Granting SQL Server permissions - For the Security Center service users who are not Windows administrators and who are not members of the SQL Server sysadmin role, you must grant specific permissions. - Security Center 5.13

Security Center Administrator Guide 5.13

Product
Security Center
Content type
Guides > Administrator guides
Version
5.13
ft:locale
en-US
Last updated
2026-01-10

For the Security Center service users who are not Windows administrators and who are not members of the SQL Server sysadmin role, you must grant specific permissions.

What you should know

You can skip this procedure if you are using the default setup with a local SQL Server Express instance.
  • The minimum SQL Server server-level roles required by Security Center are:
    • dbcreator
    • processadmin
    • public
  • The minimum SQL Server database-level roles required by Security Center are:
    • db_backupoperator
    • db_datareader
    • db_datawriter
    • db_ddladmin
    • public
  • Starting from Security Center 5.13.3, you no longer need the VIEW SERVER STATE permission.
  • For more information about the minimum SQL Server roles and permissions required by Security Center roles, see Avoiding connections to SQL Server with an account that has administrative privileges (Basic) on the TechDoc Hub.
  • For more information about SQL Server roles and their capabilities, see your Microsoft documentation.

Procedure

  1. Connect to SQL Server Management Studio.
  2. Add the Security Center service users to the SQL Server Logins, then assign them to the above-mentioned roles.