group</title>
	<atom:link href="https://theserogroup.com/category/sql-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://theserogroup.com/category/sql-security/</link>
	<description>SQL Servers Healthy, Secure, And Reliable</description>
	<lastBuildDate>Tue, 29 Oct 2024 15:55:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://theserogroup.com/wp-content/uploads/2024/07/cropped-Canister-only-1-32x32.png</url>
	<title>SQL Security Archives - The SERO Group</title>
	<link>https://theserogroup.com/category/sql-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">121220030</site>	<item>
		<title>Maximizing SQL Server Security with CIS Benchmarks</title>
		<link>https://theserogroup.com/sql-security/maximizing-sql-server-security-with-cis-benchmarks/</link>
		
		<dc:creator><![CDATA[Joe Webb]]></dc:creator>
		<pubDate>Wed, 30 Oct 2024 12:00:00 +0000</pubDate>
				<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database Administration]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Audit]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Management]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=6829</guid>

					<description><![CDATA[<p>Keeping SQL Servers secure is essential, especially in highly regulated industries like finance, healthcare, and government. The Center for Internet Security (CIS) offers a valuable resource for SQL Server administrators: a set of security benchmarks that provide actionable, best-practice guidance to secure SQL Server instances effectively. Implementing these standards helps reduce vulnerabilities, achieve compliance, and&#8230; <br /> <a class="read-more" href="https://theserogroup.com/sql-security/maximizing-sql-server-security-with-cis-benchmarks/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/sql-security/maximizing-sql-server-security-with-cis-benchmarks/">Maximizing SQL Server Security with CIS Benchmarks</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Keeping SQL Servers secure is essential, especially in highly regulated industries like finance, healthcare, and government. The Center for Internet Security (CIS) offers a valuable resource for SQL Server administrators: a set of security benchmarks that provide actionable, best-practice guidance to secure SQL Server instances effectively. Implementing these standards helps reduce vulnerabilities, achieve compliance, and maintain a proactive security stance. Here’s how to make the most of CIS benchmarks for SQL Server.</p>



<h3 class="wp-block-heading">What Are CIS Benchmarks?</h3>



<p>The CIS benchmarks are consensus-driven, best-practice guidelines created by industry experts to enhance the security of IT systems, including SQL Server. Each benchmark outlines specific configuration steps that help harden systems against common vulnerabilities, reduce data breach risk, and support regulatory compliance.</p>



<h3 class="wp-block-heading">Key CIS Security Benchmarks for SQL Server</h3>



<h4 class="wp-block-heading">1. Control Access and Authentication</h4>



<p>Controlling access and using strong authentication methods are foundational security measures.</p>



<ul class="wp-block-list">
<li><strong>Role-Based Access Control (RBAC)</strong>: Use RBAC to limit user permissions. Only assign necessary permissions to each role, avoiding direct access to administrative privileges.</li>



<li><strong>Use Windows Authentication</strong>: Opt for Windows Authentication over SQL Server Authentication as it integrates with Active Directory, enforcing stronger password policies.</li>



<li><strong>Disable the “sa” Account</strong>: Disable or rename the default “sa” account to reduce unauthorized access attempts.</li>
</ul>



<h4 class="wp-block-heading">2. Network and Connection Security</h4>



<p>Network security protects SQL Server from unauthorized access.</p>



<ul class="wp-block-list">
<li><strong>Restrict SQL Server Ports</strong>: Change the default SQL Server port (1433) and restrict access to trusted IPs to minimize exposure.</li>



<li><strong>Enable SSL/TLS Encryption</strong>: Encrypt data in transit using SSL/TLS, preventing interception between SQL Server and client applications.</li>



<li><strong>Firewall Configuration</strong>: Configure both local and network firewalls to accept connections only from trusted sources.</li>
</ul>



<h4 class="wp-block-heading">3. Implement Data Encryption</h4>



<p>Encryption safeguards sensitive data in the event of a breach. </p>



<ul class="wp-block-list">
<li><strong>Transparent Data Encryption (TDE)</strong>: Encrypts data at rest, crucial for sectors handling sensitive data.</li>



<li><strong>Encrypt Backups</strong>: Ensure backups are encrypted to protect data if backup files are compromised.</li>



<li><strong>Key Management</strong>: Use secure encryption keys, ideally using hardware security modules (HSMs), to manage encryption effectively.</li>
</ul>



<h4 class="wp-block-heading">4. Logging and Monitoring</h4>



<p>Regular logging and monitoring are essential in order to detect unauthorized activity.</p>



<ul class="wp-block-list">
<li><strong>Enable SQL Server Auditing</strong>: Enable SQL Server’s auditing feature to track database access and changes in order to monitor potential threats.</li>



<li><strong>Event Logging</strong>: Enable event logging for critical activities, creating a comprehensive log that can be used to analyze security incidents.</li>



<li><strong>Set Up Alerts for Unusual Activity</strong>: Integrate with Security Information and Event Management (SIEM) systems to automate real-time alerts for suspicious activities, such as multiple failed login attempts.</li>
</ul>



<h4 class="wp-block-heading">5. Regular Patching and Updates</h4>



<p>Keeping SQL Server updated minimizes risk.</p>



<ul class="wp-block-list">
<li><strong>Schedule Regular Updates</strong>: Apply cumulative updates and patches as they become available.</li>



<li><strong>Track SQL Server Vulnerabilities</strong>: Stay informed of SQL Server vulnerabilities through Microsoft’s security bulletins and promptly apply necessary updates.</li>
</ul>



<h4 class="wp-block-heading">6. Conduct Regular Vulnerability Scans and Audits</h4>



<p>Regular scans and audits identify potential security gaps in your SQL Server setup.</p>



<ul class="wp-block-list">
<li><strong>Use Vulnerability Scanning Tools</strong>: Use scanning tools to detect weak configurations and insecure practices, like weak passwords.</li>



<li><strong>Internal Audits</strong>: Perform periodic internal audits to ensure that SQL Server settings comply with CIS benchmarks and that best practices remain in place.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Benefits of Aligning SQL Server Security with CIS Benchmarks</h3>



<p>Aligning with CIS benchmarks standardizes SQL Server security, reduces breach risk, and helps maintain a compliant and resilient environment. In addition to reinforcing security, these benchmarks simplify management and streamline audit processes, aligning SQL Server security with industry standards like HIPAA, PCI DSS, and SOX.</p>



<p>By implementing CIS benchmarks, organizations not only strengthen SQL Server security but also improve compliance ahead of regulatory audits. You can download the CIS SQL Server benchmarks <a href="https://learn.cisecurity.org/benchmarks">here</a> for free after providing your email address. </p>



<h3 class="wp-block-heading" id="h-want-to-work-with-the-sero-group">Want to work with The SERO Group?</h3>



<p>Ready to implement CIS benchmarks? <a href="https://theserogroup.com/contact-us/#schedule-a-call" target="_blank" rel="noreferrer noopener">Schedule a no-obligation discovery call</a> to learn how we can help you create a secure SQL Server environment that meets the highest industry standards.</p>
<p>The post <a href="https://theserogroup.com/sql-security/maximizing-sql-server-security-with-cis-benchmarks/">Maximizing SQL Server Security with CIS Benchmarks</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6829</post-id>	</item>
		<item>
		<title>Protect Your SQL Server from MrbMiner and Other Malware Attacks</title>
		<link>https://theserogroup.com/sql-server/protect-your-sql-server-from-mrbminer-and-other-malware-attacks/</link>
					<comments>https://theserogroup.com/sql-server/protect-your-sql-server-from-mrbminer-and-other-malware-attacks/#comments</comments>
		
