![(tick)](/s/gyu47z/9012/1phy4ty/_/images/icons/emoticons/check.svg) | Follow these steps ... |
---|
![(tick)](/s/gyu47z/9012/1phy4ty/_/images/icons/emoticons/check.svg) | Register the SQL Server instances whose security models you want to assess and audit. |
![(tick)](/s/gyu47z/9012/1phy4ty/_/images/icons/emoticons/check.svg) | Configure snapshots to collect audit data from the registered instances. |
![(tick)](/s/gyu47z/9012/1phy4ty/_/images/icons/emoticons/check.svg) | Find security issues using the default All Servers policy. |
![(tick)](/s/gyu47z/9012/1phy4ty/_/images/icons/emoticons/check.svg) | Create custom policies to assess compliance to specific security regulations. |
![(tick)](/s/gyu47z/9012/1phy4ty/_/images/icons/emoticons/check.svg) | Save assessments for policies you want to use in your audit process. |
![(tick)](/s/gyu47z/9012/1phy4ty/_/images/icons/emoticons/check.svg) | Compare assessments to identify changes over time. |
![(tick)](/s/gyu47z/9012/1phy4ty/_/images/icons/emoticons/check.svg) | Perform forensic analysis of your security model using the Permissions Explorer. |
![(tick)](/s/gyu47z/9012/1phy4ty/_/images/icons/emoticons/check.svg) | Discover vulnerabilities using the built-in reports. |