Answer by JohnM
You can use the server's default trace to try to pinpoint who is removing the access. This is a security event that should be captured, assuming that the default trace hasn't been modified....
View ArticleAnswer by askmlx121
Thanks for everyone below two query has used to Track who has done ? what has done? thanks for every one.................especially **JohnM.** SELECT * FROM ::fn_trace_getinfo(default) kindly run the...
View ArticleAnswer by JohnM
You can use the server's default trace to try to pinpoint who is removing the access. This is a security event that should be captured, assuming that the default trace hasn't been modified....
View ArticleAnswer by askmlx121
Thanks for everyone below two query has used to Track who has done ? what has done? thanks for every one.................especially **JohnM.** SELECT * FROM ::fn_trace_getinfo(default) kindly run the...
View Article