{"id":15003036,"url":"https://github.com/eggstoastbacon/powershell---sql-security","last_synced_at":"2026-03-15T02:46:21.808Z","repository":{"id":204597115,"uuid":"240848367","full_name":"eggstoastbacon/PowerShell---SQL-Security","owner":"eggstoastbacon","description":"This is a script for collecting MSSQL security information daily for reporting and security remeditation,","archived":false,"fork":false,"pushed_at":"2020-02-16T10:08:23.000Z","size":63,"stargazers_count":3,"open_issues_count":0,"forks_count":0,"subscribers_count":4,"default_branch":"master","last_synced_at":"2025-01-18T13:57:01.210Z","etag":null,"topics":["audit","database","database-management","mssql","mssql-automation","mssql-database","mssql-tools","powershell","powershell-administration","powershell-automation","powershell-script","security","security-audit","security-automation","security-research","security-testing","security-tools","sql","sql-report"],"latest_commit_sha":null,"homepage":"","language":"PowerShell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/eggstoastbacon.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2020-02-16T07:13:42.000Z","updated_at":"2020-08-12T15:42:04.000Z","dependencies_parsed_at":null,"dependency_job_id":"f8f34d2a-844d-4250-8de1-fa6afd5cf485","html_url":"https://github.com/eggstoastbacon/PowerShell---SQL-Security","commit_stats":null,"previous_names":["eggstoastbacon/powershell---sql-security"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/eggstoastbacon%2FPowerShell---SQL-Security","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/eggstoastbacon%2FPowerShell---SQL-Security/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/eggstoastbacon%2FPowerShell---SQL-Security/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/eggstoastbacon%2FPowerShell---SQL-Security/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/eggstoastbacon","download_url":"https://codeload.github.com/eggstoastbacon/PowerShell---SQL-Security/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":243153829,"owners_count":20244829,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["audit","database","database-management","mssql","mssql-automation","mssql-database","mssql-tools","powershell","powershell-administration","powershell-automation","powershell-script","security","security-audit","security-automation","security-research","security-testing","security-tools","sql","sql-report"],"created_at":"2024-09-24T18:55:19.877Z","updated_at":"2025-12-25T02:45:42.343Z","avatar_url":"https://github.com/eggstoastbacon.png","language":"PowerShell","readme":"# PowerShell---SQL-Security\n\nFirst iterations on github may be a little rough as this was written to be used in an environment where I could make some assumptions, and i've had to go through and generalize my code.\n\nThis is a script for collecting MSSQL security information such as;\n\n.MSSQL Login\n\n.Database Permissions\n\n.Availibility Group, Cluster and Listener Info\n\n.Account is Enabled or Disabled\n\n.Account Creation and Modified Date\n\n\u0026 More\n\nDesigned to be run once per day (day's data will be overwritten if run more than once per day)\n\nThe default it to write this data into a SQL table. For example I have used this data to build a BI dashboard and used slicers to drill down into dates and servers to see a snapshot of a point in time.\n\nThis is also useful for finding and removing users who may have left your org but still have some lingering SQL permissions.\n\nIf you have try this let me know if you find any issues in your environment so I can polish this and further generalize it for public use.\n\n#\n\nDependencies:\n\nAccount provided for scan needs to be SA\n\nThis requires SQL Management Studio is installed from where this is run.\n\nRequires WMI and SQL port access to the servers you will scan.\n\nIf scheduled run it only once per day.\n\nRequires sqlserver.psd1 if writing report data to SQL (located in this repo)\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Feggstoastbacon%2Fpowershell---sql-security","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Feggstoastbacon%2Fpowershell---sql-security","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Feggstoastbacon%2Fpowershell---sql-security/lists"}