...
...
- If the audit settings are configured to audit DML events for a selected table, and extended events is enabled for DML and Select on the Instance, SQL Compliance Manager collects audit data for all tables and not only the selected table. If you turn off extended events, auditing correctly collects data for the selected table only.
- (Fixed in version 5.5) Execute events are captured when extended events is enabled. There may be some extra events captured and shown through the Extended Events auditing than the events shown through the Trace method.
- (Fixed in version 5.4.2) Cannot Cannot insert duplicate key row in object 'dbo.Events' with unique index 'IX_Events_eventId'.
- (Fixed in version 5.4.2) DatabaseName appears as empty for Login Events. SQL Compliance Manager 5.4 traces do capture the DatabaseID, but do not include the database name.
- (Fixed in version 5.5) Applying a regulation guideline does not work when there is a Privileged User defined.
- (Fixed in version 5.4.2) Case-sensitive collation may prevent some trusted and privileged users from being captured.
- (Fixed in version 5.4.2) Auditing an AlwaysOn database using the Node method causes the Registered SQL Servers list to display both nodes as Secondary.
- Audit Snapshot does not include setting to capture DDL SQL statements.
- Before-After data does not appear for Binary Collation SQL Server instances when extended events is enabled.
- (Fixed in version 5.4.2) Audit settings at an instance level take precedence over database-level settings for a Privileged User.
- (Fixed in version 5.5) Agent trace folder permissions are overwritten when the Agent is deployed.
- (Fixed in version 5.4) SQL Compliance Manager attempts to contact the Agent (heartbeat check) on attached archive databases.
- (Fixed in version 5.5) Users who export reports to Microsoft Excel fail when the SQL text contains more than 32,767 characters.
- (Fixed in version 5.4.2) Some SQL Server startup/stop events may cause the integrity check to fail.
- The Audit Events tab may display an incorrect user name in the Login column when auditing start and stop server events.
(Fixed in version 5.4.2) A known SQL Server issue causes some SQL Compliance Manager SELECT statements to appear as DML events. This issue occurs when a user audits both SELECT and DML. SQL Compliance Manager captures many events when certain columns are selected from certain system tables from a single SELECT statement query and shows them as individual DML events.
Specifically, the SELECT statement which uses the permissions()
function generates only DML event traces and not a SELECT event trace. This step results in SQL Compliance Manager reporting the SELECT statement as a DML event. In addition, the permissions()
function is deprecated. Microsoft recommends in MSDN documentation that users implement the Has_Perms_By_Name()
function instead of the permissions()
function. The difference between these two functions is that the permissions()
function always generates the DML event traces while the Has_Perms_By_Name()
function generates event traces according to permission type used. For example, SELECT event traces for SELECT permission types, and DML event traces for EXECUTE or DELETE permission types.
- (Fixed in version 5.4.2) Users who change the default port for the AlwaysOn Availability Group from the default may experience the following issues. to avoid these issues, change the listener to the default port.
- SQL Compliance Manager does not accept the name format when attempting to add the listener name using the Cluster Configuration Console.
- If the port is not added, the agent cannot connect to the SQL Server instance. You can manually add the port to the registry setting later and it will then connect to the instance after restarting the SQLcomplianceAgent.
- Users cannot connect to the SQL Server instance even when adding the listener with the port in the SQL CM console.
- The Permissions Check also fails.
When you change the definition of a table you are auditing to include BLOB data types, the Before-After data trigger prevents UPDATE, DELETE, and INSERT operations from modifying the table, such as through stored procedures or third-party applications. This issue is most likely to occur when you are auditing all columns in the target table. This issue occurs because Before-After auditing does not support BLOB data types (such as text, image data, or XML code). To correct this issue, change the data definition of the table.
SQL Compliance Manager does not support collecting and processing events from encrypted SQL Server trace files. This issue is most likely to occur in environments that use third-party encryption software. For example, some applications can be configured to automatically encrypt all new files created on a specific computer. If you are running encryption software in your SQL Server environment, verify the encryption settings to ensure the application does not encrypt trace files on the audited SQL Server instances.
Anchor |
---|
| SQLCM-4963/4974 |
---|
| SQLCM-4963/4974 |
---|
|
After removing a server from auditing and leave registered databases archived, the user is able to right-click the archived database ‘server’ and register databases to audit. - Users can select “Capture SQL statements for DDL activities” only if the “Database Definition DDL” option is saved first.
...