Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Suspect OS Windows Accounts tab lists the Windows user accounts about which SQL Secure was unable to retrieve information when the snapshot was taken. OS Windows accounts are Active Directory users and groups that have permissions on OS objects such as registry keys.

...

OptionDescription
Group ByAllows you to organize the list by the column headers
Save as Excel FileAllows you to save your suspect windows accounts list to an Excel file
PrintAllows you to print out your list
Tip

You can also click any column header and select to display All, Blanks, Non Blanks, or filter Custom criteria. For more information on how to add conditions to filter criteria for domain, click here.

When SQL Secure considers an account suspect

...

  • The user account has been deleted
  • The collection credentials do not have sufficient permissions to access Active Directory
  • A one-way trust exists between the domain of the collection credentials and the domain of the Windows account
  • The account is a well-known group, such as Everyone or Terminal Server User, whose membership is hidden by Active Directory and therefore cannot be collected
Tip

You can

...

use a pass-through account to successfully collect Windows account information when encountering one-way trusted domains. A pass-through account is an account that has the same name and password as the account specified for gathering group membership information. A pass-through account does not require elevated Windows privileges in the trusted domain. For more information, search for "pass-through account" on

...

the Microsoft Help and Support Web site (support.microsoft.com).

...

SQL Secure tells you who has access to what on your SQL Server databases. Learn more > >

...