Guides for all SentryOne software (SQL Sentry) security topics (e.g. rights-based, role-based, the monitoring service and client, Azure, pass-through authentication, monitoring across domains, and more).
Articles
SQL Sentry Security Overview
Overview of where to find security requirements and options for SQL Sentry monitoring software.
SQL Sentry Rights Based Security
Guide to restricting user access within the SQL Sentry client based on Windows and SQL Server authentication accounts.
SQL Sentry Role Based Security
Guide to restricting user access within the SQL Sentry client based on SQL Sentry database roles.
SQL Sentry Monitoring Service Security
Guide to the permissions required by the SQL Sentry monitoring service account when watching targets.
SQL Sentry Client Security
Guide to the permissions required when running the SQL Sentry client, including scenarios in which the client connects directly to a monitored target.
Portal Security
Guide to security requirements and options available for controlling access to SQL Sentry Portal.
SQL Sentry Watching Targets Across Domains
Overview of the options available for watching targets across domains, including information about Pass-through Authentication and configuring SQL Sentry sites within your environment.
SQL Sentry Azure SQL Database and Azure Synapse SQL Pools Security
Covers SQL Sentry security aspects specific to Azure SQL Database and SQL Data Warehouse.
SQL Sentry Non-Windows Network Environment Security
Available options for watching instances in a non-Windows environment with SQL Sentry, including Pass-through Authentication.
SQL Sentry Pass-through Authentication
Guide to Pass-through Authentication with SentryOne.
SQL Sentry Performance Analysis Security Requirements
Advanced information about the SQL Sentry Performance Analysis security requirements, including port requirements for monitored targets.
SQL Sentry Performance Analysis Required Ports
Listing of required and default ports for SQL Sentry monitoring.