For the Security Center Directory role to run, service users who are not Windows administrators (login name SYSADMIN) must be granted the View server state SQL Server permission.
What you should know
- The minimum SQL Server server-level roles required by Security Center are:
- dbcreator
- processadmin
- public
- The minimum SQL Server database-level roles required by Security Center are:
- db_backupoperator
- db_datareader
- db_datawriter
- db_ddladmin
- public
- Make sure that members of the above-mentioned roles have been granted the VIEW SERVER STATE SQL Server permission. For information about the minimum SQL Server roles and permissions required by Security Center roles, see About connecting to SQL Server with an account that has administrative privileges (Basic) on the TechDoc Hub.
For more information about SQL Server roles and their capabilities, see your Microsoft documentation.
NOTE: The following procedure is for SQL Server 2022 Express Advanced. If you are using
a different version of SQL Server, see your Microsoft documentation for information
about granting permissions.
Procedure
In SQL Server Management Studio, do one of the following:
- Run the following query:
GRANT VIEW SERVER STATE TO [login name]
. - Manually modify the user permissions as follows:
- Right-click the appropriate SQL Server instance and select Properties.
- Click the Permissions page.
- Under Logins or roles, select the user or role you want to modify.
- In the Permissions section, click the Explicit tab and select the Grant checkbox beside the View server state permission.
- Click OK.