Remote access


Job details

Name: Remote access
Platform: Sqlserver
Category: Security
Premium package: Security and compliance package
Description: Checks if local stored procedures can execute on remote servers or remote stored procedures on local server.
Long description: Checks if local stored procedures can execute on remote servers or remote stored procedures on local server.
Version: 1.2
Default schedule: 23 1 1 *
Requires engine install: Yes
Compatibility tag: .[type=‘instance’ & databasetype=‘sqlserver’]/instance[maj_version > ‘2005′ & hasengine=‘YES’ & eng_inst_priv = 0 & (engine_edition = ‘Microsoft SQL Server’ engine_edition = ‘Azure SQL Managed Instance’)]

Parameters

Name Default value Description
return status 1 Return status value (ALARM – 2, WARNING – 1, or OK – 0) when the “remote access” parameter is enabled.
disable remote access NO If set to “YES“ the alert will disable “remote access” (if it is enabled) by running sp_configure stored procedure.
history threshold 365 The maximum number of days to keep statistics for in the historic tables.

Job Summary

Select * FROM sys.configurations WHERE name = 'remote access'

Detailed Description

The job primarily checks whether local stored procedures can execute on remote servers or if remote stored procedures can be executed on the local server. It employs a series of SQL implementations to efficiently monitor any changes and status of the remote access configuration. If remote access is enabled and the configuration is set to disable it, the job will automatically adjust the settings to turn off remote access, enforcing an additional layer of security. This automatic reconfiguration only happens based on the job parameters set during the job setup.

Dependencies

Implementation Steps

  1. Create necessary tables to log current and historical remote access states.
  2. Check the current state of ‘remote access’ and update the ‘dbw_remote_access_status_info’ table.
  3. If the remote access setting is enabled and needs to be disabled, execute ‘sp_configure’ to change the configuration.
  4. Aggregate old statistics into ‘dbw_remote_access_status_histr’ table and clean up the data based on the history threshold parameter.
  5. Update compliance-related information in the ‘dbw_security_framework_info’ table if exists.

Scheduled Jobs and Reporting
|| Frequency || Description ||
| Once every hour | The job is designed to run at this frequency to ensure timely updates and quick response to any unauthorized changes in remote access configuration. |
| Once every day at 1:23 AM | Default schedule for aggregating remote access status into historical data. |

Security & Compliance Integration

The job updates and utilizes the ‘dbw_security_framework_info’ table for compliance reporting purposes, demonstrating how each execution aligns with established security guidelines and configurations pertinent to remote access management.

Upgrades

System Requirements

The job is applicable for instances running SQL Server (version greater than 2005) and Azure SQL Managed Instances where the instance has necessary privileges for execution. The job selectively targets environments where it can operate without elevated privileges, focusing on those configurations most likely to benefit from its remote access monitoring capabilities.