Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

MalwareBytes SQL Server Install

Posted on 2015-02-18
6
Medium Priority
?
1,033 Views
Last Modified: 2015-02-20
Should be fairly simple to answer because SOMEONE out there has been through my pain.  I'm trying to install MalwareBytes Management Console using SQL Server and it refuses to find my server using what I know is a good path for the database address.

Database Address:  SERVER\MSSQLSERVER
User:  SandboxAdmin
Password:  Whatever

I keep getting the error message that the management console cannot find my SQL Server.  The SQL Server Browser service IS running, TCP and Named Pipes are on, I migrated a working SQL Server Express database onto SQL Server and I'm just trying to reconnect it (it was successfully attached).

Any help would be appreciated!
0
Comment
Question by:Mister Porsche GT3
  • 3
  • 3
6 Comments
 
LVL 30

Expert Comment

by:Rich Weissler
ID: 40618925
The instance name 'MSSQLSERVER' is normally the default instance.  Try leaving off the '\MSSQLSERVER' and just connect to the database server by the server name.
0
 

Author Comment

by:Mister Porsche GT3
ID: 40619094
No difference.  It is still reporting that it cannot connect to the server.  I've tried IP address too...same issue.
0
 
LVL 30

Expert Comment

by:Rich Weissler
ID: 40619189
I assume you connected via the Management Studio to attach the database.

Under Management, can you open the most recent log?  Confirm that when the server comes up, (1) it is using a normal port (hopefully 1433).. if it isn't, the log will tell you what port it's using , and that there aren't login errors.

In the properties of the server, confirm security is configured to Mixed mode authentication, not Windows mode.  (Again, I'm making an assumption that your login/password above are SQL logins.)

Hmm..  One other thought.  You moved this database... did you happen to create the login for SandBoxAdmin on the new server?  (The logins live in the master database.  The users live in your database.  I have a suspicion that you have an orphaned user, if you didn't explicitly copy the login.)
0
Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

 

Author Comment

by:Mister Porsche GT3
ID: 40621473
Hi Rich - Yes, DB is attached, SandboxAdmin user is created, port is 1433.  As a matter of security, we do not allow mixed mode.  I will try that for testing purposes however (good idea).
0
 
LVL 30

Accepted Solution

by:
Rich Weissler earned 2000 total points
ID: 40621525
If you look at the properties of the user SandboxAdmin, what login is associated with it?

Where there any errors in the SQL log related to failed connection attempts by that login?
0
 

Author Comment

by:Mister Porsche GT3
ID: 40621570
Rich - I took your idea and it logged in on the first try after creating a SQL user.  After doing a little bit more digging into why this happens, it would appear that MalwareBytes ONLY supports SQL authentication and doesn't support Windows authentication (really disappointing).  We'll have to figure out where to go from here (enterprise security decision).

That is...unless you know of a way to trick Malware Bytes into thinking it is using SQL authentication.  I believe I remember way back in the day there was a way to do this with ODBC, but I'll have to knock the rust off of that part of my brain.
0

Featured Post

Lessons on Wi-Fi & Recommendations on KRACK

Simplicity and security can be a difficult  balance for any business to tackle. Join us on December 6th for a look at your company's biggest security gap. We will also address the most recent attack, "KRACK" and provide recommendations on how to secure your Wi-Fi network today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What if you have to shut down the entire Citrix infrastructure for hardware maintenance, software upgrades or "the unknown"? I developed this plan for "the unknown" and hope that it helps you as well. This article explains how to properly shut down …
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
Using examples as well as descriptions, and references to Books Online, show the documentation available for date manipulation functions and by using a select few of these functions, show how date based data can be manipulated with these functions.
Via a live example, show how to shrink a transaction log file down to a reasonable size.

927 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question