{"id":20226,"date":"2024-02-29T19:45:46","date_gmt":"2024-02-29T23:45:46","guid":{"rendered":"https:\/\/kevinjustin.com\/blog\/?p=20226"},"modified":"2024-02-29T19:45:46","modified_gmt":"2024-02-29T23:45:46","slug":"sql-stig-vulnerabilities-v-213902-v-213935","status":"publish","type":"post","link":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/","title":{"rendered":"SQL STIG vulnerabilities V-213902, V-213935"},"content":{"rendered":"<div>Happy leap year, let&#8217;s talk Security and SQL STIG vulnerabilities V-213902, V-213935!<\/div>\n<div>\n<figure id=\"attachment_20227\" aria-describedby=\"caption-attachment-20227\" style=\"width: 414px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20227\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219.png\" alt=\"Happy Leap year\" width=\"414\" height=\"436\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219.png 414w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219-285x300.png 285w\" sizes=\"auto, (max-width: 414px) 85vw, 414px\" \/><\/a><figcaption id=\"caption-attachment-20227\" class=\"wp-caption-text\">Happy Leap year<\/figcaption><\/figure>\n<\/div>\n<h4>DISA DOD SQL STIG vulnerabilities V-213902, V-213935<\/h4>\n<div>SQL DBA team for RCC-C customer requesting documentation for exception, in light of vulnerabilities.<\/div>\n<div><\/div>\n<div>V-213902<\/div>\n<div><a href=\"https:\/\/www.stigviewer.com\/stig\/ms_sql_server_2016_database\/2020-09-23\/finding\/V-213902\" target=\"_blank\" rel=\"noopener\">https:\/\/www.stigviewer.com\/stig\/ms_sql_server_2016_database\/2020-09-23\/finding\/V-213902<\/a><\/div>\n<div><\/div>\n<div>V-213935<\/div>\n<div><a href=\"https:\/\/www.stigviewer.com\/stig\/ms_sql_server_2016_instance\/2020-12-16\/finding\/V-213935\" target=\"_blank\" rel=\"noopener\">https:\/\/www.stigviewer.com\/stig\/ms_sql_server_2016_instance\/2020-12-16\/finding\/V-213935<\/a><\/div>\n<div><\/div>\n<div>SCOM uses individual computer accounts in SQL for these findings<\/div>\n<div>Holman documented this since 2012<\/div>\n<div><\/div>\n<div><\/div>\n<h4>SCOM SECURITY Documentation<\/h4>\n<p>SCOM2019 <a href=\"https:\/\/kevinholman.com\/2020\/07\/23\/scom-2019-security-account-matrix\/\" target=\"_blank\" rel=\"noopener\">https:\/\/kevinholman.com\/2020\/07\/23\/scom-2019-security-account-matrix\/<\/a><\/p>\n<div>SCOM2019 learn article <a href=\"https:\/\/learn.microsoft.com\/en-us\/system-center\/scom\/plan-security-accounts?view=sc-om-2019\" target=\"_blank\" rel=\"noopener\">https:\/\/learn.microsoft.com\/en-us\/system-center\/scom\/plan-security-accounts?view=sc-om-2019<\/a><\/div>\n<div><\/div>\n<div>SCOM2022 <a href=\"https:\/\/kevinholman.com\/2022\/09\/26\/scom-2022-security-account-matrix\/\" target=\"_blank\" rel=\"noopener\">https:\/\/kevinholman.com\/2022\/09\/26\/scom-2022-security-account-matrix\/<\/a><\/div>\n<div>SCOM2022\u00a0 learn article <a href=\"https:\/\/learn.microsoft.com\/en-us\/system-center\/scom\/plan-security-accounts?view=sc-om-2022\" target=\"_blank\" rel=\"noopener\">https:\/\/learn.microsoft.com\/en-us\/system-center\/scom\/plan-security-accounts?view=sc-om-2022<\/a><\/div>\n<div><\/div>\n<div><\/div>\n<h4>Both V-213902 AND V-213935 state same identification action.<\/h4>\n<div><strong>Run this SQL Query on SCOM DB(s)<\/strong><\/div>\n<div><\/div>\n<div><span style=\"color: #3366ff;\">SELECT name<\/span><\/div>\n<div><span style=\"color: #3366ff;\">FROM sys.database_principals<\/span><\/div>\n<div><span style=\"color: #3366ff;\">WHERE type in (&#8216;U&#8217;,&#8217;G&#8217;)<\/span><\/div>\n<div><span style=\"color: #3366ff;\">AND name LIKE &#8216;%$&#8217;<\/span><\/div>\n<div><\/div>\n<div>To remove users:<\/div>\n<div>Run the following command for each user:<\/div>\n<div><\/div>\n<div><span style=\"color: #3366ff;\">DROP USER [ IF EXISTS ] ;<\/span><\/div>\n<div><\/div>\n<div><\/div>\n<h4><strong>V-213935 has a different identifier:<\/strong><\/h4>\n<div>Launch PowerShell.<\/div>\n<div>Execute the following code:<\/div>\n<div>Note: &lt;name&gt; represents the username portion of the user. For example; if the user is &#8220;CONTOSO\\user1$&#8221;, the username is &#8220;user1&#8221;.<\/div>\n<div><\/div>\n<div><span style=\"color: #3366ff;\">([ADSISearcher]&#8221;(&amp;(ObjectCategory=Computer)(Name=&lt;name&gt;))&#8221;).FindAll()<\/span><\/div>\n<div><\/div>\n<div>If no account information is returned, this is not a finding.<\/div>\n<div><\/div>\n<div>If account information is returned, this is a finding.