Table of Contents
- Title and Copyright Information
- Preface
- 1 Microsoft SQL Server Plug-in Overview and Prerequisites
- 
               
               
                  
                  2
                      Configure Microsoft SQL Server for Authentication 
               
                  
               
               
               - Enabling and Finding TCP/IP Port Information
- Modifying the Permissions for Database Authentication
- Enabling SQL Authentication or Mixed Authentication
- TLS Authentication
- 
                     
                     Authentication Configuration Scenarios
                        
                     
                     
                     - Example 1: Local Monitoring with SQL Authentication
- Example 2: Local Monitoring with Windows Integrated Authentication (WIA)
- Example 3: Remote Monitoring with SQL Authentication
- Example 4: Remote Monitoring with Windows Integrated Authentication (WIA)
- Example 5: Cluster Remote Monitoring with SQL Authentication
- Example 6: Cluster remote monitoring with Windows Integrated Authentication
 
 
- 3 Discovery of the Microsoft SQL Server Target
- 4 Configuring Connections
- 5 Inventory and Usage Details
- 6 Creating, Editing, and Using Jobs
- 7 Using Reports and Monitoring Templates
- 8 Chargeback Functionality
- 
               
               
                  
                  9
                      Compliance Management 
               
                  
               
               
               - About Compliance Management
- Managing Compliance Framework
- Configuring the SQL Server Configuration Compliance Standard
- "Create Like" Compliance Standard
- Editing a Compliance Standard
- Evaluating Compliance
- Using Trend Overview
- Using Compliance Reports
- Managing Compliance Violations
- Additional Information
 
- Index