		<dc:creator><![CDATA[Joe Webb]]></dc:creator>
		<pubDate>Mon, 12 Oct 2020 15:31:35 +0000</pubDate>
				<category><![CDATA[SQL Audit]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[videos]]></category>
		<guid isPermaLink="false">http://theserogroup.com/?p=3232</guid>

					<description><![CDATA[<p>Unfortunately malware attacks attempting to exploit vulnerable SQL Servers are often successful. Last spring, Guardicore announced that the Vollgar attack that was making its way around the internet. Just last month, it was MrbMiner in the news. And there have been countless other attacks targeting SQL Server over the year. So, how can your protect&#8230; <br /> <a class="read-more" href="https://theserogroup.com/sql-server/protect-your-sql-server-from-mrbminer-and-other-malware-attacks/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/sql-server/protect-your-sql-server-from-mrbminer-and-other-malware-attacks/">Protect Your SQL Server from MrbMiner and Other Malware Attacks</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Unfortunately malware attacks attempting to exploit vulnerable SQL Servers are often successful. Last spring, <a href="https://www.guardicore.com/2020/04/vollgar-ms-sql-servers-under-attack/" target="_blank" rel="noreferrer noopener">Guardicore announced</a> that the <a href="http://theserogroup.com/2020/04/07/vollgar-6-scripts-to-help-review-your-sql-servers/">Vollgar</a> attack that was making its way around the internet. Just last month, it was <a href="https://www.zdnet.com/article/new-mrbminer-malware-has-infected-thousands-of-mssql-databases/" target="_blank" rel="noreferrer noopener">MrbMiner</a> in the news. And there have been countless other attacks targeting SQL Server over the year. So, how can your protect your SQL Server from attack?</p>



<p>In this short video we’ll share six ways to help protect your SQL Servers. </p>



<figure class="wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class='embed-container'><iframe title="Protecting Your SQL Server from MrbMiner and Other Malware Attacks" width="1920" height="1080" src="https://www.youtube.com/embed/ahejlA-CEJw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</div></figure>



<h3 class="wp-block-heading">Protect your SQL Server</h3>



<p>Spoiler alert! Six steps to protect help protect your SQL Server from attack: </p>



<ol class="wp-block-list"><li>If at all possible, don&#8217;t expose your SQL Server directly to the internet. Protect them behind a firewall and other multi-layered security measures. </li><li>Don&#8217;t allow weak passwords for sa or any other accounts. Enforce rigorous password complexity requirements. </li><li>Patch often. Review and apply the latest cumulative updates and applicable hotfixes from Microsoft frequently.</li><li>Disable the sa account. It&#8217;s a well-known login that has unfettered access to the SQL Server instance.</li><li>Audit failed login attempts and review all newly created logins regularly. </li><li>Proactively monitor and check your SQL Servers frequently. </li></ol>



<p>These six steps are by no means a comprehensive list of all the security measures that should be taken to protect your SQL Servers. They are just a start, the often overlooked but basic steps to help reduce the surface area of attack on your Microsoft SQL Servers.</p>



<p>By following these steps, along with the others listed <a href="http://theserogroup.com/2020/09/16/am-i-affected-by-mrbminer-malware/">here</a>, you can protect your SQL Servers from Malware. </p>
<p>The post <a href="https://theserogroup.com/sql-server/protect-your-sql-server-from-mrbminer-and-other-malware-attacks/">Protect Your SQL Server from MrbMiner and Other Malware Attacks</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://theserogroup.com/sql-server/protect-your-sql-server-from-mrbminer-and-other-malware-attacks/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3232</post-id>	</item>
		<item>
		<title>Am I affected by MrbMiner malware?</title>
		<link>https://theserogroup.com/sql-server/am-i-affected-by-mrbminer-malware/</link>
					<comments>https://theserogroup.com/sql-server/am-i-affected-by-mrbminer-malware/#comments</comments>
		
		<dc:creator><![CDATA[Luke Campbell]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 14:19:17 +0000</pubDate>
				<category><![CDATA[Consulting]]></category>
		<category><![CDATA[SQL Assess]]></category>
		<category><![CDATA[SQL Audit]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Script Library]]></category>
		<category><![CDATA[SQL Script Library]]></category>
		<guid isPermaLink="false">http://theserogroup.com/?p=3176</guid>

					<description><![CDATA[<p>SQL Server hardware can be powerful. Lots of CPU cores and memory. Just what a crypto miner may need in their quest to generate cryptocurrency. In the case of the MrbMiner exploit, numerous SQL Servers have been exploited with brute-force attacks. These attacks are scanning for servers exposed directly to the internet and are using&#8230; <br /> <a class="read-more" href="https://theserogroup.com/sql-server/am-i-affected-by-mrbminer-malware/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/sql-server/am-i-affected-by-mrbminer-malware/">Am I affected by MrbMiner malware?</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SQL Server hardware can be powerful.  Lots of CPU cores and memory.  Just what a crypto miner may need in their quest to generate cryptocurrency.  In the case of the MrbMiner exploit, numerous SQL Servers have been exploited with brute-force attacks.  These attacks are scanning for servers exposed directly to the internet and are using weak passwords.  Once exploited, a new account, using the username &#8220;Default&#8221; is created.  An app is downloaded which begins mining Monero cryptocurrency.  More details on the exploit can be found <a rel="noreferrer noopener" href="https://zd.net/3hCOciU" target="_blank">here</a>.</p>



<h3 class="wp-block-heading" id="h-checking-for-the-default-username">Checking for the &#8220;Default&#8221; username</h3>



<p>You can check for the presence of this login by running the query below.  If found, a full network audit is recommended.  </p>



<pre class="wp-block-code"><code>--Verify the default account doesn't exist.  No results is a good thing.
SELECT 
	&#91;name],
	&#91;type_desc],
	is_disabled,
	create_date,
	modify_date
FROM sys.server_principals
WHERE &#91;name] = 'Default'</code></pre>



<p>What if you already had a login named &#8220;Default&#8221;?  Determine if the password was recently changed to &#8220;<em>@fg125kjnhn987</em>&#8221; and if there have been any recent login failures.  Review for any recently created logins as well.  Are all logins accounted for?  Were any created that you were not aware of?  If so, review each further to determine what permissions they have and identify what they&#8217;re being used for. </p>



<pre class="wp-block-code"><code>--Review recently created logins
SELECT 
	&#91;name],
	&#91;type_desc],
	is_disabled,
	create_date,
	modify_date
FROM sys.server_principals
ORDER BY create_date desc</code></pre>



<p>Review recently modified logins.</p>



<pre class="wp-block-code"><code>--Review recently modified logins
SELECT 
	&#91;name],
	&#91;type_desc],
	is_disabled,
	create_date,
	modify_date
FROM sys.server_principals
ORDER BY modify_date desc</code></pre>



<h3 class="wp-block-heading" id="h-avoid-making-your-sql-servers-easy-targets">Avoid making your SQL Servers easy targets</h3>



<p>By utilizing security best practices, most brute-force attacks can be stopped.  Or, at the very least, set off alarm bells and whistles to alert you of suspicious activity.  Below is a list of do&#8217;s and don&#8217;ts we typically recommend.  This is not an exhaustive list.</p>



