Security

Guides for all SentryOne software (SQL Sentry) security topics (e.g. rights-based, role-based, the monitoring service and client, Azure, pass-through authentication, monitoring across domains, and more).

Articles

Security Overview
Overview of where to find security requirements and options for SentryOne (SQL Sentry) monitoring software.
 Rights Based Security
Discusses restricting user access within the SentryOne client based on Windows and SQL Server authentication accounts.
 Role Based Security
Discusses restricting user access within the SentryOne client based on SentryOne database roles.
Monitoring Service Security
Guide to the permissions required by the SentryOne monitoring service account when watching targets.
Client Security
Guide to the permissions required when running the SentryOne client, including scenarios in which the client connects directly to a monitored target.
SQL Sentry Watching Targets Across Domains
Overview of the options available for watching targets across domains, including information about Pass-through Authentication and configuring SentryOne sites within your environment.
Azure SQL Database and Data Warehouse Security
Covers security aspects specific to Azure SQL Database and SQL Data Warehouse.
Non-Windows Network Environment Security
Available options for watching instances in a non-Windows environment, including Pass-through Authentication.
SQL Sentry Pass-through Authentication
Guide to Pass-through Authentication with SentryOne.
Performance Analysis Security Requirements Updated
Advanced information about the Performance Analysis security requirements, including port requirements for monitored targets.
Performance Analysis Required Ports
Listing of required and default ports for SentryOne monitoring.