You are designing an authentication strategy for a new server that has SQL Server 2014 installed.
The strategy must meet the following business requirements:
The account used to generate reports must be allowed to make a connection during certain hours only.
Failed authentication requests must be logged.
You need to recommend a technology that meets each business requirement. The solution must minimize the amount of events that are logged.
Which technologies should you recommend?
To answer, drag the appropriate solution to the correct business requirement in the answer area.
Select and Place:
Correct Answer:
Explanation/Reference:
Explanation/Reference:
* Logon triggers fire stored procedures in response to a LOGON event. This event is raised when a user session is established with an instance of SQL Server. Logon triggers fire after the authentication phase of logging in finishes, but before the user session is actually established.
You can use logon triggers to audit and control server sessions, such as by tracking login activity, restricting logins to SQL Server, or limiting the number of sessions for a specific login.
* Login auditing can be configured to write to the error log on the following events.
Failed logins
Successful logins
Both failed and successful logins
Incorrect:
* C2 audit mode can be configured through SQL Server Management Studio or with the c2 audit mode option in sp_configure. Selecting this option will configure the server to record both failed and successful attempts to access statements and objects.
Logon Triggers
Configure Login Auditing (SQL Server Management Studio)