<h4 class="wp-block-heading" id="h-don-t">Don&#8217;t</h4>



<ol class="wp-block-list">
<li>Don&#8217;t expose your SQL Servers to the internet (if at all possible).  Use a VPN to access externally.</li>



<li>Don&#8217;t use weak passwords (for any account).  </li>



<li>Don&#8217;t add your SQL Server service accounts to the local admin group.</li>



<li>Don&#8217;t grant your SQL Server service accounts more permissions than required.</li>



<li>Don&#8217;t grant logins more permissions than required.</li>



<li>Don&#8217;t install additional services which are not required.  SQL Server licenses include not only the database engine, but integration services, analysis services, and reporting services as well (at the time of this post).  It&#8217;s easy enough to go ahead and install these additional services but also increases the attack surface area.  Only install what is required.</li>



<li>Don&#8217;t enable additional options, within SQL Server, if unneeded.  For example, xp_cmdshell,  Ole Automation Procedures, and ad hoc distributed queries.</li>
</ol>



<h4 class="wp-block-heading" id="h-do">Do</h4>



<ol class="wp-block-list" id="block-970d4d59-f9f9-4999-a879-814cbfbf5cab">
<li>Patch often.  Review latest cumulative update, service pack releases, and hotfixes.  Start <a rel="noreferrer noopener" href="https://bit.ly/3krF3Mb" data-type="URL" data-id="https://bit.ly/3krF3Mb" target="_blank">here</a>.</li>



<li>Implement a policy in which an account will become locked out after X number of attempts.</li>



<li>Change passwords often.</li>



<li>Audit the creation of new logins (and review the audits often 😉).</li>



<li>Disable the SA account. This account is well known and has unfettered access.</li>



<li>If not required, don&#8217;t use SQL Server authentication.</li>



<li>Review failed login attempts.  Especially those occurring numerous times within a short span of time.  This could be an indication of a brute-force attempt.</li>



<li>Implement a process to audit using guidelines such as the US government Security Technical Implementation Guides (STIGs) or Center for Internet Security (more on these below).</li>



<li>Review the health and performance metrics of your SQL Servers regularly.</li>



<li>Proactively monitor your SQL Servers to look for unexpected deviations of resource consumption.  </li>
</ol>



<h3 class="wp-block-heading" id="h-audit-your-environment">Audit your environment</h3>



<p>These types of exploits can typically be avoided.  Implementing good security practices can be a painful process (not only from a technical perspective but also from the staff and end user perspective).  The following guides provide a large set of information and scripts to get you started with securing your environment.  </p>



<h4 class="wp-block-heading" id="h-cis-center-for-internet-security">CIS &#8211; Center for Internet Security</h4>



<p>CIS Benchmarks are consensus-developed secure configuration guidelines for hardening.  There are benchmarks for operating systems, server software, cloud providers, network devices etc.  Take a look <a rel="noreferrer noopener" href="https://www.cisecurity.org/cis-benchmarks/" data-type="URL" data-id="https://www.cisecurity.org/cis-benchmarks/" target="_blank">here</a> for a list of what they have to offer.  SQL Server specific benchmarks can be found at <a rel="noreferrer noopener" href="https://www.cisecurity.org/benchmark/microsoft_sql_server/" target="_blank">https://www.cisecurity.org/benchmark/microsoft_sql_server/</a>.  There are some aspects of the site which requires membership but includes additional tools.  Well worth the consideration.</p>



<h4 class="wp-block-heading" id="h-national-vulnerability-database">National Vulnerability Database</h4>



<p>The <a rel="noreferrer noopener" href="https://nvd.nist.gov/ncp/repository" data-type="URL" data-id="https://nvd.nist.gov/ncp/repository" target="_blank">NCP</a> is the U.S. government repository of publicly available security checklists which provide guidance on setting the security configuration of operating systems and applications.  The checklists (STIG) can be downloaded as a zip.  To view, download and install the STIG Viewer from <a rel="noreferrer noopener" href="https://public.cyber.mil/stigs/srg-stig-tools/" target="_blank">https://public.cyber.mil/stigs/srg-stig-tools/</a> and follow the instructions.</p>



<h3 class="wp-block-heading" id="h-how-we-can-help">How we can help</h3>



<p>Security is constantly evolving.  Setting up good policies around platform hardening, password complexity and rotation, and using accounts with the least privilege required is a daunting task for any organization.  Especially those without dedicated security or database administrators.  I&#8217;m hopeful a few of the resources above can get you started on the right path.  We&#8217;re here to help as well.  If you&#8217;d like assistance in assessing your SQL Servers, schedule a call with us <a href="https://theserogroup.com/#contact" target="_blank" rel="noreferrer noopener">here</a>. </p>



<p>Thanks for reading!</p>
<p>The post <a href="https://theserogroup.com/sql-server/am-i-affected-by-mrbminer-malware/">Am I affected by MrbMiner malware?</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://theserogroup.com/sql-server/am-i-affected-by-mrbminer-malware/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3176</post-id>	</item>
		<item>
		<title>Vollgar: 6 Scripts to Help Review Your SQL Servers</title>
		<link>https://theserogroup.com/sql-server/vollgar-6-scripts-to-help-review-your-sql-servers/</link>
					<comments>https://theserogroup.com/sql-server/vollgar-6-scripts-to-help-review-your-sql-servers/#comments</comments>
		
		<dc:creator><![CDATA[Joe Webb]]></dc:creator>
		<pubDate>Tue, 07 Apr 2020 19:49:02 +0000</pubDate>
				<category><![CDATA[SQL Assess]]></category>
		<category><![CDATA[SQL Audit]]></category>
		<category><![CDATA[SQL Script Library]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[Script Library]]></category>
		<guid isPermaLink="false">http://theserogroup.com/?p=2747</guid>

					<description><![CDATA[<p>Last week, Guardicore released information about a newly discovered attack that uses SQL Servers to compromise servers and networks. Here&#8217;s a link; I&#8217;d really encourage you to read it. The attack known as Vollgar uses a simple brute force attack to gain access to SQL Servers exposed to the internet. It then uses the elevated&#8230; <br /> <a class="read-more" href="https://theserogroup.com/sql-server/vollgar-6-scripts-to-help-review-your-sql-servers/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/sql-server/vollgar-6-scripts-to-help-review-your-sql-servers/">Vollgar: 6 Scripts to Help Review Your SQL Servers</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Last week, Guardicore released information about a newly discovered attack that uses SQL Servers to compromise servers and networks. Here&#8217;s a <a aria-label="link (opens in a new tab)" rel="noreferrer noopener" href="https://www.guardicore.com/2020/04/vollgar-ms-sql-servers-under-attack/" target="_blank">link</a>; I&#8217;d really encourage you to read it. The attack known as Vollgar uses a simple brute force attack to gain access to SQL Servers exposed to the internet. It then uses the elevated permissions of the compromised logins (sysadmin or serveradmin) to modify the capabilities of SQL Server and extended its access. </p>



<p><a rel="noreferrer noopener" aria-label="Guardicore has released a PowerShell script (opens in a new tab)" href="https://github.com/guardicore/labs_campaigns/tree/master/Vollgar" target="_blank">Guardicore has released a PowerShell script</a> that examines servers to determine if they’ve been infected.&nbsp;We’ve safely run the scripts on SQL Servers in our lab environment and for many of our clients. </p>



<p>If you routinely apply regular updates to your servers, practice the Principle of Least Privilege, regularly change critical passwords, have stringent password complexity requirements, and don&#8217;t expose your SQL Servers directly to the internet, the likelihood of a brute force attack succeeding is greatly reduced. </p>



