| title | Configure SQL Server Agent | Microsoft Docs | ||||
|---|---|---|---|---|---|
| ms.custom | |||||
| ms.date | 03/06/2017 | ||||
| ms.prod | sql-server-2014 | ||||
| ms.reviewer | |||||
| ms.technology | ssms | ||||
| ms.topic | conceptual | ||||
| helpviewer_keywords |
|
||||
| ms.assetid | 2e361a62-9e92-4fcd-80d7-d6960f127900 | ||||
| author | stevestein | ||||
| ms.author | sstein | ||||
| manager | craigg |
This topic describes how to specify some configuration options for [!INCLUDEssNoVersion] Agent during installation of [!INCLUDEssNoVersion]. The full set of [!INCLUDEssNoVersion] Agent configuration options is only available within [!INCLUDEssManStudioFull], [!INCLUDEssNoVersion] Management Objects (SMO), or the [!INCLUDEssNoVersion] Agent stored procedures.
In This Topic
-
Before you begin:
-
Click SQL Server Agent in Object Explorer of [!INCLUDEssManStudioFull] to administer jobs, operators, alerts, and the [!INCLUDEssNoVersion] Agent service. However, Object Explorer only displays the [!INCLUDEssNoVersion] Agent node if you have permission to use it.
-
Auto-restart should not be enabled for the [!INCLUDEssNoVersion] service or the [!INCLUDEssNoVersion] Agent service on failover cluster instances.
To perform its functions, [!INCLUDEssNoVersion] Agent must be configured to use the credentials of an account that is a member of the sysadmin fixed server role in [!INCLUDEssNoVersion]. The account must have the following Windows permissions:
-
Log on as a service (SeServiceLogonRight)
-
Replace a process-level token (SeAssignPrimaryTokenPrivilege)
-
Bypass traverse checking (SeChangeNotifyPrivilege)
-
Adjust memory quotas for a process (SeIncreaseQuotaPrivilege)
For more information about the Windows permissions required for the [!INCLUDEssNoVersion] Agent service account, see Select an Account for the SQL Server Agent Service and Configure Windows Service Accounts and Permissions.
-
Click the Start button, and then, on the Start menu, click Control Panel.
-
In Control Panel, click System and Security, click Administrative Tools, and then select Local Security Policy.
-
In Local Security Policy, click the chevron to expand the Local Policies folder, and then click the User Rights Assignment folder.
-
Right-click a permission that you want to configure for use with [!INCLUDEssNoVersion] and select Properties.
-
In the permission's properties dialog box, verify that the account under which [!INCLUDEssNoVersion] Agent runs is listed. If not, click Add User or Group, enter the account under which [!INCLUDEssNoVersion] Agent runs in the Select Users, Computers, Service Accounts, or Groups dialog box, and then click OK.
-
Repeat for each permission that you want to add to run with [!INCLUDEssNoVersion] Agent. When finished, click OK.