What's the issue?
The files in tempdb have one or more of the following issues: • tempdb data files with uneven growth rates • tempdb database files with % growth • tempdb database files with < 64 MB growth
Why is this a problem?
If autogrowth is allowed, all tempdb data and log files for tempdb should have growth rates of fixed values of at least 64 MB. Less that that will lead to many costly autogrowth events. Growth rates with percentage values should be avoided due to inconsistencies initially of many small growth rates and later perhaps overly large growth events. Additionally, all data files should have the same size and growth rates to reduce the likelihood of contention.
What should you do about this?
Check the growth settings for all tempdb files to make sure they are using fixed values of at least 64 MB, and that all data files have the same growth settings.
Read more...
Vulnerability
Category
What do the Vulnerability Levels mean?
0 - Information only. This is stuff you should know about your instances like version and service account used, but if you don't know it…well, now you do.
1 - High vulnerability requiring action. These are the issues that could most likely lead to your company being front page news for all the wrong reasons. If your instances have any results at this level then we recommend cancelling that 3-martini lunch and instead huddling with your team to figure out when to address these issues.
2 - High vulnerability to review. These include settings and assigned permissions you should review soon, if not immediately. These findings may not necessarily indicate a clear vulnerability, but we've found unexpected vulnerabilities in these categories at many, many clients.
3 - Potential vulnerability to review. These are configurations or assigned permissions you may be using that could lead to problems for users. Or maybe they're just required for your applications. Either way, we recommend reviewing these to make sure these are correct.
4 – Low vulnerability with recommended action. These are typically security inconsistencies that should be addressed. They aren't likely to cause problems, but you should clean up the mess.