Supported Versions & Platforms
| Platform | Minimum Version | Notes |
|---|---|---|
| SQL Server | 2012+ | On-premise or any cloud |
| SQL Server 2019 | Recommended | Best compatibility |
| SQL Server 2022 | Latest | Fully supported |
| Azure SQL Database | Any | All service tiers |
| Azure SQL Managed Instance | Any | All service tiers |
| Amazon RDS SQL Server | 2012+ | All instance classes |
Connection Settings
| Field | Description | Example |
|---|---|---|
| Connection Name | Friendly identifier | Production SQL Server |
| Host | Hostname or IP address | db.example.com |
| Port | Database port | 1433 |
| Database | Database name | myapp_production |
| Username | SQL Server user | anomalyarmor |
| Password | User password | ******** |
| SSL Mode | SSL configuration | require |
Authentication Methods
| Method | Supported | Notes |
|---|---|---|
| SQL Server Authentication | Yes | Username and password |
| Windows Authentication | No | Not currently supported |
| Azure Active Directory | No | Planned for future release |
SQL Server Authentication (username/password) is required. Windows Authentication and Azure AD are planned for future releases.
Creating a Read-Only User
Create a dedicated user with minimal permissions:Verifying Permissions
Test that the user can access metadata:Provider-Specific Instructions
- Azure SQL Database
- Azure SQL Managed Instance
- Amazon RDS
- On-Premise
Azure SQL Database
Connection Details:- Host:
yourserver.database.windows.net - Port:
1433 - SSL Mode: Encryption is always enabled (TLS 1.2+)
- Go to Azure Portal > SQL databases > Your database > Set server firewall
- Add a rule for each AnomalyArmor IP address (see Settings > Security)
- Or enable “Allow Azure services” if AnomalyArmor runs in Azure
- Basic, Standard, Premium (DTU-based)
- General Purpose, Business Critical, Hyperscale (vCore-based)
- Serverless
What We Query
AnomalyArmor runs these types of queries:Excluded Schemas
AnomalyArmor automatically excludes system schemas:sys- SQL Server system objectsINFORMATION_SCHEMA- ANSI standard metadata views
Troubleshooting
Login failed for user
Login failed for user
Error:
Login failed for user 'anomalyarmor'Causes:- Wrong username or password
- SQL Server Authentication not enabled
- User doesn’t have access to the specified database
- Verify username and password are correct
- Check SQL Server is in Mixed Mode authentication
- Ensure the login exists:
SELECT name FROM sys.server_principals WHERE name = 'anomalyarmor' - Ensure the user has database access
Cannot open database
Cannot open database
Error:
Cannot open database 'mydb' requested by the loginCauses:- Database name is incorrect
- User doesn’t have access to the database
- Database doesn’t exist
- Verify database name (case-sensitive on some configurations)
- Check user permissions:
SELECT name FROM sys.database_principals WHERE name = 'anomalyarmor' - Grant access:
USE mydb; CREATE USER anomalyarmor FOR LOGIN anomalyarmor;
Connection refused or timeout
Connection refused or timeout
Error:
Cannot connect to SQL Server or connection timeoutCauses:- Firewall blocking the connection
- Wrong hostname or port
- SQL Server not listening on TCP/IP
- SQL Server Browser service not running (named instances)
- Verify AnomalyArmor IPs are allowlisted
- Check firewall rules
- Ensure TCP/IP protocol is enabled in SQL Server Configuration Manager
- For named instances, ensure SQL Server Browser is running or specify the port
- Test connectivity:
Test-NetConnection hostname -Port 1433
Azure SQL firewall error
Azure SQL firewall error
Error:
Cannot connect - firewall rule or error 40615Causes:- AnomalyArmor IP not in Azure SQL firewall rules
- Public access is disabled
- Go to Azure Portal > SQL databases > Set server firewall
- Add AnomalyArmor IP addresses to firewall rules
- Ensure “Deny public network access” is Off
Windows Authentication required
Windows Authentication required
Error: Error 18470 or “Windows authentication is required”Causes:
- Server is configured for Windows Authentication only
- SQL Server Authentication is disabled
- Enable Mixed Mode authentication in SQL Server properties
- Restart SQL Server service
- AnomalyArmor currently requires SQL Server Authentication
No tables found in discovery
No tables found in discovery
Causes:
- User lacks SELECT permission on schemas
- User lacks VIEW DEFINITION permission
- All tables are in excluded schemas
- Grant schema access:
GRANT SELECT ON SCHEMA::dbo TO anomalyarmor; - Grant view definition:
GRANT VIEW DEFINITION TO anomalyarmor; - Test query:
SELECT * FROM INFORMATION_SCHEMA.TABLES;
Next Steps
Run Discovery
Scan your SQL Server database
Set Up Alerts
Get notified of schema changes