<\/div>\n<div><\/div>\n<div><\/div>\n<h3>Tab delimited view &#8211;<\/h3>\n<div>Remove Computer Accounts DB SQL6-D0-000400 V-213902 CAT II Non-repudiation of actions taken is required in order to maintain data integrity. Examples of particular actions taken by individuals include creating information, sending a message, approving information (e.g., indicating concurrence or signing a contract), and receiving a message.<\/div>\n<div><\/div>\n<div>Remove Computer AccountsSQL6-D0-004200V-213935CAT IINon-repudiation of actions taken is required in order to maintain data integrity. Examples of particular actions taken by individuals include creating information, sending a message, approving information (e.g., indicating concurrence or signing a contract), and receiving a message.<\/div>\n<div><\/div>\n<div><\/div>\n<div>Can provide one work-around to mitigate.<\/div>\n<div>Awaiting CSS engagement for official mitigation from support and\u00a0 SCOM PG.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Happy leap year, let&#8217;s talk Security and SQL STIG vulnerabilities V-213902, V-213935! DISA DOD SQL STIG vulnerabilities V-213902, V-213935 SQL DBA team for RCC-C customer requesting documentation for exception, in light of vulnerabilities. V-213902 https:\/\/www.stigviewer.com\/stig\/ms_sql_server_2016_database\/2020-09-23\/finding\/V-213902 V-213935 https:\/\/www.stigviewer.com\/stig\/ms_sql_server_2016_instance\/2020-12-16\/finding\/V-213935 SCOM uses individual computer accounts in SQL for these findings Holman documented this since 2012 SCOM SECURITY Documentation &hellip; <a href=\"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;SQL STIG vulnerabilities V-213902, V-213935&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,5,545,530,502,556],"tags":[855,854,511,342,853,505,560,410],"class_list":["post-20226","post","type-post","status-publish","format-standard","hentry","category-administration","category-best-practice","category-powershell","category-scom","category-security","category-sql","tag-computer-accounts","tag-holman","tag-mssql","tag-scom","tag-scom-security-matrix","tag-scom2019","tag-scom2022","tag-sql"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SQL STIG vulnerabilities V-213902, V-213935 - Kevin Justin&#039;s Blog<\/title>\n<meta name=\"description\" content=\"Let&#039;s discuss some SQL STIG vulnerabilities V-213902, V-213935, to identify and mitigate vulns to further secure SCOM!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SQL STIG vulnerabilities V-213902, V-213935 - Kevin Justin&#039;s Blog\" \/>\n<meta property=\"og:description\" content=\"Let&#039;s discuss some SQL STIG vulnerabilities V-213902, V-213935, to identify and mitigate vulns to further secure SCOM!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/\" \/>\n<meta property=\"og:site_name\" content=\"Kevin Justin&#039;s Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-29T23:45:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219.png\" \/>\n<meta name=\"author\" content=\"WordPress Administrator\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WordPress Administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/\"},\"author\":{\"name\":\"WordPress Administrator\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\"},\"headline\":\"SQL STIG vulnerabilities V-213902, V-213935\",\"datePublished\":\"2024-02-29T23:45:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/\"},\"wordCount\":355,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Screenshot-2024-02-29-184219.png\",\"keywords\":[\"Computer Accounts\",\"Holman\",\"MSSQL\",\"SCOM\",\"SCOM Security matrix\",\"scom2019\",\"SCOM2022\",\"sql\"],\"articleSection\":[\"Administration\",\"Best Practice\",\"PowerShell\",\"SCOM\",\"Security\",\"SQL\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/\",\"name\":\"SQL STIG vulnerabilities V-213902, V-213935 - Kevin Justin&#039;s Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Screenshot-2024-02-29-184219.png\",\"datePublished\":\"2024-02-29T23:45:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\"},\"description\":\"Let's discuss some SQL STIG vulnerabilities V-213902, V-213935, to identify and mitigate vulns to further secure SCOM!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Screenshot-2024-02-29-184219.png\",\"contentUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Screenshot-2024-02-29-184219.