<p>Here are six scripts that can help determine your level of potential exposure.</p>



<h3 class="wp-block-heading">Who Has sysadmin or serveradmin Privileges?</h3>



<p>The Vollgar attack is a brute force attack that attempts to guess the password for SQL Logins with elevated privileges. To be successful it needs logins that can execute <a rel="noreferrer noopener" aria-label="sp_configure (opens in a new tab)" href="https://docs.microsoft.com/en-us/sql/relational-databases/system-stored-procedures/sp-configure-transact-sql?view=sql-server-ver15" target="_blank">sp_configure</a> to change server-level settings. This are implicitly held by the sysadmin and serveradmin fixed server roles. </p>



<p>So, the first step in determining your exposure to Vollgar is to discover the members of the sysadmin and serveradmin roles. The following script will show you the members of each role. </p>



<pre class="wp-block-code"><code>USE master; 
GO

EXEC sp_helpsrvrolemember
	'sysadmin';

EXEC sp_helpsrvrolemember
	'serveradmin';</code></pre>



<p>In my sample database, the following is returned. </p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="941" height="518" src="http://theserogroup.com/wp-content/uploads/2020/04/server_role_members-1.png" alt="" class="wp-image-2771" srcset="https://theserogroup.com/wp-content/uploads/2020/04/server_role_members-1.png 941w, https://theserogroup.com/wp-content/uploads/2020/04/server_role_members-1-300x165.png 300w, https://theserogroup.com/wp-content/uploads/2020/04/server_role_members-1-768x423.png 768w" sizes="(max-width: 941px) 100vw, 941px" /></figure>



<p>Another approach to retrieving the same information in one consolidated result set is to use the following script. </p>



<pre class="wp-block-code"><code>--list of logins that are members of the sysadmin or serveradmin roles
SELECT SP1.&#91;name] AS 'Login',
	SP2.&#91;name] AS 'ServerRole'
FROM sys.server_principals AS SP1
	JOIN sys.server_role_members AS SRM 
		ON SP1.principal_id = SRM.member_principal_id
	JOIN sys.server_principals AS SP2 
		ON SRM.role_principal_id = SP2.principal_id
WHERE SP2.&#91;name] IN ('sysadmin', 'serveradmin')
ORDER BY SP2.&#91;name],
	 SP1.&#91;name];</code></pre>



<p>As expected, this script produces the same results. </p>



<figure class="wp-block-image size-large"><img decoding="async" width="594" height="325" src="http://theserogroup.com/wp-content/uploads/2020/04/server_role_members_v2-1.png" alt="" class="wp-image-2772" srcset="https://theserogroup.com/wp-content/uploads/2020/04/server_role_members_v2-1.png 594w, https://theserogroup.com/wp-content/uploads/2020/04/server_role_members_v2-1-300x164.png 300w" sizes="(max-width: 594px) 100vw, 594px" /></figure>



<p>Of course, it&#8217;s best practice to only grant the minimum rights required by each login, a practice known as least privilege. If these queries return more logins than absolutely necessary, it&#8217;s time to review your security practices. </p>



<h3 class="wp-block-heading">Who has Passwords that Do Not Expire and without Password Complexity Requirements?</h3>



<p>Having a complex password and changing it regularly is part of the basic blocking and tackling of security. Passwords like &#8220;Password123&#8221;, &#8220;Qwerty&#8221;, and &#8220;Puddles!&#8221; can be cracked in very short order using tools freely available on the web. And if these passwords never expire, users have no reason to change them regularly, making them even more of a liability.</p>



<p>For Windows Integrated Authentication, password complexity and expiration is handled at the network domain level. For SQL logins, these are enforced inside of SQL Server. </p>



<p>To find active SQL logins (e.g. not disabled) that do not require a basic level of complexity and are set to not expired, run the following script.</p>



<pre class="wp-block-code"><code>--Active SQL Logins where passwords do not expire
--and do not have complexity requirements 
SELECT name, 
	type_desc, 
	create_date, 
	modify_date, 
	default_database_name
FROM sys.sql_logins
WHERE is_expiration_checked = 0
	 AND is_disabled = 0 
	 AND is_policy_checked = 0 ; </code></pre>



<p>In my sample system, the script produces the following list. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="956" height="330" src="http://theserogroup.com/wp-content/uploads/2020/04/password_dont_expire-1.png" alt="" class="wp-image-2773" srcset="https://theserogroup.com/wp-content/uploads/2020/04/password_dont_expire-1.png 956w, https://theserogroup.com/wp-content/uploads/2020/04/password_dont_expire-1-300x104.png 300w, https://theserogroup.com/wp-content/uploads/2020/04/password_dont_expire-1-768x265.png 768w" sizes="auto, (max-width: 956px) 100vw, 956px" /></figure>



<p>Regularly changing passwords creates a moving target for potential attackers. If you have SQL logins that do not expire and do not have minimum complexity requirements, consider turning these features on for all your logins. </p>



<p>Putting some of the above queries together will give us a list of all active SQL logins that are members of the sysadmin or serveradmin fixed server roles along with whether their logins adhere to password complexity and expiration policies. </p>



<pre class="wp-block-code"><code>--list of SQL logins that are members of the sysadmin or serveradmin roles
SELECT SP1.&#91;name] AS 'Login',
	SP2.&#91;name] AS 'ServerRole',
	CASE l.is_disabled WHEN 1 THEN 'No' ELSE 'Yes' END AS Is_Enabled,
	CASE l.is_expiration_checked WHEN 1 THEN 'Yes' ELSE 'No' End AS Pwd_Expires,
	CASE l.is_policy_checked WHEN 1 THEN 'Yes' ELSE 'No' END AS Pwd_Complexity_Reqs
FROM sys.server_principals AS SP1
	JOIN sys.server_role_members AS SRM
	ON SP1.principal_id = SRM.member_principal_id
	JOIN sys.server_principals AS SP2
	ON SRM.role_principal_id = SP2.principal_id
	JOIN sys.sql_logins AS l
	ON l.principal_id = SRM.member_principal_id
WHERE SP2.&#91;name] IN ('sysadmin', 'serveradmin')
ORDER BY SP2.&#91;name],
	 SP1.&#91;name];</code></pre>



<p>The following results are returned on my test system.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="802" height="274" src="http://theserogroup.com/wp-content/uploads/2020/04/elevated_privileges.png" alt="" class="wp-image-2783" srcset="https://theserogroup.com/wp-content/uploads/2020/04/elevated_privileges.png 802w, https://theserogroup.com/wp-content/uploads/2020/04/elevated_privileges-300x102.png 300w, https://theserogroup.com/wp-content/uploads/2020/04/elevated_privileges-768x262.png 768w" sizes="auto, (max-width: 802px) 100vw, 802px" /></figure>



<h3 class="wp-block-heading">When was a SQL Login Password Changed?</h3>



<p>From the prior two queries, we can see that Alice and Donnie are both active members of the sysadmin fixed server role. Donnie&#8217;s password doesn&#8217;t expire and doesn&#8217;t have to meet any password complexity requirements. Of course, this is a big red flag for security. Alice&#8217;s login, on the other hand, is set to adhere to complexity and expiration requirements. That&#8217;s good. </p>



<p>But how long has it been since Alice actually changed her password? We can use the <a rel="noreferrer noopener" aria-label="LOGINPROPERTY() (opens in a new tab)" href="https://docs.microsoft.com/en-us/sql/t-sql/functions/loginproperty-transact-sql?view=sql-server-ver15" target="_blank">LOGINPROPERTY()</a> function to help us. Note: that for the function to return meaningful information, both  CHECK_POLICY and CHECK_EXPIRATION must be enabled for the login.</p>



