What we're about
Welcome to the Triangle SQL Server User Group (TriPASS)! We are an active group of SQL Server professionals that meet monthly for formal presentations on many SQL Server topics. We cover everything from database design, development, deployment, performance, and IT support. We also Business Intelligence topics like data warehousing, reporting, ETL and Big Data. Visit us at our monthly meetings where our sponsors always provide us with free food and beverages. Many times we will have a raffle for books and other items provided by our sponsors.
Upcoming events (3)
SQL Server includes multiple features that focus on data security, privacy, and developer productivity. In this session, we will review the best features from a database designer's and developer's point of view.
We'll look at the new features, why you should consider them, where they work, where they don't, who needs to be involved in using them, and what changes, if any, need to be made to applications or tools use with SQL Server and Azure DB.
You will learn:
- The pros and cons of implementing each feature
- How implementing these new features may impact existing applications
- 10 tips for enhancing SQL Server security and privacy protections
- mark h.
- Lee M.
- George S.
- 19 attendees
HYBRID EVENT: https://www.twitch.tv/trianglessug
Auditors are no fun to deal with and proving your systems meet their standards can be a PITA. Do you really want to have to provide print screens or run queries on servers to provide them with data when you can just run PowerShell using dbachecks and produce a PowerBi report? Yeah, I didn’t think so, so let’s talk about how to use dbachecks then specifically how to use it for CIS compliance. After that, we will cover how to write your own custom checks so you can utilize this tool for your own security compliance requirements.
- Damodaran Venkatesan (.
- Lee M.
- Chet M.
- 16 attendees
Power BI is a key workload within Microsoft Fabric. It includes several ways you can collaborate and share content with your colleagues. In this session, we’ll review the key concepts to know about securing Power BI content. By the end of this session, you'll have familiarity with:
--Security options for groups of items vs. individual items
--How inheritance of permissions works
--Approaches for collaboration vs. content distribution
--When to use an app vs. a workspace vs. per-item permissions
--How domain and workspace permissions work
--The difference between sharing links & direct access
--When to use read vs. build vs. edit permissions
--Strategies to reduce risk and future maintenance
The primary focus of this session is on securing Power BI artifacts. New security capabilities for Microsoft Fabric will be covered to the extent possible (however, OneSecurity is out of scope until we know more).
- mark h.
- Damodaran Venkatesan (.
- Shannon L.
- 15 attendees