Logo
CAR REVIEW
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows Server

SQL Server 2008 : Configuring the Instance (part 2) - Specifying the Backup Compression Default & Enabling Login Failure Auditing

6/26/2011 4:13:33 PM

4. Enabling Address Windows Extensions

Address Windows Extensions (AWE) is one of the configuration options that you should be aware of if you are running on 32-bit operating systems. Enabling AWE allows a 32-bit SQL Server to use more than 2 or 3 GB of RAM. You can enable AWE from the Server Properties dialog, as previously shown in Figure 4.

AWE is not applicable in 64-bit operating systems because 64-bit architecture does not have the same memory restrictions as 32-bit systems. There are additional configurations that you may want to consider prior to enabling AWE. The following list describes some configuration options:

How much memory do you have? If your server only has 4 GB of memory, do you need to enable AWE?

Do you need to enable /3gb? The /3gb switch in the boot.ini file allows processes to use more than 3 GB of memory.

Is the /pae switch enabled on your server? To take advantage of 4 GB of memory, you must enable the /pae switch.

Can you enable the Lock Pages in Memory option? Lock Pages in Memory identifies accounts that use a process to keep data pages in memory. That minimizes the amount of paging to virtual memory on disk. You have to enable Lock Pages in Memory on 32-bit systems in order to turn on AWE.

Unfortunately, those configuration options are system dependent and are difficult to cover in such a small section. So I encourage you to look for AWE in SQL Server Books Online or see the topic "Awe-Enabled Option" at http://msdn.microsoft.com/en-us/library/ms190731.aspx for more details.

5. Specifying the Backup Compression Default

The Backup Compression Default option enables you to compress backups without specifying the WITH COMPRESSION or WITH NO_COMPRESSION options to your backup statements. By default, SQL Server 2008 Enterprise Edition disables backup compression during the installation process. If you have determined that backup compression is your preferred choice for performing backups, then enable compression by default to remove the requirement of specifying that you want your databases compressed each and every time you initiate a backup.

You can specify backup compression by default from the Database Settings section of the Server Properties dialog, shown in Figure 5.

Figure 5. The Database Settings section of the Server Properties dialog

And you can specify compression by default through a stored procedure call. For example, the following will enable compression by default:

EXEC sys.sp_configure N'backup compression default', N'1'
GO
RECONFIGURE WITH OVERRIDE
GO

Specifying compression by default can save you time by eliminating one possible avenue for mistake. Imagine yourself on the night when you have to back up the database before applying a major change. You execute the backup command that you have been running for years, and it runs for hours. Too late, you realize that you forgot to include compression as part of that command. What makes matters worse is the fact that your server doesn't have enough space to keep that uncompressed backup on the server. So you have to back up the database again, after having lost time that you dearly need for the major change that your boss wants in place by 8:00 AM. Don't put yourself in the position of having to request compression each and every time you make a backup. Enable compression by default if you prefer to compress your backups.

6. Enabling Login Failure Auditing

We like to track successful and failed logins on the SQL Server instances that we support. Monitoring the failed login attempts to SQL Server enables you to identify and track down unwanted login activity against it. We also track successful logins to help identify who was logged into the system when unexpected actions occur. You can enable login auditing from the Security section of the Server Properties dialog, as shown in Figure 6.

Figure 6. The Security section of the Server Properties dialog

You may also invoke auditing via a call to the xp_instance_regwrite stored procedure. (That extended stored procedure allows you to write directly to your system registry.) For example:

USE [master]
GO
EXEC xp_instance_regwrite N'HKEY_LOCAL_MACHINE',_
N'Software\Microsoft\MSSQLServer\MSSQLServer', N'AuditLevel', _ REG_DWORD, 3
GO


Unfortunately, many of us (myself included) work in environments where we do not get 100% control over who has access to SQL Server. Someone in management has forced you to grant Insert, Update, and Delete permissions to non-DBA personal, and you are terrified about the mistakes that they can make. Logging successful logins to SQL Server allows you to identify when such individuals are in your system and can help you narrow down which individuals to pursue when all the data is deleted from a table and no one owns up to it.

