Avatar of marrowyung
marrowyung
 asked on

MS SQL server Brute-force protection

hi,

anyone implement Brute-force protection in MS SQL server? how can it be done other than complex password?
Microsoft SQL ServerMicrosoft SQL Server 2008SQL

Avatar of undefined
Last Comment
marrowyung

8/22/2022 - Mon
Pawan Kumar

We can use rdbgaurd. It is third party.
RdpGuard is a host-based intrusion prevention system (HIPS) that protects your Windows Server
 from brute-force attacks on various protocols and services (RDP, FTP, SMTP, MySQL, MS-SQL, IIS Web Login, ASP.NET Web Forms, MS Exchange,
 RD Web Access, etc).

Open in new window


Settings you can manage.
https://rdpguard.com/mssql-protection-settings.aspx

Free trial. We can use the free trial of rdpgaurd and see if it works fine with our requirement.
https://rdpguard.com/
marrowyung

ASKER
so this is for windows but it is not for SQL server natively ?
Pawan Kumar

Both.
I started with Experts Exchange in 2004 and it's been a mainstay of my professional computing life since. It helped me launch a career as a programmer / Oracle data analyst
William Peck
Pawan Kumar

edited my last comment. basically it will be 2 layer i think - Server and then DB.
marrowyung

ASKER
"edited my last comment. basically it will be 2 layer i think - Server and then DB."

so is one , that tools for both layer ?
ASKER CERTIFIED SOLUTION
Pawan Kumar

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
marrowyung

ASKER
tks.
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
Vitor Montalvão

Please explain what is for you a brute-force protection?
You can always hire some security guards that looks like gorillas and have them securing your data center :)
marrowyung

ASKER
"You can always hire some security guards that looks like gorillas and have them securing your data center :)"

application firewall or IP guard from cisco.

but from SQL server point of view, what can we do ?
Vitor Montalvão

Firewall is always the best thing to do so you can limit the machines that can connect to the SQL Server.
Then protect SQL Server instance by managing the accesses limiting it only to the necessary users and permissions.
Experts Exchange is like having an extremely knowledgeable team sitting and waiting for your call. Couldn't do my job half as well as I do without it!
James Murphy
SOLUTION
Vitor Montalvão

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
marrowyung

ASKER
"Then protect SQL Server instance by managing the accesses limiting it only to the necessary users and permissions."

you mean user access right, right ?
Vitor Montalvão

you mean user access right, right ?
Sure. There's no magic formula. The formula is always the same:
- Limit access from machines and people and give only the necessary permissions and not more.
marrowyung

ASKER
" Limit access from machines and people and give only the necessary permissions and not more."

DBA always do it and usually only give READ ONLY right to wave the effect of write operation.

but here is more on password attack and connection, anyway you use to block the IP address by SQL server control, we usually do IIS IP address filtering.
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
Vitor Montalvão

Did you read my articles?
Virtual accounts are almost unbreakable. For regular users use domain accounts with a strong password policy.
Database servers need to be installed in a different network in the background so they should be the last servers to be accessed, meaning that somebody that want to attack your database need to get first access to your main network and from there he needs to go through local firewalls until reach your database server. And you can add more network layers to add more security. The more complex the infrastructure is, more hard is to be broken by hackers.
marrowyung

ASKER
"Database servers need to be installed in a different network in the background so they should be the last servers to be accessed, meaning that somebody that want to attack your database need to get first access to your main network and from there he needs to go through local firewalls until reach your database server. "

sure.

this is very common for any ecommence platform, later on still depends on how many DMZ they got,

"And you can add more network layers to add more security. The more complex the infrastructure is, more hard is to be broken by hackers."

sure and tks.

knew about the "Windows Authentication mode" but that one also more security by domain login, which the whole information is encrypted across the network, so this is good and SQL login and password is not encrypted.

by Virtual Service account, it means SQL service account, right? the service account SQL server create when installing, right? I don't use this keyboard usually.
Vitor Montalvão

by Virtual Service account, it means SQL service account, right? the service account SQL server create when installing, right?
Yes. With that nobody is able to know the services passwords.
This is the best money I have ever spent. I cannot not tell you how many times these folks have saved my bacon. I learn so much from the contributors.
rwheeler23
marrowyung

ASKER
tks.
marrowyung

ASKER
tls both.