17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9 – Honeycombing a DatabaseFigure 9-1: Screenshot from <strong>Red</strong> <strong>Gate</strong> SQL Data GeneratorCreating a Server AuditIn order to capture the activity of would-be data thieves on our honeycombtable, we need to implement the auditing feature of SQL Server 2008. The firststep in this process is to create a Server Audit object, which allows us tomonitor a collection of actions that might occur on the target table, and recordthis activity in a file, typically the Windows Application log file.The syntax of the CREATE SERVER AUDIT method is as follows:CREATE SERVER AUDIT [Audit Name] TO [Output Location]The arguments to this method are:• Audit Name – the textual reference to the server audit.• Output Location – the options for this argument are:• FILE: write to a binary file. The file path is required inparenthesis after "File" is specified.• APPLICATION_LOG: write to the Windows Application Log.• SECURITY_LOG: write to the Windows Security Log.In Listing 9-3, we create in the Master database a Server Audit object calledHoneycomb_Audit, which will write to the Windows Application Log.190

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!