SlideShare a Scribd company logo
1 of 13
Download to read offline
SQL DATABASE AUDIT
Auditing an instance of the SQL Server Database Engine or an individual database involves
tracking and logging events that occur on the Database Engine. SQL Server audit lets you
create server audits, which can contain server audit specifications for server level events,
and database audit specifications for database level events.
There are several levels of auditing for SQL Server, depending on government or standards
requirements for your installation.
You can record server audit action groups per-instance, and either database audit action
groups or database audit actions per database. The audit event will occur every time that
the auditable action is encountered.
All editions of SQL Server support server level audits. Database level auditing is limited to
Enterprise, Developer, and Evaluation editions.

http://www.sql-programmers.com/sql-database-audit.aspx
WHY DATABASE AUDIT?
•

Enable future accountability for current actions taken in a particular schema, table, row
or affecting specific content

•

Deter users from inappropriate actions based on that accountability

•

Investigate suspicious activity

•

Notify an auditor that an unauthorized user is manipulating or deleting data and that
the user has more privileges than expected which can lead to reassessing user
authorizations

•

Monitor and gather data about specific database activities

http://www.sql-programmers.com/sql-database-audit.aspx
OVERVIEW OF SQL AUDIT
You can use SQL Server Management Studio or Transact-SQL to define an audit. After the
audit is created and enabled, the target will receive entries.
You can read the Windows event logs by using the Event Viewer utility in Windows. For file
targets, you can use either the Log File Viewer in SQL Server Management Studio or
the fn_get_audit_file function to read the target file.
The general process for creating and using an audit is as follows.
Create an audit and define the target.
Create either a server audit specification or database audit specification that maps to
the audit. Enable the audit specification.
Enable the audit.
Read the audit events by using the Windows Event Viewer, Log File Viewer, or the
fn_get_audit_file function.
http://www.sql-programmers.com/sql-database-audit.aspx
SQL SERVER AUDIT COMPONENTS
An audit is the combination of several elements into a single package for a specific
group of server actions or database actions. The components of SQL Server audit
combine to produce an output that is called an audit, just as a report definition
combined with graphics and data elements produces a report.
SQL Server audit uses Extended Events to help create an audit.

http://www.sql-programmers.com/sql-database-audit.aspx
SQL DATABASE AUDIT SPECIFICATION
The Server Audit Specification object belongs to an audit. You can create one server audit
specification per audit, because both are created at the SQL Server instance scope.
The database audit specification collects database-level audit actions raised by the
Extended Events feature. You can add either audit action groups or audit events to a
database audit specification. Audit events are the atomic actions that can be audited by the
SQL Server engine. Audit action groups are predefined groups of actions. Both are at the
SQL Server database scope. These actions are sent to the audit, which records them in the
target. Do not include server-scoped objects, such as the system views, in a user database
audit specification

http://www.sql-programmers.com/sql-database-audit.aspx
TARGET
The results of an audit are sent to a target, which can be a file, the Windows Security event
log, or the Windows Application event log. Logs must be reviewed and archived periodically
to make sure that the target has sufficient space to write additional records
When you are saving audit information to a file, to help prevent tampering, you can restrict
access to the file location in the following ways:
The SQL Server Service Account must have both Read and Write permission.
Audit Administrators typically require Read and Write permission. This assumes that
the Audit Administrators are Windows accounts for administration of audit files, such
as: copying them to different shares, backing them up, and so on.
Audit Readers that are authorized to read audit files must have Read permission

http://www.sql-programmers.com/sql-database-audit.aspx
DATABASE MIRRORING AND SQL AUDIT
A database that has a database audit specification defined and that uses database
mirroring will include the database audit specification. To work correctly on the mirrored
SQL instance, the following items must be configured:
•

The mirror server must have an audit with the same GUID to enable the database audit
specification to write audit records. This can be configured by using the command
CREATE AUDIT WITH GUID= <GUID from source Server Audit>.

•

For binary file targets, the mirror server service account must have appropriate
permissions to the location where the audit trail is being written.

