Security Overview

Security covers the following topics relating to SentryOne security, including required permissions for the various SentryOne components: 

Security TopicDescription
Monitoring Service SecurityThis topic discusses the permissions required by the SentryOne monitoring service account when Watching (monitoring) instances.
Client SecurityThis topic discusses the permissions required when running the SentryOne client, including scenarios in which the client connects directly to a monitored target.
Watching Targets Across DomainsThis topic is a brief overview of the options available for Watching (monitoring) targets across domains, including information about Pass-through Authentication and configuring SentryOne sites within your environment.
Non-Windows EnvironmentThis topic discusses the options for Watching (monitoring) instances in a non-Windows environment, including Pass-through Authentication.
SentryOne Performance AnalysisThis topic discusses advanced information about the Performance Analysis security requirements, including port requirements for monitored targets.
Azure SQL Database and Data WarehouseThis topic covers security aspects specific to Azure SQL Database and SQL Data Warehouse.
Rights Based SecurityThis topic discusses restricting user access within the SentryOne client based on Windows and SQL Server authentication accounts.
Role Based SecurityThis topic discusses restricting user access within the SentryOne client based on SentryOne database roles.

For more information about SentryOne security, see the Hardening SentryOne for Security article.