<pre class="wp-block-code"><code>--when was a login's password last changed?
SELECT 'Alice' AS username,
	LOGINPROPERTY('Alice', 'PasswordLastSetTime') AS PasswordLastSetTime;</code></pre>



<p>In this case, we can see that Alice last set her password on March 26, 2020. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="435" height="110" src="http://theserogroup.com/wp-content/uploads/2020/04/password_last_changed-1.png" alt="" class="wp-image-2774" srcset="https://theserogroup.com/wp-content/uploads/2020/04/password_last_changed-1.png 435w, https://theserogroup.com/wp-content/uploads/2020/04/password_last_changed-1-300x76.png 300w" sizes="auto, (max-width: 435px) 100vw, 435px" /></figure>



<p>We can use other properties in the LOGINPROPERTY() function, such as BadPasswordCount and BadPasswordTime.  I wouldn&#8217;t rely too heavily on the results, though. The BadPasswordCount is reset to 0 as soon as Alice successfully logs in. And, just as importantly, it&#8217;s only relevant for those SQL Logins who have  CHECK_POLICY and CHECK_EXPIRATION enabled. </p>



<pre class="wp-block-code"><code>--bad password attempts
SELECT name, 
	LOGINPROPERTY(name, 'BadPasswordCount') AS BadPasswordCount,
	LOGINPROPERTY(name, 'BadPasswordTime') AS BadPasswordTime
FROM sys.sql_logins 
WHERE is_expiration_checked = 1
	AND is_disabled = 0 
	AND is_policy_checked = 1; </code></pre>



<p>The results from my test system are shown below. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="693" height="490" src="http://theserogroup.com/wp-content/uploads/2020/04/bad_attempts-1.png" alt="" class="wp-image-2768" srcset="https://theserogroup.com/wp-content/uploads/2020/04/bad_attempts-1.png 693w, https://theserogroup.com/wp-content/uploads/2020/04/bad_attempts-1-300x212.png 300w" sizes="auto, (max-width: 693px) 100vw, 693px" /></figure>



<h3 class="wp-block-heading">How to See Failed Login Attempts</h3>



<p>Assuming your SQL Server is configured to log failed login attempts, and of course it should be, you can query the error log files using the sp_readerrorlog procedure to see the failed attempts. </p>



<pre class="wp-block-code"><code>EXEC sp_readerrorlog 0, 1, 'Login failed' ;</code></pre>



<p>The following is returned on my test system.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="862" height="273" src="http://theserogroup.com/wp-content/uploads/2020/04/error_log_files-1.png" alt="" class="wp-image-2769" srcset="https://theserogroup.com/wp-content/uploads/2020/04/error_log_files-1.png 862w, https://theserogroup.com/wp-content/uploads/2020/04/error_log_files-1-300x95.png 300w, https://theserogroup.com/wp-content/uploads/2020/04/error_log_files-1-768x243.png 768w" sizes="auto, (max-width: 862px) 100vw, 862px" /></figure>



<p>Better yet, use a monitoring tool to proactively monitor failed login attempts and alert when a minimum threshold is exceeded. For our <a rel="noreferrer noopener" aria-label="DBA as a Service (opens in a new tab)" href="http://theserogroup.com/#how-we-help" target="_blank">DBA as a Service</a> clients, we provide <a rel="noreferrer noopener" aria-label="SentryOne (opens in a new tab)" href="https://www.sentryone.com/" target="_blank">SentryOne</a>&#8216;s <a rel="noreferrer noopener" aria-label="SQLSentry  (opens in a new tab)" href="https://www.sentryone.com/products/sentryone-platform/sql-sentry/sql-server-performance-monitoring" target="_blank">SQLSentry </a>monitoring tool to help with this and other events that should be monitored.</p>



<h3 class="wp-block-heading">Parting Thoughts</h3>



<p>Many years ago, I set up a test system for a writing project I was involved with. As part of the test, I set the sa password to something like &#8220;Cat123Dog!&#8221; The password met most requirements of the day &#8211; upper and lower case, at least one number and one letter, and a special symbol. &#8220;Not bad,&#8221; I thought to myself.</p>



<p>Then I downloaded <a rel="noreferrer noopener" aria-label="Ophcrack (opens in a new tab)" href="https://ophcrack.sourceforge.io/" target="_blank">Ophcrack</a>, a free Windows password cracker, and released it on my unsuspecting SQL Server. Expecting the utility to run for hours, if not days, I returned to work. </p>



<p>A few minutes later, I decided to check on it, wanting to make sure it wasn&#8217;t hung for some reason. I was stunned. Ophcrack had already found the password! That was at least 10 years ago. I&#8217;m sure the tools of the hacker trade have gotten much better since then. </p>



<p>Recently, I&#8217;ve read where most breaches are a result of social engineering &#8211; someone receives an e-Card from a secret admirer, finds a thumb drive in the parking lot, or clicks an email link. &#8220;The days of brute force attacks are over,&#8221; they say. </p>



<p>Vollgar has proven them wrong. Basic security measures are still best practice. You owe it to yourself to make sure you&#8217;re doing it well. Here are a few links that may help.</p>



<ul class="wp-block-list"><li><a rel="noreferrer noopener" aria-label="Introduction to SQL Server Security (opens in a new tab)" href="https://www.red-gate.com/simple-talk/sysadmin/data-protection-and-privacy/introduction-to-sql-server-security-part-1/" target="_blank">Introduction to SQL Server Security</a></li><li><a rel="noreferrer noopener" aria-label="Securing SQL Server (opens in a new tab)" href="https://docs.microsoft.com/en-us/sql/relational-databases/security/securing-sql-server?view=sql-server-ver15" target="_blank">Securing SQL Server</a></li><li><a href="https://www.mssqltips.com/sqlservertip/3159/sql-server-security-checklist/" target="_blank" rel="noreferrer noopener" aria-label="SQL Server Security Checklist (opens in a new tab)">SQL Server Security Checklist</a></li></ul>
<p>The post <a href="https://theserogroup.com/sql-server/vollgar-6-scripts-to-help-review-your-sql-servers/">Vollgar: 6 Scripts to Help Review Your SQL Servers</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://theserogroup.com/sql-server/vollgar-6-scripts-to-help-review-your-sql-servers/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2747</post-id>	</item>
		<item>
		<title>Want to Learn SQL Server? Here Are 3 Free Sources</title>
		<link>https://theserogroup.com/training/want-to-learn-sql-server-here-are-3-free-sources/</link>
					<comments>https://theserogroup.com/training/want-to-learn-sql-server-here-are-3-free-sources/#comments</comments>
		
		<dc:creator><![CDATA[Joe Webb]]></dc:creator>
		<pubDate>Mon, 12 Aug 2019 20:31:46 +0000</pubDate>
				<category><![CDATA[Career Development]]></category>
		<category><![CDATA[Professional Development]]></category>
		<category><![CDATA[SQL Audit]]></category>
		<category><![CDATA[SQL Community]]></category>
		<category><![CDATA[SQL Script Library]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Consulting]]></category>
		<category><![CDATA[The Sero Group]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Work/Life Balance]]></category>
		<category><![CDATA[Resources]]></category>
		<guid isPermaLink="false">http://theserogroup.com/?p=2512</guid>

