It is a Robust and amazing product which meets all your Instance and DB level auditing requirements. Report scheduling, Alerts and getting custom reports in your mailbox are a few out of the box features which makes this product outstanding.
Hi friends! Delhi User Group presents Tech-Meet, your chance to learn Hot technologies from Industry experts. The half-day free event for professionals in Delhi NCR includes a great line-up of industry-recognized speakers. The event will start at sharp 9:30 AM and security takes time so please be on time to skip the line and grab [Read More]
Yesterday one of my friend asked me the process to create a SQL VM on Microsoft Azure, though the process is quite simple and easy but he asked me to help him since he never worked on Azure platform before. So this screen cast post is for those who never worked on Azure and want [Read More]
Before we even start discussing about this feature we must have an idea about Azure Storage accounts and how the security works in Azure. You can access your Azure storage account linked container because you are the owner, but let’s say you want to share this access (full or Partial) for a blob/container with someone [Read More]
In first part we discussed this feature and analyzed whether we should use it or not, now let’s see some of the benefits before we’ll discuss the steps to implement it. Apart from being a wonderful & cool looking concept this technology also delivers many benefits like: 1. You get a centralized copy of data [Read More]
This is a brand new technology which is introduced in SQL Server 2014, having said that believe me this is not something which is new to us – we’ve been using this technology since a long time in our daily life like: Streaming music files through internet or saving all your data on One Drive. [Read More]
We’ve already discussed Backup Encryption feature in detail, incase you’ve not covered those please find the link: Part-1Part-2Part-3 There are a few things you must know before you implement backup encryption in your environment, here I’ll try to list them: 1. Original Certificate which was used as an encryptor should be available at the [Read More]
In Part-1 we discussed the feature of backup encryption and part-2 walks us through the scripts to prepare for the pre-requisites and take an encrypted backup, In part-2 we took the backup of Repro_FGDN Database on MBTEST server. We took the encrypted backup using Certificate as an encryptor and used AES_256 encryption algorithm. In this [Read More]