- Additional processor and hard drive overhead will be required of the physical hardware, since both applications can be resource-intensive.Step 2 of 2:
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
- From a security perspective, it's often preferable to separate mission-critical applications onto separate physical devices so that you can reduce the attack exposure on each machine. If your SQL Server is residing on your domain controller and an attacker were able to compromise the physical server using a SQL vulnerability, they would essentially have the "keys to the kingdom" since your sensitive AD information would also be compromised at that point.
Related Q&A from Laura Hunter
Active Directory expert Laura E. Hunter explains to a reader what must be done to change the default display specifiers for new users in Active ...continue reading
Active Directory expert Laura E. Hunter offers some advice for changing the IP addresses of domain controllers.continue reading
Active Directory expert Laura E. Hunter tells a reader what to keep in mind when deleting subnets associated with sites being removed in an ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.