•

For Windows event log targets, the security policy on the computer where the mirror
server is located must allow for service account access to the security or application
event log.

http://www.sql-programmers.com/sql-database-audit.aspx
DDL STATEMENTS
You can use the following DDL statements to create, alter, and drop audit
specifications:
ALTER AUTHORIZATION

CREATE SERVER AUDIT

ALTER DATABASE AUDIT SPECIFICATION

CREATE SERVER AUDIT SPECIFICATION

ALTER SERVER AUDIT

DROP DATABASE AUDIT SPECIFICATION

ALTER SERVER AUDIT SPECIFICATION

DROP SERVER AUDIT

CREATE DATABASE AUDIT SPECIFICATION

DROP SERVER AUDIT SPECIFICATION

http://www.sql-programmers.com/sql-database-audit.aspx
DYNAMIC VIEWS AND FUNCTIONS
The following table lists the dynamic views and function that you can use for
SQL Server Auditing
Dynamic views and functions

Description

sys.dm_audit_actions

Returns a row for every audit action that can be reported
in the audit log and every audit action group that can be
configured as part of SQL Server Audit.

sys.dm_server_audit_status

Provides information about the current state of the audit.

sys.dm_audit_class_type_map

Returns a table that maps the class_type field in the audit
log to the class_desc field in sys.dm_audit_actions.

fn_get_audit_file

Returns information from an audit file created by a server
audit.

http://www.sql-programmers.com/sql-database-audit.aspx
CATALOG VIEWS AND FUNCTIONS
The following table lists the catalog views that you can use for SQL Server
auditing.
Catalog views

Description

sys.database_ audit_specifications

Contains information about the database audit specifications in a
SQL Server audit on a server instance.

sys.database_audit_specification_de Contains information about the database audit specifications in a
tails
SQL Server audit on a server instance for all databases.

sys.server_audits

Contains one row for each SQL Server audit in a server instance.

sys.server_audit_specifications

Contains information about the server audit specifications in a
SQL Server audit on a server instance.

sys.server_audit_specifications_detai Contains information about the server audit specification details
ls
(actions) in a SQL Server audit on a server instance.
sys.server_file_audits

Contains stores extended information about the file audit type in
a SQL Server audit on a server instance.

http://www.sql-programmers.com/sql-database-audit.aspx
PERMISSIONS
Each feature and command for SQL Server Audit has individual permission requirements.
Unless otherwise specified, viewing catalog views requires a principal to have one of the
following:
•

Membership in the sysadmin fixed server role

•

The CONTROL SERVER permission

•

The VIEW SERVER STATE permission

•

The ALTER ANY AUDIT permission

•

The VIEW AUDIT STATE permission (gives only the principal access to the
sys.server_audits catalog view)

http://www.sql-programmers.com/sql-database-audit.aspx
PERMISSIONS – contd…
Principals in the sysadmin role can tamper with any audit component and those in the
db_owner role can tamper with audit specifications in a database. SQL Server Audit will
validate that a logon that creates or alters an audit specification has at least the ALTER ANY
DATABASE AUDIT permission. However, it does no validation when you attach a database.
You should assume all Database Audit Specifications are only as trustworthy as those
principals in the sysadmin or db_owner role.

http://www.sql-programmers.com/sql-database-audit.aspx
THANK YOU !
http://www.sql-programmers.com

More Related Content

What's hot

Understanding my database through SQL*Plus using the free tool eDB360
Understanding my database through SQL*Plus using the free tool eDB360Understanding my database through SQL*Plus using the free tool eDB360
Understanding my database through SQL*Plus using the free tool eDB360
Carlos Sierra
 

What's hot (20)

IBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster RecoveryIBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster Recovery
 
Understanding my database through SQL*Plus using the free tool eDB360
Understanding my database through SQL*Plus using the free tool eDB360Understanding my database through SQL*Plus using the free tool eDB360
Understanding my database through SQL*Plus using the free tool eDB360
 
IBM Cloud Integration Platform Introduction - Integration Tech Conference
IBM Cloud Integration Platform Introduction - Integration Tech ConferenceIBM Cloud Integration Platform Introduction - Integration Tech Conference
IBM Cloud Integration Platform Introduction - Integration Tech Conference
 
Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDB
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 
Sql server troubleshooting
Sql server troubleshootingSql server troubleshooting
Sql server troubleshooting
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
REST-API introduction for developers
REST-API introduction for developersREST-API introduction for developers
REST-API introduction for developers
 
MAA Best Practices for Oracle Database 19c
MAA Best Practices for Oracle Database 19cMAA Best Practices for Oracle Database 19c
MAA Best Practices for Oracle Database 19c
 
Kubernetes - Security Journey
Kubernetes - Security JourneyKubernetes - Security Journey
Kubernetes - Security Journey
 
High Availability in Microsoft Azure
High Availability in Microsoft AzureHigh Availability in Microsoft Azure
High Availability in Microsoft Azure
 
Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900
 
My First 100 days with an Exadata (PPT)
My First 100 days with an Exadata (PPT)My First 100 days with an Exadata (PPT)
My First 100 days with an Exadata (PPT)
 
[DanNotes] XPages - Beyound the Basics
[DanNotes] XPages - Beyound the Basics[DanNotes] XPages - Beyound the Basics
[DanNotes] XPages - Beyound the Basics
 
Case study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash BadoneCase study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash Badone
 
Containers Anywhere with OpenShift by Red Hat
Containers Anywhere with OpenShift by Red HatContainers Anywhere with OpenShift by Red Hat
Containers Anywhere with OpenShift by Red Hat
 
Introduction to Google Cloud Platform
Introduction to Google Cloud PlatformIntroduction to Google Cloud Platform
Introduction to Google Cloud Platform
 
Oracle Security Presentation
Oracle Security PresentationOracle Security Presentation
Oracle Security Presentation
 
Oracle WebLogic Diagnostics & Perfomance tuning
Oracle WebLogic Diagnostics & Perfomance tuningOracle WebLogic Diagnostics & Perfomance tuning
Oracle WebLogic Diagnostics & Perfomance tuning
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Similar to Sql database audit

24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
SpanishPASSVC
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
ukdpe
 
Monitor and tune for performance
Monitor and tune for performanceMonitor and tune for performance
Monitor and tune for performance
Steve Xu
 
Microsoft SQL Server 2008 R2 - Manageability Presentation
Microsoft SQL Server 2008 R2 - Manageability PresentationMicrosoft SQL Server 2008 R2 - Manageability Presentation
Microsoft SQL Server 2008 R2 - Manageability Presentation
Microsoft Private Cloud
 
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docxDBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
seifusisay06
 
Be05 introduction to sql azure
Be05   introduction to sql azureBe05   introduction to sql azure
Be05 introduction to sql azure
DotNetCampus
 
Sql server-performance-hafi
Sql server-performance-hafiSql server-performance-hafi
Sql server-performance-hafi
zabi-babi
 

Similar to Sql database audit (20)

Implementing Auditing in SQL Server
Implementing Auditing in SQL ServerImplementing Auditing in SQL Server
Implementing Auditing in SQL Server
 
Rock Solid SQL Server Management
Rock Solid SQL Server ManagementRock Solid SQL Server Management
Rock Solid SQL Server Management
 
Maria db audit plugin introduction v1.3
Maria db audit plugin introduction v1.3Maria db audit plugin introduction v1.3
Maria db audit plugin introduction v1.3
 
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite Things
 
Monitor and tune for performance
Monitor and tune for performanceMonitor and tune for performance
Monitor and tune for performance
 
KoprowskiT_Session2_SDNEvent_SourceControlForDBA
KoprowskiT_Session2_SDNEvent_SourceControlForDBAKoprowskiT_Session2_SDNEvent_SourceControlForDBA
KoprowskiT_Session2_SDNEvent_SourceControlForDBA
 
Microsoft SQL Server 2008 R2 - Manageability Presentation
Microsoft SQL Server 2008 R2 - Manageability PresentationMicrosoft SQL Server 2008 R2 - Manageability Presentation
Microsoft SQL Server 2008 R2 - Manageability Presentation
 
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docxDBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
 
SQL Server and System Center Advisor
SQL Server and System Center AdvisorSQL Server and System Center Advisor
SQL Server and System Center Advisor
 