					<description><![CDATA[<p>Many companies have lean IT organizations and find themselves with five, ten, or even twenty production SQL Servers and no dedicated Database Administrator to care for them. Instead, they rely on other IT Professionals to ensure the database servers are performant. We&#8217;ve worked with many companies where SysAdmins, Application Developers, and Network Administrators have been&#8230; <br /> <a class="read-more" href="https://theserogroup.com/training/want-to-learn-sql-server-here-are-3-free-sources/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/training/want-to-learn-sql-server-here-are-3-free-sources/">Want to Learn SQL Server? Here Are 3 Free Sources</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-drop-cap">Many companies have lean IT organizations and find themselves with five, ten, or even twenty production SQL Servers and no dedicated Database Administrator to care for them. Instead, they rely on other IT Professionals to ensure the database servers are performant. We&#8217;ve worked with many companies where SysAdmins, Application Developers, and Network Administrators have been regularly tasked to perform double duty, taking care of their primary responsibilities while also responding to SQL Server issues. Those IT professionals are looking to learn enough SQL Server to help them accomplish what they need to do. </p>



<h1 class="wp-block-heading" id="h-free-sql-server-training-resources">Free SQL Server Training Resources</h1>



<p>Often these IT Professionals, sometimes called &#8220;Accidental DBAs,&#8221; do an admirable job, even with little formal SQL Server training. Fortunately, there are a lot of great resources available online for the &#8220;Accidental DBA.&#8221; Here are a few free SQL Server learning resources worth checking out:</p>



<h2 class="wp-block-heading" id="h-1-microsoft-resources-and-labs"><strong>1. Microsoft Resources and Labs</strong></h2>



<p>Microsoft has put together quite a few learning opportunities available to the public for free. These are in several different formats so you can pick the one you&#8217;re most comfortable with. Here are a few you may want to check out:</p>



<ol class="wp-block-list">
<li><a rel="noreferrer noopener" aria-label="Microsoft SQL Server 2019 (CTP 3.2) Lab (opens in a new tab)" href="https://github.com/microsoft/sqlworkshops/tree/master/sql2019lab" target="_blank">Microsoft SQL Server 2019 (CTP 3.2) Lab</a>. In this self-paced lab, you&#8217;ll learn how to use SQL Server 2019 to solve business challenges.</li>



<li><a rel="noreferrer noopener" aria-label="Microsoft AI School (opens in a new tab)" href="https://aischool.microsoft.com/en-us/home" target="_blank">Microsoft AI School</a>. Artificial Intelligence is a hot topic in today&#8217;s business environment. In Microsoft AI School, you&#8217;ll &#8220;find the information, learning materials, and resources you need to start building intelligence into your solutions.&#8221;</li>



<li><a rel="noreferrer noopener" aria-label="SQL Server Tutorials (opens in a new tab)" href="https://docs.microsoft.com/en-us/sql/sql-server/tutorials-for-sql-server-2016?view=sql-server-ver15" target="_blank">SQL Server Tutorials</a>. More than just Online Documentation, SQL Docs is a great place for detailed information about how to use SQL Server. It includes tutorials that will step you through learning the database technology.</li>



<li><a rel="noreferrer noopener" aria-label="EdX (opens in a new tab)" href="https://www.edx.org/about-us" target="_blank">EdX</a>. Founded by Harvard and MIT, EdX is a place where education is freely available to everyone online. Microsoft has partnered with EdX to provide free courses online for SQL Server. Here are a few:
<ul class="wp-block-list">
<li><a rel="noreferrer noopener" aria-label="Querying Data with Transact-SQL (opens in a new tab)" href="https://www.edx.org/course/querying-data-with-transact-sql-3" target="_blank">Querying Data with Transact-SQL</a>.</li>



<li><a rel="noreferrer noopener" aria-label="Developing SQL Databases (opens in a new tab)" href="https://www.edx.org/course/developing-sql-databases" target="_blank">Developing SQL Databases</a>.</li>



<li><a rel="noreferrer noopener" aria-label="Analyzing and Visualizing Data with SQL Server Reporting Services (opens in a new tab)" href="https://www.edx.org/course/analyzing-visualizing-data-sql-server-microsoft-dat214x-2" target="_blank">Analyzing and Visualizing Data with SQL Server Reporting Services</a>. </li>
</ul>
</li>



<li><a rel="noreferrer noopener" aria-label="Channel 9 (opens in a new tab)" href="https://channel9.msdn.com/Search?term=sql&amp;sortBy=recent&amp;lang-en=true" target="_blank">Channel 9</a>. Microsoft produces a lot of video content for SQL Server and other products. They make it available online via Channel 9.</li>
</ol>



<h2 class="wp-block-heading" id="h-2-youtub-e-channels"><strong>2. YouTub</strong>e Channels</h2>



<p>YouTube can be a great resource for learning just about anything. From changing a tire to playing the ukulele, you can find it on YouTube. It should come as no surprise that there are a lot of great SQL Server training videos available as well. Of course, since just about anyone can create a video, you&#8217;ll want to be careful. Not everyone is the expert that they portend to be online. Do your own research. Here are a couple of places to start.</p>



<ol class="wp-block-list">
<li><a rel="noreferrer noopener" aria-label="SQL Server YouTube Search (opens in a new tab)" href="https://www.youtube.com/results?search_query=sql+server" target="_blank">SQL Server YouTube Search</a>. A list of SQL Server-related videos. </li>



<li><a rel="noreferrer noopener" aria-label="Microsoft SQL Server YouTube Channel (opens in a new tab)" href="https://www.youtube.com/channel/UC_BLf95QgWpwlbSq-ZKLMwA" target="_blank">Microsoft SQL Server YouTube Channel</a>. Microsoft SQL Server home on YouTube.</li>
</ol>



<h2 class="wp-block-heading" id="h-3-sqlsaturdays-and-virtual-groups">3. SQLSaturdays and Virtual Groups</h2>



<p>For many years, I was on the board of Directors for a global user group called <a rel="noreferrer noopener" aria-label="PASS (opens in a new tab)" href="https://www.pass.org/" target="_blank">PASS</a>. The organization is committed to providing learning opportunities for professionals around the globe and to helping the community to better connect with one another. There are a couple of ways PASS helps with this. </p>



<ol class="wp-block-list">
<li><a rel="noreferrer noopener" aria-label="SQLSaturdays (opens in a new tab)" href="https://www.sqlsaturday.com/" target="_blank">SQLSaturdays</a> are a series of free one-day training events in cities around the world. These events, as the name suggests are held on Saturdays and are free to attend. They typically have some of the best and most well-known SQL Server experts around. Look for a SQLSaturday near you and plan to attend. You&#8217;ll see some great content and better yet make some incredible connections. </li>



<li><a rel="noreferrer noopener" aria-label="Virtual Groups (opens in a new tab)" href="https://www.pass.org/Community/Groups/PASSVirtualGroups.aspx" target="_blank">Virtual Groups</a>. Through live webinars, PASS Virtual Groups offer top-notch training no matter where you happen to be. Check out a list of upcoming webinars. </li>
</ol>



<h2 class="wp-block-heading" id="h-summary">Summary</h2>



<p>With a new release every 18 to 24 months, keeping up with the latest changes can be a challenge. Hopefully, these free resources will help. We also have an ever growing<a href="https://theserogroup.com/category/sql-script-library/"> SQL Script Library</a> available to help get you started with some of the more common tasks. </p>



<h2 class="wp-block-heading" id="h-want-to-work-with-the-sero-group">Want to work with The Sero Group?</h2>



