| Follow these steps ... |
---|
| Register the SQL Server instances whose security models you want to assess and audit. |
| Configure snapshots to collect audit data from the registered instances. |
| Find security issues using the default All Servers policy. |
| Create custom policies to assess compliance to specific security regulations. |
| Save assessments for policies you want to use in your audit process. |
| Compare assessments to identify changes over time. |
| Perform forensic analysis of your security model using the Permissions Explorer. |
| Discover vulnerabilities using the built-in reports. |