Hi Steve,
Many strands triggered in your reply.
It is great that you do have the buy-in to do things well,
and even better to hear that the LUA objectives of least
access have taken root.
First, one thing you mentioned was security of multiple
installs, if things were that way. You should be aware
that you can use the patch checking engine of the current
version of MBSA (MS Baseline Security Analyzer) to
check service pack and security patch level of SQL and
MSDE installs. From a machine where MBSA is installed
drop to a cmd prompt, cd to the MBSA install dir, and issue
mbsacli -hf -?
You can provide list of target machines in file, etc..
Now, this does not of course address the majority of SQL
install wellness issues like sane sa acct, accts/groups in
the SA server role, use of external procs, etc.. But, with
hfnetchk scan showing you 1) what machines did not let
you scan and 2) what machines have SQL and/or MSDE
instances you on staff DBA could no doubt come up with
a sproc that could interrogate those for the basic sanity
checklist of config items. Now, a last word on the use of
MBSA in this way. In addition to administrative rights on
the target machines, the hfnetchk scan will not work if the
targets are firewalled (doh - but for completeness mentioned),
if they do not have at least C$ shared (the admin shares, but
I have found that I really only need at least a temp C$ allowing
administrators even though the target has admin shares off, and
this one can turn on with remote script prior to the scan), or if
the remote registry service is shut off (again, can be started by
remote script prior to the scan).
Next, you made a mention of cost. I do not know whether your
shop is VStudio based, Delphi, or what. If VStudio it is now
pretty hard to not have license allowing dev version of SQL,
but you need to check what and how the dev shop is licensed.
Unless I am mistaken, as a holder of an SQL Server license
you are allowed client tools install without limit. I am no final
word on licensing matters. MSDE is of course free, and IIRC
the terms have loosened considerably from initial days.
I need to review whether the new mgmt interface tool MS has
released into beta is in the open beta, but that provides another
alternative relative to the client tools install.
It seems to me that a potentially compelling way to go would
be to look at central support of the main dev/test, but also
look at facilitating (temporary) dev local MSDE installs
(or better SQL Express - but that is a versioning issue no
doubt for the app release cycle). You could easily set up
such MSDE so that it gets a copy of a test suite DB loaded
into it with DTS from the dev/test SQL Server. Finally, if the
dev/test SQL Server is Enterprise version, it can accomodate
scenarios for devs in named SQL instances.
Anyway, it seems that there are a number of routes that are
cheap to free and within (what I understand of) licensing
(of course we did not mention CALs or per-proc lics).
So, other than periodic MBSA hfnetchk scans to know where
there is an SQL install (of course you could do that with a
script that just does some WMI poking into the registries of
the systems looking at the MSSQLServer keying - but MBSA
also gives basic health of the bits) how could you exert some
form of enforced control ? Like I said in initial post, about
the best idea I can come up with is to use software restriction
policies via GPO that impacts these dev machines. With it
you could prevent the users from running short list of key exes,
and of course you can have the GPO set the known / commonly
seen service instance names to disabled (it does not hurt to have
services named that are not on machines in scope of the GPO).
All this is totally circumventable while they are local admins.
However, it might just trigger enough of a hurdle to give them
pause to thing better of what they were about to try. With much
regret, the bottom line is that admins can, and that an example
semi-gently hung by the nails outside the coffee room has more
impact that all of the preparatory emails/notices of policy added
together. Getting them able to work as non-admins is IMHO
the key, both to your objectives here, and to the software
quality delivered (I have a total dislike of "well written",
and "well tested" apps which were however never tested by
a non-admin account !!).
Good luck Steve,
Roger