<p>Want to learn more about how SERO Group helps organizations take the guesswork out of managing their SQL Servers? It’s easy and there is no obligation.&nbsp;</p>



<p><a href="https://theserogroup.com/#contact" target="_blank" rel="noreferrer noopener">Schedule a call</a> with us to get started.</p>
<p>The post <a href="https://theserogroup.com/training/want-to-learn-sql-server-here-are-3-free-sources/">Want to Learn SQL Server? Here Are 3 Free Sources</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://theserogroup.com/training/want-to-learn-sql-server-here-are-3-free-sources/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2512</post-id>	</item>
		<item>
		<title>4 Options Now That Your SQL Server 2008 Is Out of Support</title>
		<link>https://theserogroup.com/sql-server/4-options-now-that-your-sql-server-2008-is-out-of-support/</link>
					<comments>https://theserogroup.com/sql-server/4-options-now-that-your-sql-server-2008-is-out-of-support/#comments</comments>
		
		<dc:creator><![CDATA[Joe Webb]]></dc:creator>
		<pubDate>Tue, 09 Jul 2019 18:45:15 +0000</pubDate>
				<category><![CDATA[Data Security]]></category>
		<category><![CDATA[SQL Assess]]></category>
		<category><![CDATA[SQL Audit]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Consulting]]></category>
		<category><![CDATA[The Sero Group]]></category>
		<category><![CDATA[SQL Upgrades]]></category>
		<guid isPermaLink="false">http://theserogroup.com/?p=2436</guid>

					<description><![CDATA[<p>As of July 9, 2019, SQL Server 2008 and SQL Server 2008 R2 have officially passed from Extended Support to No Longer Supported. What does that mean? It means that Microsoft will no longer release any updates for any version of SQL Server 2008. That includes security patches and data integrity fixes. If a hacker&#8230; <br /> <a class="read-more" href="https://theserogroup.com/sql-server/4-options-now-that-your-sql-server-2008-is-out-of-support/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/sql-server/4-options-now-that-your-sql-server-2008-is-out-of-support/">4 Options Now That Your SQL Server 2008 Is Out of Support</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As of July 9, 2019, SQL Server 2008 and SQL Server 2008 R2 have officially passed from Extended Support to No Longer Supported. </p>



<p>What does that mean? </p>



<p>It means that Microsoft will no longer release any updates for any version of SQL Server 2008. That includes security patches and data integrity fixes. If a hacker finds a zero-day vulnerability and publishes it to the web for all ne&#8217;er-do-wells to use, it won&#8217;t be fixed. If a new issue is discovered that could lead to data corruption or loss, no fix will be forthcoming. Discover a performance problem? Forget about it. It&#8217;s yours alone.</p>



<p>It&#8217;s not that Microsoft is heartless or doesn&#8217;t care. They do. But they understandably can&#8217;t support a version indefinitely. And we&#8217;ve known for a long time that this train would leave the station.</p>



<figure class="wp-block-video"><video height="720" style="aspect-ratio: 1280 / 720;" width="1280" autoplay controls loop src="http://theserogroup.com/wp-content/uploads/2019/07/Sql2008upgradetrain.mp4"></video></figure>



<p>Yet many companies are still using SQL Server 2008 and SQL Server 2008 R2 for a lot of different reasons. Too many other projects, fear of a complicated upgrade path, wanting to bundle it with a larger initiative, and simply not knowing where to start are commonly cited reasons for not upgrading. Yet. </p>



<h3 class="wp-block-heading">What are your options? </h3>



<p>Now, the day has come and SQL Server 2008 has officially been mothballed. So, what can you do?</p>



<h4 class="wp-block-heading">1. The &#8220;Do Nothing&#8221; Option</h4>



<p>If SQL Server 2008 has been working well for you and you don&#8217;t see a need to upgrade, it may be that you don&#8217;t <em>have </em>to do anything. You could simply continue working as you currently are for a while longer and then sunset the aging applications in due course.</p>



<p>But before you get too excited about this, remember what you&#8217;ll forfeit, both now and in the future. Microsoft will not release any hot patches, service patches, cumulative updates, or anything else for the database platform. That&#8217;s bad, but that&#8217;s not all.</p>



<p>You will also be limited on your operating system upgrades. (Keep in mind that Windows Server 2008 will not be supported after January 14, 2020.) </p>



<p>And if you do decide to upgrade, there will be a substantial amount of technical debt to pay down. The longer you wait, the further entrenched the dated software will become and the more difficult it will be to upgrade or remove.</p>



<p>Although this option may be right for some organizations or instances of SQL Server, it should not be considered for any system that is connected to the internet in any way, even through a VPN. It is risky enough without the possibility of accidentally introducing malicious code.</p>



<h4 class="wp-block-heading">2. The &#8220;One-for-One Upgrade&#8221; Option</h4>



<p>Sometimes the most straightforward approach is the best approach. If you only have a handful of SQL Servers, you may be able to spin up a new virtual server for each existing database server and migrate to the new servers. This one-for-one approach makes planning and even execution relatively easy. Relatively.</p>



<p>To do it right, however, will take a bit of thought. Before doing anything, you&#8217;ll want to run the <a href="https://docs.microsoft.com/en-us/sql/database-engine/install-windows/prepare-for-upgrade-by-running-data-migration-assistant?view=sql-server-2017" target="_blank" rel="noreferrer noopener" aria-label="Data Migration Assistant (opens in a new tab)">Data Migration Assistant</a> to check for any potential issues with the upgrade. The DMA will help identify discontinued or deprecated features that your older systems may be using. It&#8217;ll also help you discover any potential breaking or behavioral changes that you should be aware before you upgrade. </p>



<p>You&#8217;ll also want to make sure you right-size the new environment and configure the new SQL Servers appropriately. Then you can migrate the databases, logins, users, jobs, linked servers, etc. to the new servers. You&#8217;ll also want to consider the service accounts used and how they access network resources such as shares used for backups. </p>



<p>Check out our free <a href="https://theserogroup.com/sql-server-configuration-download/">5 Common Issues That May Be Putting Your SQL Server At Risk</a> PDF for some common configuration issues we find during our <a href="https://theserogroup.com/sql-configuration-assessment">SQL Assessments</a>. </p>



<p>Of course, this option doesn&#8217;t consider potential gains that may be realized through server consolidation.</p>



<h4 class="wp-block-heading">3. The &#8220;Consolidation Upgrade&#8221; Option</h4>



<p>For environments with say ten to forty SQL Servers, it&#8217;s worth considering a new SQL Server landscape. The existing SQL Server environment probably grew organically over time without a lot of planning or forethought. New applications were purchased and the easiest thing to do was to spin up a new SQL Server instance for it. Over time, the number of database servers sprawled and now you may have more licenses than you actually need.</p>



<p>The upgrade project is a perfect time to (re)evaluate your landscape. </p>



<p>For this option, you&#8217;ll want to: </p>



<ul class="wp-block-list"><li>Identify the scope and breadth of the project</li><li>Run the <a href="https://docs.microsoft.com/en-us/sql/database-engine/install-windows/prepare-for-upgrade-by-running-data-migration-assistant?view=sql-server-2017" target="_blank" rel="noreferrer noopener" aria-label="Data Migration Assistant (opens in a new tab)">Data Migration Assistant</a> to look for possible upgrade issues</li><li>Determine vendor and licensing requirements</li><li>Collect and analyze performance data for each server to determine potential consolidation candidates</li><li>Determine a preliminary consolidation design</li><li>Plan and execute the project</li></ul>



