< Back

Enable-DbaForceNetworkEncryption

Mon Jan 13, 2020 9:48 am

NAME Enable-DbaForceNetworkEncryption



SYNOPSIS

Enables Force Encryption for a SQL Server instance.





SYNTAX

Enable-DbaForceNetworkEncryption [[-SqlInstance] <Sqlcollaborative.Dbatools.Parameter.DbaInstanceParameter[]>]

[[-Credential] <Pscredential>] [-EnableException <Switch>] [<CommonParameters>]





DESCRIPTION

Enables Force Encryption for a SQL Server instance. Note that this requires access to the Windows Server, not the

SQL instance itself.



This setting is found in Configuration Manager.





PARAMETERS

-Credential [<Pscredential>]

Allows you to login to the computer (not SQL Server instance) using alternative Windows credentials



Required? false

Position? named

Default value

Accept pipeline input? False

Accept wildcard characters? false



-EnableException [<Switch>]

By default, when something goes wrong we try to catch it, interpret it and give you a friendly warning message.

This avoids overwhelming you with "sea of red" exceptions, but is inconvenient because it basically disables

advanced scripting.

Using this switch turns this "nice by default" feature off and enables you to catch exceptions with your own

try/catch.



Required? false

Position? named

Default value

Accept pipeline input? False

Accept wildcard characters? false



-SqlInstance [<Sqlcollaborative.Dbatools.Parameter.DbaInstanceParameter[]>]

The target SQL Server instance or instances.



Required? false

Position? named

Default value

Accept pipeline input? False

Accept wildcard characters? false



<CommonParameters>

This cmdlet supports the common parameters: Verbose, Debug,

ErrorAction, ErrorVariable, WarningAction, WarningVariable,

OutBuffer, PipelineVariable, and OutVariable. For more information, see

about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).



INPUTS



OUTPUTS



NOTES





Tags: Certificate, Encryption

Author: Chrissy LeMaire (@cl), netnerds.net



Website: https://dbatools.io

Copyright: (c) 2018 by dbatools, licensed under MIT

License: MIT https://opensource.org/licenses/MIT



-------------------------- EXAMPLE 1 --------------------------



PS C:\\>Enable-DbaForceNetworkEncryption



Enables Force Encryption on the default (MSSQLSERVER) instance on localhost. Requires (and checks for) RunAs admin.

-------------------------- EXAMPLE 2 --------------------------



PS C:\\>Enable-DbaForceNetworkEncryption -SqlInstance sql01\\SQL2008R2SP2



Enables Force Network Encryption for the SQL2008R2SP2 on sql01. Uses Windows Credentials to both connect and

modify the registry.

-------------------------- EXAMPLE 3 --------------------------



PS C:\\>Enable-DbaForceNetworkEncryption -SqlInstance sql01\\SQL2008R2SP2 -WhatIf



Shows what would happen if the command were executed.



RELATED LINKS