Table of Contents
- Title and Copyright Information
- Preface
- 1 Microsoft SQL Server Plug-in Overview and Prerequisites
-
2
Configure Microsoft SQL Server for Authentication
- Enabling and Finding TCP/IP Port Information
- Modifying the Permissions for Database Authentication
- Enabling SQL Authentication or Mixed Authentication
-
Authentication Configuration Scenarios
- Example 1: Local Monitoring with SQL Authentication
- Example 2: Local Monitoring with Windows Integrated Authentication (WIA)
- Example 3: Remote Monitoring with SQL Authentication
- Example 4: Remote Monitoring with Windows Integrated Authentication (WIA)
- Example 5: Cluster Remote Monitoring with SQL Authentication
- Example 6: Cluster remote monitoring with Windows Integrated Authentication
- 3 Discovery of the Microsoft SQL Server Target
- 4 Configuring Connections
- 5 Inventory and Usage Details
- 6 Creating, Editing, and Using Jobs
- 7 Using Reports and Monitoring Templates
- 8 Chargeback Functionality
-
9
Compliance Management
- About Compliance Management
- Managing Compliance Framework
- Configuring the SQL Server Configuration Compliance Standard
- "Create Like" Compliance Standard
- Editing a Compliance Standard
- Evaluating Compliance
- Using Trend Overview
- Using Compliance Reports
- Managing Compliance Violations
- Additional Information
- Index