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2024\\\/02\\\/29\\\/sql-stig-vulnerabilities-v-213902-v-213935\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SQL STIG vulnerabilities V-213902, V-213935\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\",\"name\":\"Kevin Justin&#039;s Blog\",\"description\":\"Operational monitoring tools including System Center, Azure Monitor\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\",\"name\":\"WordPress Administrator\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"caption\":\"WordPress Administrator\"},\"sameAs\":[\"https:\\\/\\\/kevinjustin.com\"],\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/author\\\/wordpress_admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SQL STIG vulnerabilities V-213902, V-213935 - Kevin Justin&#039;s Blog","description":"Let's discuss some SQL STIG vulnerabilities V-213902, V-213935, to identify and mitigate vulns to further secure SCOM!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/","og_locale":"en_US","og_type":"article","og_title":"SQL STIG vulnerabilities V-213902, V-213935 - Kevin Justin&#039;s Blog","og_description":"Let's discuss some SQL STIG vulnerabilities V-213902, V-213935, to identify and mitigate vulns to further secure SCOM!","og_url":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/","og_site_name":"Kevin Justin&#039;s Blog","article_published_time":"2024-02-29T23:45:46+00:00","og_image":[{"url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219.png","type":"","width":"","height":""}],"author":"WordPress Administrator","twitter_card":"summary_large_image","twitter_misc":{"Written by":"WordPress Administrator","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/#article","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/"},"author":{"name":"WordPress Administrator","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508"},"headline":"SQL STIG vulnerabilities V-213902, V-213935","datePublished":"2024-02-29T23:45:46+00:00","mainEntityOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/"},"wordCount":355,"commentCount":0,"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219.png","keywords":["Computer Accounts","Holman","MSSQL","SCOM","SCOM Security matrix","scom2019","SCOM2022","sql"],"articleSection":["Administration","Best Practice","PowerShell","SCOM","Security","SQL"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/","url":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/","name":"SQL STIG vulnerabilities V-213902, V-213935 - Kevin Justin&#039;s Blog","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/#primaryimage"},"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219.png","datePublished":"2024-02-29T23:45:46+00:00","author":{"@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508"},"description":"Let's discuss some SQL STIG vulnerabilities V-213902, V-213935, to identify and mitigate vulns to further secure SCOM!","breadcrumb":{"@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/#primaryimage","url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219.png","contentUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-29-184219.png"},{"@type":"BreadcrumbList","@id":"https:\/\/kevinjustin.com\/blog\/2024\/02\/29\/sql-stig-vulnerabilities-v-213902-v-213935\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kevinjustin.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SQL STIG vulnerabilities V-213902, V-213935"}]},{"@type":"WebSite","@id":"https:\/\/kevinjustin.com\/blog\/#website","url":"https:\/\/kevinjustin.com\/blog\/","name":"Kevin Justin&#039;s Blog","description":"Operational monitoring tools including System Center, Azure Monitor","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kevinjustin.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508","name":"WordPress Administrator","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","caption":"WordPress Administrator"},"sameAs":["https:\/\/kevinjustin.com"],"url":"https:\/\/kevinjustin.com\/blog\/author\/wordpress_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/20226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/comments?post=20226"}],"version-history":[{"count":1,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/20226\/revisions"}],"predecessor-version":[{"id":20228,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/20226\/revisions\/20228"}],"wp:attachment":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/media?parent=20226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/categories?post=20226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/tags?post=20226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}