WinOps Conf 2016 - Ed Wilson - Configuration Management with Azure DSC
WinOps Conf 2016 - Ed Wilson - Configuration Management with Azure DSCWinOps Conf 2016 - Ed Wilson - Configuration Management with Azure DSC
WinOps Conf 2016 - Ed Wilson - Configuration Management with Azure DSC
 
Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101
 
Monitor database essentials with Applications Manager
Monitor database essentials with Applications ManagerMonitor database essentials with Applications Manager
Monitor database essentials with Applications Manager
 
Sql server basics
Sql server basicsSql server basics
Sql server basics
 
Be05 introduction to sql azure
Be05   introduction to sql azureBe05   introduction to sql azure
Be05 introduction to sql azure
 
Sql Sever Presentation.pptx
Sql Sever Presentation.pptxSql Sever Presentation.pptx
Sql Sever Presentation.pptx
 
Whatsnew in-my sql-primary
Whatsnew in-my sql-primaryWhatsnew in-my sql-primary
Whatsnew in-my sql-primary
 
Sql server-performance-hafi
Sql server-performance-hafiSql server-performance-hafi
Sql server-performance-hafi
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 

Sql database audit

  • 1. SQL DATABASE AUDIT Auditing an instance of the SQL Server Database Engine or an individual database involves tracking and logging events that occur on the Database Engine. SQL Server audit lets you create server audits, which can contain server audit specifications for server level events, and database audit specifications for database level events. There are several levels of auditing for SQL Server, depending on government or standards requirements for your installation. You can record server audit action groups per-instance, and either database audit action groups or database audit actions per database. The audit event will occur every time that the auditable action is encountered. All editions of SQL Server support server level audits. Database level auditing is limited to Enterprise, Developer, and Evaluation editions. http://www.sql-programmers.com/sql-database-audit.aspx
  • 2. WHY DATABASE AUDIT? • Enable future accountability for current actions taken in a particular schema, table, row or affecting specific content • Deter users from inappropriate actions based on that accountability • Investigate suspicious activity • Notify an auditor that an unauthorized user is manipulating or deleting data and that the user has more privileges than expected which can lead to reassessing user authorizations • Monitor and gather data about specific database activities http://www.sql-programmers.com/sql-database-audit.aspx
  • 3. OVERVIEW OF SQL AUDIT You can use SQL Server Management Studio or Transact-SQL to define an audit. After the audit is created and enabled, the target will receive entries. You can read the Windows event logs by using the Event Viewer utility in Windows. For file targets, you can use either the Log File Viewer in SQL Server Management Studio or the fn_get_audit_file function to read the target file. The general process for creating and using an audit is as follows. Create an audit and define the target. Create either a server audit specification or database audit specification that maps to the audit. Enable the audit specification. Enable the audit. Read the audit events by using the Windows Event Viewer, Log File Viewer, or the fn_get_audit_file function. http://www.sql-programmers.com/sql-database-audit.aspx
  • 4. SQL SERVER AUDIT COMPONENTS An audit is the combination of several elements into a single package for a specific group of server actions or database actions. The components of SQL Server audit combine to produce an output that is called an audit, just as a report definition combined with graphics and data elements produces a report. SQL Server audit uses Extended Events to help create an audit. http://www.sql-programmers.com/sql-database-audit.aspx
  • 5. SQL DATABASE AUDIT SPECIFICATION The Server Audit Specification object belongs to an audit. You can create one server audit specification per audit, because both are created at the SQL Server instance scope. The database audit specification collects database-level audit actions raised by the Extended Events feature. You can add either audit action groups or audit events to a database audit specification. Audit events are the atomic actions that can be audited by the SQL Server engine. Audit action groups are predefined groups of actions. Both are at the SQL Server database scope. These actions are sent to the audit, which records them in the target. Do not include server-scoped objects, such as the system views, in a user database audit specification http://www.sql-programmers.com/sql-database-audit.aspx
