SELECT name
FROM sys.syslogins
Security - Logins - right-click - New Login...
TODO
Right click on the Login to duplicate...
Run the script included below in all databases (except model and tempdb) starting from master. The script declares a mask to identifiy which users/logins to process. The example is set to look for all users/logins in MYDOMAIN\. Copy and paste output to the new window (for simplicity paste each output into the same window) and update as necessary.
Server principals with names enclosed by double hash marks (##) are for internal system use only. The following principals are created from certificates when SQL Server is installed, and should not be deleted.
##MS_SQLResourceSigningCertificate##
##MS_SQLReplicationSigningCertificate##
##MS_SQLAuthenticatorCertificate##
##MS_AgentSigningCertificate##
##MS_PolicyEventProcessingLogin##
##MS_PolicySigningCertificate##
##MS_PolicyTsqlExecutionLogin##
These principal accounts do not have passwords that can be changed by administrators as they are based on certificates issued to Microsoft. (1)
In earlier versions of SQL Server, NT AUTHORITY\SYSTEM was granted the sysadmin role. This is no longer recommended (2) as it is considered a shared account.
For AlwaysOn, the NT Authority\SYSTEM login account should have the following permssions.
(these are granted by default but may have been revoked)Alter Any Availability Group
Connect SQL
View server state
This is a "service" rather than an "account". It has a security identifier (SID) in Windows, but Windows knows it isn't a real user. Windows can authenticate it, but it doesn't have a password that any human can use.
Must have the "sysadmin" role.
This is a "service" rather than an "account". It has a security identifier (SID) in Windows, but Windows knows it isn't a real user. Windows can authenticate it, but it doesn't have a password that any human can use.
Must have the "sysadmin" role.
This is a "service" rather than an "account". It has a security identifier (SID) in Windows, but Windows knows it isn't a real user. Windows can authenticate it, but it doesn't have a password that any human can use.
SQL Server setup adds this to sysadmin role but, theoretically, it only needs:
Membership of db_ddladmin or db_owner roles in msdb
CREATE DDL EVENT NOTIFICATION permission in the server
CREATE TRACE EVENT NOTIFICATION permission in the Database Engine
VIEW ANY DATABASE server-level permission
SQL Server setup creates a SQL WMI namespace and grants read permission to the SQL Server Agent Service-SID.
This is a "service" rather than an "account". It has a security identifier (SID) in Windows, but Windows knows it isn't a real user. Windows can authenticate it, but it doesn't have a password that any human can use.
Theoretically, allows the SQL Writer process to run at a lower privilege level in an account designated as no login, which limits vulnerability. But, the SQL Writer service needs sysadmin permissions in SQL Server because in the course of its activities it briefly freezes all I/O for the instance of SQL Server. (5)