Other -----------------
- SQL Server 2008 : Configuring the Instance (part 1) - Viewing Configuration Settings & Specifying Maximum and Minimum Server Memory
- Microsoft PowerPoint 2010 : Expanding PowerPoint Functionality - Loading and Unloading Add-ins
- Microsoft PowerPoint 2010 : Expanding PowerPoint Functionality - Viewing and Managing Add-ins
- Microsoft Dynamics CRM 2011 : Sending and Tracking Email Messages in Microsoft Dynamics CRM for Outlook
- Microsoft Dynamics CRM 2011 : Using Microsoft Dynamics CRM for Outlook - Using the Add Contacts Wizard
- Microsoft Dynamics CRM 2011 : Using Microsoft Dynamics CRM for Outlook - Creating and Tracking Contacts
- Windows Server 2008 R2 : Managing Disks and Disk Storage - Understand the Basics (part 2) - Work with Partitions & Use DiskPart
- Windows Server 2008 R2 : Managing Disks and Disk Storage - Understand the Basics (part 1) - Work with Your Storage
- SharePoint 2010 : Securing a SharePoint Farm
- SharePoint 2010 : Introducing SharePoint Security
- SQL Server 2008 : SQL Server Configuration Manager (part 2) - SQL Server Network Configuration
- SQL Server 2008 : SQL Server Configuration Manager (part 2) - SQL Server Network Configuration
- SQL Server 2008 : SQL Server Configuration Manager (part 1) - SQL Server Services
- BizTalk 2009 : WCF LOB Adapter SDK - WCF LOB Adapter Vivisected
- BizTalk 2009 : WCF LOB Adapter SDK - WCF LOB Adapters vs. WCF Services
- BizTalk 2009 : Understanding the WCF LOB Adapter
- SQL Server 2008 High Availability : Database Clustering
- SQL Server 2008 High Availability : Database Mirroring (part 2) - SharePoint and Database Mirroring
- SQL Server 2008 High Availability : Database Mirroring (part 1) - How to Configure Database Mirroring
- Sharepoint 2010 : SharePoint Disaster Recovery Testing and Maintenance
 
 
Most view of day
- Microsoft Exchange Server 2010 : Creating and Managing Accepted Domains (part 3) - Changing the Accepted Domain Type and Identifier , Removing Accepted Domains
- Adobe Flash Professional CS5 : Editing Bitmaps in an Outside Editor
- Microsoft Excel 2010 : Protecting and Securing a Workbook - Setting ActiveX Security Options
- Windows Phone 8 : Scheduled Tasks - Scheduled Task API Limitations
- Managing Windows 7 : Helping Each Other - Start the Session, Solve The Problem
- Sharepoint 2013 : Service Application Administration (part 4) - Setting Up the Farm Trust, Publishing a Service Application
- Microsoft Excel 2010 : Protecting and Securing a Workbook - Locking or Unlocking Worksheet Cells
- Creating DVD Movies with Windows DVD Maker (part 5) - Changing Other DVD Options
- Windows Phone 8 : Working with File Explorer (part 3) - Copying Multimedia Content to Your PC
- Windows Phone 7 : Running XNA Projects in Windows (part 5)
Top 10
- Windows Phone 8 : Scheduled Tasks - Scheduled Task API Limitations
- Windows Phone 8 : Scheduled Tasks - Updating Tiles Using a Scheduled Task Agent
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 5) - Editing an Existing To-Do Item
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 4) - Creating the To-Do Item Shell Tile, Saving a To-Do Item
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 3) - Debugging Scheduled Tasks
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 2) - TodoService, TodoItemViewModel
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 1) - TodoItem,TodoDataContext
- Windows Phone 8 : Scheduled Tasks - Using Scheduled Tasks
- Windows Phone 8 : Scheduled Tasks - Background Agent Types
- Windows Phone 8 : Windows Phone Toolkit Animated Page Transitions - Reusing the Transition Attached Properties
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro