Solved

MS SQL restrict access to database

Posted on 2009-07-13
2
317 Views
Last Modified: 2012-08-14
hi,
A security inspection on a SQL 2005 server recommended ..
"restricting access to the database  to allowed static IP addresses"...
  it also makes reference to detecting the SQL server via port 4002 ...and thus gaining an in-sight to what version is running etc etc.
Does anyone have any advice on how to complete t his recommendation ?

regards





0
Comment
Question by:itst
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 28

Accepted Solution

by:
strickdd earned 200 total points
ID: 24839669
When you set up the server you can specify what port to listen on. This may require setting up port forwarding on your router to the new port. (http://www.databasejournal.com/features/mssql/article.php/3689846/Using-Non-Standard-Port-for-SQL-Server.htm)

To resolve the static IP addresses, it isn't necessary, but if you know only a certain set of computers can connect to the server you can create a white list of IPs to connect to the server.
0
 

Author Closing Comment

by:itst
ID: 31602763
no final solution yet
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

by Mark Wills PIVOT is a great facility and solves many an EAV (Entity - Attribute - Value) type transformation where we need the information held as data within a column to become columns in their own right. Now, in some cases that is relatively…
In SQL Server, when rows are selected from a table, does it retrieve data in the order in which it is inserted?  Many believe this is the case. Let us try to examine for ourselves with an example. To get started, use the following script, wh…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question