  • 6. TARGET The results of an audit are sent to a target, which can be a file, the Windows Security event log, or the Windows Application event log. Logs must be reviewed and archived periodically to make sure that the target has sufficient space to write additional records When you are saving audit information to a file, to help prevent tampering, you can restrict access to the file location in the following ways: The SQL Server Service Account must have both Read and Write permission. Audit Administrators typically require Read and Write permission. This assumes that the Audit Administrators are Windows accounts for administration of audit files, such as: copying them to different shares, backing them up, and so on. Audit Readers that are authorized to read audit files must have Read permission http://www.sql-programmers.com/sql-database-audit.aspx
  • 7. DATABASE MIRRORING AND SQL AUDIT A database that has a database audit specification defined and that uses database mirroring will include the database audit specification. To work correctly on the mirrored SQL instance, the following items must be configured: • The mirror server must have an audit with the same GUID to enable the database audit specification to write audit records. This can be configured by using the command CREATE AUDIT WITH GUID= <GUID from source Server Audit>. • For binary file targets, the mirror server service account must have appropriate permissions to the location where the audit trail is being written. • For Windows event log targets, the security policy on the computer where the mirror server is located must allow for service account access to the security or application event log. http://www.sql-programmers.com/sql-database-audit.aspx
  • 8. DDL STATEMENTS You can use the following DDL statements to create, alter, and drop audit specifications: ALTER AUTHORIZATION CREATE SERVER AUDIT ALTER DATABASE AUDIT SPECIFICATION CREATE SERVER AUDIT SPECIFICATION ALTER SERVER AUDIT DROP DATABASE AUDIT SPECIFICATION ALTER SERVER AUDIT SPECIFICATION DROP SERVER AUDIT CREATE DATABASE AUDIT SPECIFICATION DROP SERVER AUDIT SPECIFICATION http://www.sql-programmers.com/sql-database-audit.aspx
  • 9. DYNAMIC VIEWS AND FUNCTIONS The following table lists the dynamic views and function that you can use for SQL Server Auditing Dynamic views and functions Description sys.dm_audit_actions Returns a row for every audit action that can be reported in the audit log and every audit action group that can be configured as part of SQL Server Audit. sys.dm_server_audit_status Provides information about the current state of the audit. sys.dm_audit_class_type_map Returns a table that maps the class_type field in the audit log to the class_desc field in sys.dm_audit_actions. fn_get_audit_file Returns information from an audit file created by a server audit. http://www.sql-programmers.com/sql-database-audit.aspx
  • 10. CATALOG VIEWS AND FUNCTIONS The following table lists the catalog views that you can use for SQL Server auditing. Catalog views Description sys.database_ audit_specifications Contains information about the database audit specifications in a SQL Server audit on a server instance. sys.database_audit_specification_de Contains information about the database audit specifications in a tails SQL Server audit on a server instance for all databases. sys.server_audits Contains one row for each SQL Server audit in a server instance. sys.server_audit_specifications Contains information about the server audit specifications in a SQL Server audit on a server instance. sys.server_audit_specifications_detai Contains information about the server audit specification details ls (actions) in a SQL Server audit on a server instance. sys.server_file_audits Contains stores extended information about the file audit type in a SQL Server audit on a server instance. http://www.sql-programmers.com/sql-database-audit.aspx
  • 11. PERMISSIONS Each feature and command for SQL Server Audit has individual permission requirements. Unless otherwise specified, viewing catalog views requires a principal to have one of the following: • Membership in the sysadmin fixed server role • The CONTROL SERVER permission • The VIEW SERVER STATE permission • The ALTER ANY AUDIT permission • The VIEW AUDIT STATE permission (gives only the principal access to the sys.server_audits catalog view) http://www.sql-programmers.com/sql-database-audit.aspx
  • 12. PERMISSIONS – contd… Principals in the sysadmin role can tamper with any audit component and those in the db_owner role can tamper with audit specifications in a database. SQL Server Audit will validate that a logon that creates or alters an audit specification has at least the ALTER ANY DATABASE AUDIT permission. However, it does no validation when you attach a database. You should assume all Database Audit Specifications are only as trustworthy as those principals in the sysadmin or db_owner role. http://www.sql-programmers.com/sql-database-audit.aspx