Solved

SQL Server Update Security Patches

Posted on 2011-02-21
2
270 Views
Last Modified: 2012-05-11

I need the steps to applying SQL Server 2005 or 2008 R2 update security patches as I've never done.  
If videos are available would be helpful too; underwise, provide steps on how to apply security update patches/hotfixes from Development to Production.
0
Comment
Question by:Favorable
2 Comments
 
LVL 57

Accepted Solution

by:
Raja Jegan R earned 500 total points
ID: 34948784
Applying Security Patches or Service packs is a simple process..
Download the latest Service Pack for SQL Server 2005 ie., SQL Server 2005 SP4 and install as specified in the link below:

http://sqlblog.com/blogs/andy_leonard/archive/2008/03/14/applying-sql-server-service-packs-and-hotfixes.aspx

Note:
1. For SQL Server, Service packs are cumulative or incremental which means that the hotfixes released now and then would be consolidated into the Service Pack and the later fixes are included in the next service pack along with the prior hotfixes included in earlier Service pack.
2. You can apply Security patches as and when they are released.. (Installation step would be similar to the one specified in the link above)
3. Apply hotfixes only if you encounter that particular error.
0
 

Author Closing Comment

by:Favorable
ID: 34982785
solution was very helpful.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Long way back, we had to take help from third party tools in order to encrypt and decrypt data.  Gradually Microsoft understood the need for this feature and started to implement it by building functionality into SQL Server. Finally, with SQL 2008, …
INTRODUCTION: While tying your database objects into builds and your enterprise source control system takes a third-party product (like Visual Studio Database Edition or Red-Gate's SQL Source Control), you can achieve some protection using a sing…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question