Azure SQL Database
Copied!
Home
Options
640
JovanPop on 03-23-2019 06:46 PM
1,355
Ronit Reger on 03-23-2019 06:46 PM
424
JovanPop on 03-23-2019 06:45 PM
387
JovanPop on 03-23-2019 06:45 PM
2,014
JovanPop on 03-23-2019 06:45 PM
755
JovanPop on 03-23-2019 06:45 PM
377
JovanPop on 03-23-2019 06:44 PM
525
Ronit Reger on 03-23-2019 06:44 PM
511
Joe Sack on 03-23-2019 06:44 PM
267
SQL-Server-Team on 03-23-2019 06:44 PM
256
Shreya Verma on 03-23-2019 06:43 PM
257
Joe Sack on 03-23-2019 06:43 PM
284
Joe Sack on 03-23-2019 06:42 PM
367
JovanPop on 03-23-2019 06:42 PM
592
Ronit Reger on 03-23-2019 06:41 PM
436
JovanPop on 03-23-2019 06:41 PM
598
JovanPop on 03-23-2019 06:41 PM
357
JovanPop on 03-23-2019 06:40 PM
125
JovanPop on 03-23-2019 06:40 PM
1,009
JovanPop on 03-23-2019 06:40 PM
327
JovanPop on 03-23-2019 06:40 PM
399
JovanPop on 03-23-2019 06:40 PM
432
JovanPop on 03-23-2019 06:39 PM
673
JovanPop on 03-23-2019 06:39 PM
133
JovanPop on 03-23-2019 06:39 PM
146
JovanPop on 03-23-2019 06:39 PM
134
JovanPop on 03-23-2019 06:38 PM
1,407
JovanPop on 03-23-2019 06:38 PM
202
JovanPop on 03-23-2019 06:37 PM
471
JovanPop on 03-23-2019 06:37 PM
Latest Comments
Thank you for this video.Do you have any news regarding global availability on SQL Database? We were part of the preview since one year, but no news at all.We get information that only Managed Instance are going to be targeted and not Elastic Pool?Thank you for your help.
0 Likes
This is all true, unless you have a large database. A BACPAC file is not a true backup, it is a compressed script consisting of a series of commands to recreate your database's structure, and then populate it by inserting the data into each table (in an order optimized to avoid foreign key issues) o...
0 Likes
@Trayce_Jordan The actions we perform are of similar nature as what a debugger would do, so it's not necessarily the case that antivirus software would conclude it's malware. In either case, an exclusion can be registered as @R A pointed out.
0 Likes
@Trayce_Jordan , if you execute this procedure from application which was configure in the white list of the anti-virus app then what is the issue? Any anti-virus app today has options to configure white list
0 Likes
In this process, how you "stay under the radar" with anti-virus and advanced threat protection software. I would think this process could easily be interpreted as an attack.
0 Likes