Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Auditing issues

  • Anchor
    SQLCM-4942
    SQLCM-4942
    If the audit settings are configured to audit DML events for a selected table, and extended events is enabled for DML and Select on the Instance, SQL Compliance Manager collects audit data for all tables and not only the selected table. If you turn off extended events, auditing correctly collects data for the selected table only.
  • Anchor
    SQLCM-4941
    SQLCM-4941
    Execute events are captured when extended events is enabled.
  • Anchor
    SQLCM-3642
    SQLCM-3642
    Cannot insert duplicate key row in object 'dbo.Events' with unique index 'IX_Events_eventId'.
  • Anchor
    SQLCM-3789
    SQLCM-3789
    DatabaseName appears as empty for Login Events. SQL Compliance Manager 5.4 traces do capture the DatabaseID, but do not include the database name.
  • Anchor
    SQLCM-4211
    SQLCM-4211
    Applying a regulation guideline does not work when there is a Privileged User defined.
  • Anchor
    SQLCM-3647
    SQLCM-3647
    Case-sensitive collation may prevent some trusted and privileged users from being captured.
  • Anchor
    SQLCM-4896
    SQLCM-4896
    Before-After data does not appear for Binary Collation SQL Server instances when extended events are is enabled.
  • Anchor
    SQLCM-4195
    SQLCM-4195
    Auditing an AlwaysOn database using the Node method causes the Registered SQL Servers list to display both nodes as Secondary.
  • Anchor
    SQLCM-4205
    SQLCM-4205
    Audit Snapshot does not include setting to capture DDL SQL statements.
  • Anchor
    SQLCM-4297
    SQLCM-4297
    Audit settings at an instance level take precedence over database-level settings for a Privileged User.
  • Anchor
    SQLCM-4674
    SQLCM-4674
    Agent trace folder permissions are overwritten when the Agent is deployed.
  • Anchor
    SQLCM-2544
    SQLCM-2544
    SQL Compliance Manager attempts to contact the Agent (heartbeat check) on attached archive databases.
  • Anchor
    SQLCM-4645
    SQLCM-4645
    Users who export reports to Microsoft Excel fail when the SQL text contains more than 32,767 characters.
  • Anchor
    SQLCM-3648
    SQLCM-3648
    Some SQL Server startup/stop events may cause the integrity check to fail.
  • Anchor
    SQLCM-2239
    SQLCM-2239
    The Audit Events tab may display an incorrect user name in the Login column when auditing start and stop server events.

  • Anchor
    SQLCM-2529
    SQLCM-2529
    A known SQL Server issue causes some SQL Compliance Manager SELECT statements to appear as DML events. This issue occurs when a user audits both SELECT and DML. SQL Compliance Manager captures many events when certain columns are selected from certain system tables from a single SELECT statement query and shows them as individual DML events.
    Specifically, the SELECT statement which uses the permissions() function generates only DML event traces and not a SELECT event trace. This step results in SQL Compliance Manager reporting the SELECT statement as a DML event. In addition, the permissions() function is deprecated. Microsoft recommends in MSDN documentation that users implement the Has_Perms_By_Name() function instead of the permissions() function. The difference between these two functions is that the permissions() function always generates the DML event traces while the Has_Perms_By_Name() function generates event traces according to permission type used. For example, SELECT event traces for SELECT permission types, and DML event traces for EXECUTE or DELETE permission types.

  • Anchor
    SQLCM-2136
    SQLCM-2136
    Users who change the default port for the AlwaysOn Availability Group from the default may experience the following issues. to avoid these issues, change the listener to the default port.

    • SQL Compliance Manager does not accept the name format when attempting to add the listener name using the Cluster Configuration Console.
    • If the port is not added, the agent cannot connect to the SQL Server instance. You can manually add the port to the registry setting later and it will then connect to the instance after restarting the SQLcomplianceAgent.
    • Users cannot connect to the SQL Server instance even when adding the listener with the port in the SQL CM console.
    • The Permissions Check also fails.
  • When you change the definition of a table you are auditing to include BLOB data types, the Before-After data trigger prevents UPDATE, DELETE, and INSERT operations from modifying the table, such as through stored procedures or third-party applications. This issue is most likely to occur when you are auditing all columns in the target table. This issue occurs because Before-After auditing does not support BLOB data types (such as text, image data, or XML code). To correct this issue, change the data definition of the table.

  • SQL Compliance Manager does not support collecting and processing events from encrypted SQL Server trace files. This issue is most likely to occur in environments that use third-party encryption software. For example, some applications can be configured to automatically encrypt all new files created on a specific computer. If you are running encryption software in your SQL Server environment, verify the encryption settings to ensure the application does not encrypt trace files on the audited SQL Server instances.

...