One thought on “Security: Capturing additional login information Trace vs Audit

  1. Pingback: What does a brute force attack look like? | Get the most out of MSSQL !

Leave a Reply