<p>Depending on the scope, you may also want to include a High Availability / Disaster Recovery component to the project.</p>



<h4 class="wp-block-heading">4. The &#8220;Combination&#8221; Upgrade</h4>



<p>For many environments, especially larger or more complex ones, a combination approach will likely be required, one that incorporates elements from each of the first three options. </p>



<p>Some applications and their associated SQL Servers will be identified as &#8220;on their way out&#8221; and the first &#8220;Do Nothing&#8221; approach will be adopted. Use them as-is until you can get rid of them.</p>



<p>Other servers will likely need to be upgraded using the &#8220;one-for-one&#8221; approach. This will likely apply for larger database servers where resources are a concern. It may also be the case for specific application servers whose vendors insist on sysadmin privileges to the SQL Server. You&#8217;ll likely want to separate those application databases to restrict what the vendor has access to.</p>



<p>The majority of the SQL Servers will hopefully be considered candidates for potential consolidation, thus saving some licensing costs and simplifying your environment.</p>



<h3 class="wp-block-heading">Which option is right for you?</h3>



<p>As with most technical questions, the answer is: it depends. There is no clear one-size-fits-all approach for an upgrade project. Consider your timeline and budget, the business requirements and the other projects you have on your plate. Then make the best decision you can. </p>



<p>Not sure where to start? Or don&#8217;t have the bandwidth to tackle the upgrade project? We can help. We&#8217;ve walked this path before and can help guide you as you take the journey. <a href="http://theserogroup.com/#contact">Give us a call and let&#8217;s talk</a>.</p>
<p>The post <a href="https://theserogroup.com/sql-server/4-options-now-that-your-sql-server-2008-is-out-of-support/">4 Options Now That Your SQL Server 2008 Is Out of Support</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://theserogroup.com/sql-server/4-options-now-that-your-sql-server-2008-is-out-of-support/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		<enclosure url="http://theserogroup.com/wp-content/uploads/2019/07/Sql2008upgradetrain.mp4" length="33604392" type="video/mp4" />

		<post-id xmlns="com-wordpress:feed-additions:1">2436</post-id>	</item>
		<item>
		<title>Are Your SQL Servers Safe? IIS Attacks Increased 782x in One Quarter</title>
		<link>https://theserogroup.com/sql-server/are-your-sql-servers-safe-iis-attacks-increased-782x-in-one-quarter/</link>
		
		<dc:creator><![CDATA[Joe Webb]]></dc:creator>
		<pubDate>Mon, 15 Oct 2018 15:24:17 +0000</pubDate>
				<category><![CDATA[SQL Assess]]></category>
		<category><![CDATA[SQL Audit]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<guid isPermaLink="false">http://theserogroup.com/?p=2193</guid>

					<description><![CDATA[<p>Just when we thought that most cybersecurity attacks came via social engineering, we see this. Attacks on IIS, Microsoft&#8217;s web server, increased from 2,000 in Q1 2018 to over 1.7 million in Q2 2018. That&#8217;s a mind-boggling 782x increase! This is according to an esentire Security Advisory released last week. Hackers go-to tool of choice? PowerShell was the most commonly&#8230; <br /> <a class="read-more" href="https://theserogroup.com/sql-server/are-your-sql-servers-safe-iis-attacks-increased-782x-in-one-quarter/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/sql-server/are-your-sql-servers-safe-iis-attacks-increased-782x-in-one-quarter/">Are Your SQL Servers Safe? IIS Attacks Increased 782x in One Quarter</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Just when we thought that most cybersecurity attacks came via social engineering, we see this. Attacks on IIS, Microsoft&#8217;s web server, increased from 2,000 in Q1 2018 to over 1.7 million in Q2 2018. That&#8217;s a mind-boggling 782x increase! This is according to an <g class="gr_ gr_496 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" id="496" data-gr-id="496">esentire</g><a href="https://www.esentire.com/news-and-events/press-releases/iis-attacks-increase-according-to-threat-report/" target="_blank" rel="noreferrer noopener"> Security Advisory</a> released last week. Hackers <g class="gr_ gr_1093 gr-alert gr_gramm gr_inline_cards gr_run_anim Grammar only-ins doubleReplace replaceWithoutSep" id="1093" data-gr-id="1093">go-to</g> tool of choice? PowerShell was the most commonly used technique. </p>



<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" width="474" height="280" src="http://theserogroup.com/wp-content/uploads/2018/10/iisattacks.png" alt="" class="wp-image-2199" srcset="https://theserogroup.com/wp-content/uploads/2018/10/iisattacks.png 474w, https://theserogroup.com/wp-content/uploads/2018/10/iisattacks-300x177.png 300w" sizes="auto, (max-width: 474px) 100vw, 474px" /></figure></div>



<p>The scary part is that behind many IIS <g class="gr_ gr_4 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del" id="4" data-gr-id="4">web sites</g> sits the honeypot that the hackers are <g class="gr_ gr_5 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-del replaceWithoutSep" id="5" data-gr-id="5">after:</g> customer and other proprietary data in a Microsoft SQL Server database. Many websites, such as customer portals, online stores, software-as-a-service sites, and others, contain specific information about individuals that, if exposed, will cost the company dearly.</p>



<p>As my friend and SQL Server expert Steve Jones (<a href="https://twitter.com/way0utwest" target="_blank" rel="noopener">@way0utwest</a>) recently tweeted:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#8220;The amount of shareholder value that can be lost due to a data breach is the amount of shareholder value you have.&#8221; </p></blockquote>



<p>

Agreed. A well-targeted attack can bring down a company.

</p>



<p>Fortunately, Microsoft SQL Server can be made extremely secure if configured properly. Encryption, Role-based security, Auditing, and other mechanisms allow administrators to define, limit, and monitor access at a very granular level.</p>



<p>The problem is that not all SQL Servers are configured properly. Over 96% of the SQL Server instances we&#8217;ve assessed deviate from industry best practices in security, performance, or other configurations. This is troubling.</p>



<p>What can you do? Spend some time with your application developers, with your system and network administrator, and with your DBA team to review the layers of security designed into your systems. Are the Windows Servers patched and up to date? Have the appropriate rules been defined in your firewalls? And, of course, are your SQL Servers configured properly?</p>



<p>Not sure where to start with security for your SQL Servers? Review the following:</p>



<ul class="wp-block-list"><li><a href="https://docs.microsoft.com/en-us/dotnet/framework/data/adonet/sql/overview-of-sql-server-security" target="_blank">Overview of SQL Server Security</a></li><li><a href="https://docs.microsoft.com/en-us/sql/relational-databases/security/securing-sql-server?view=sql-server-2017" target="_blank" rel="noopener">Securing SQL Server</a></li><li><a href="https://blogs.msdn.microsoft.com/sqlsecurity/" target="_blank">MSDN SQL Server Security Blog</a></li><li><a href="https://www.mssqltips.com/sql-server-tip-category/19/security/" target="_blank">MSSQLTips SQL Server Security Tips</a></li></ul>



<p>Have questions? Give us a call. Our SQL Server Configuration Assessments maybe a good place for you to start.</p>
<p>The post <a href="https://theserogroup.com/sql-server/are-your-sql-servers-safe-iis-attacks-increased-782x-in-one-quarter/">Are Your SQL Servers Safe? IIS Attacks Increased 782x in One Quarter</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2193</post-id>	</item>
	</channel>
</rss>
