Solved

MalwareBytes SQL Server Install

Posted on 2015-02-18
6
653 Views
Last Modified: 2015-02-20
Should be fairly simple to answer because SOMEONE out there has been through my pain.  I'm trying to install MalwareBytes Management Console using SQL Server and it refuses to find my server using what I know is a good path for the database address.

Database Address:  SERVER\MSSQLSERVER
User:  SandboxAdmin
Password:  Whatever

I keep getting the error message that the management console cannot find my SQL Server.  The SQL Server Browser service IS running, TCP and Named Pipes are on, I migrated a working SQL Server Express database onto SQL Server and I'm just trying to reconnect it (it was successfully attached).

Any help would be appreciated!
0
Comment
Question by:Mister Porsche GT3
  • 3
  • 3
6 Comments
 
LVL 29

Expert Comment

by:Rich Weissler
ID: 40618925
The instance name 'MSSQLSERVER' is normally the default instance.  Try leaving off the '\MSSQLSERVER' and just connect to the database server by the server name.
0
 

Author Comment

by:Mister Porsche GT3
ID: 40619094
No difference.  It is still reporting that it cannot connect to the server.  I've tried IP address too...same issue.
0
 
LVL 29

Expert Comment

by:Rich Weissler
ID: 40619189
I assume you connected via the Management Studio to attach the database.

Under Management, can you open the most recent log?  Confirm that when the server comes up, (1) it is using a normal port (hopefully 1433).. if it isn't, the log will tell you what port it's using , and that there aren't login errors.

In the properties of the server, confirm security is configured to Mixed mode authentication, not Windows mode.  (Again, I'm making an assumption that your login/password above are SQL logins.)

Hmm..  One other thought.  You moved this database... did you happen to create the login for SandBoxAdmin on the new server?  (The logins live in the master database.  The users live in your database.  I have a suspicion that you have an orphaned user, if you didn't explicitly copy the login.)
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 

Author Comment

by:Mister Porsche GT3
ID: 40621473
Hi Rich - Yes, DB is attached, SandboxAdmin user is created, port is 1433.  As a matter of security, we do not allow mixed mode.  I will try that for testing purposes however (good idea).
0
 
LVL 29

Accepted Solution

by:
Rich Weissler earned 500 total points
ID: 40621525
If you look at the properties of the user SandboxAdmin, what login is associated with it?

Where there any errors in the SQL log related to failed connection attempts by that login?
0
 

Author Comment

by:Mister Porsche GT3
ID: 40621570
Rich - I took your idea and it logged in on the first try after creating a SQL user.  After doing a little bit more digging into why this happens, it would appear that MalwareBytes ONLY supports SQL authentication and doesn't support Windows authentication (really disappointing).  We'll have to figure out where to go from here (enterprise security decision).

That is...unless you know of a way to trick Malware Bytes into thinking it is using SQL authentication.  I believe I remember way back in the day there was a way to do this with ODBC, but I'll have to knock the rust off of that part of my brain.
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Occasionally there is a need to clean table columns, especially if you have inherited legacy data. There are obviously many ways to accomplish that, including elaborate UPDATE queries with anywhere from one to numerous REPLACE functions (even within…
Slowly Changing Dimension Transformation component in data task flow is very useful for us to manage and control how data changes in SSIS.
Via a live example, show how to shrink a transaction log file down to a reasonable size.
Using examples as well as descriptions, and references to Books Online, show the documentation available for datatypes, explain the available data types and show how data can be passed into and out of variables.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now