Select an account for the SQL Server Agent service

Applies to: yesSQL Server (all supported versions) YesAzure SQL Managed Instance

The service startup account defines the Microsoft Windows account in which SQL Server Amanuensis runs and its network permissions. SQL Server Agent runs as a specified user account. Y'all select an account for the SQL Server Agent service by using SQL Server Configuration Director, where y'all can choose from the post-obit options:

  • Born account. Yous can choose from a listing of the post-obit built-in Windows service accounts:

    • Local System account. The name of this business relationship is NT Authority\System. it's a powerful business relationship that has unrestricted admission to all local system resources. it's a member of the Windows Administrators grouping on the local computer.

      Important

      The Local System account option is provided for backward compatibility merely. The Local System account has permissions that SQL Server Amanuensis does non crave. Avoid running SQL Server Agent every bit the Local Organisation business relationship. For improved security, utilize a Windows domain business relationship with the permissions listed in the following department, "Windows Domain Account Permissions."

  • This account. Lets yous specify the Windows domain account in which the SQL Server Agent service runs. We recommend choosing a Windows user business relationship that isn't a member of the Windows Administrators group. However, there are limitations for using multiserver administration when the SQL Server Agent service account isn't a member of the local Administrators group. For more data, run into 'Supported Service Account Types' that follows in this topic.

Windows domain account permissions

For improved security, select This business relationship, which specifies a Windows domain account. The Windows domain business relationship that you specify must have the following permissions:

  • In all Windows versions, permission to log on as a service (SeServiceLogonRight)

    Note

    The SQL Server Agent service account must be office of the Pre-Windows 2000 Compatible Admission grouping on the domain controller, or jobs that are owned by domain users who are not members of the Windows Administrators grouping fails.

  • In Windows servers, the account that the SQL Server Amanuensis Service runs as requires the following permissions tin support SQL Server Amanuensis proxies.

    • Permission to bypass traverse checking (SeChangeNotifyPrivilege)

    • Permission to replace a process-level token (SeAssignPrimaryTokenPrivilege)

    • Permission to arrange retentivity quotas for a process (SeIncreaseQuotaPrivilege)

    • Permission to admission this calculator from the network (SeNetworkLogonRight)

Notation

If the account does not take the permissions required to support proxies, but members of the sysadmin stock-still server role can create jobs.

Note

To receive WMI warning notification, the service account for SQL Server Agent must have been granted permission to the namespace that contains the WMI events, and Alter Whatever Result NOTIFICATION.

SQL Server role membership

The account that the SQL Server Agent service runs as must be a member of the following SQL Server roles:

  • To use multiserver task processing, the account must be a fellow member of the msdb database role TargetServersRole on the master server.

Supported service account types

The following tabular array lists the Windows account types that can exist used for the SQL Server Agent service.

Service business relationship blazon Nonclustered Server Clustered server Domain controller (nonclustered)
Microsoft Windows domain account (fellow member of Windows Administrators grouping) Supported Supported Supported
Windows domain account (non-administrative) Supported

See Limitation 1 below.

Supported

See Limitation 1 below.

Supported

See Limitation one below.

Network Service account (NT Potency\NetworkService) Supported

See Limitation 1, 3, and 4 below.

Not supported Not supported
Local user account (non-authoritative) Supported

Run across Limitation 1 below.

Non supported Not applicable
Local System account (NT Authority\System) Supported

Run into Limitation two below.

Non supported Supported

Run into Limitation ii below.

Local Service account (NT AUTHORITY\LocalService) Not supported Non supported Not supported

Limitation 1: Using non-administrative accounts for multiserver administration

Enlisting target servers to a principal server may fail with the post-obit fault bulletin: "The enlist operation failed."

To resolve this mistake, restart both the SQL Server and the SQL Server Agent services. For more information, see Outset, End, Break, Resume, Restart the Database Engine, SQL Server Agent, or SQL Server Browser Service.

Limitation 2: Using the Local Arrangement account for multiserver administration

Multiserver administration is supported when the SQL Server Agent service is run nether the Local System account only when both the master server and the target server reside on the same computer. If yous use this configuration, the post-obit bulletin is returned when you enlist target servers to the primary server:

"Ensure the agent start-up account for <target_server_computer_name> has rights to log on as targetServer."

You can ignore this informational bulletin. The enlistment functioning should consummate successfully. For more than information, run into Create a Multiserver Environment.

Limitation iii: Using the Network Service account when it'due south a SQL Server user

SQL Server Agent may neglect to start if you run the SQL Server Agent service under the Network Service account, and the Network Service account has been explicitly granted admission to log into a SQL Server instance as a SQL Server user.

To resolve this, reboot the computer where SQL Server is running. This simply needs to be done in one case.

Limitation four: Using the Network Service account when SQL Server Reporting Services is running on the same computer

SQL Server Agent may fail to start if you run the SQL Server Agent service under the Network Service account and Reporting Services is also running on the aforementioned reckoner.

To resolve this, reboot the figurer where SQL Server is running, and then restart both the SQL Server and the SQL Server Amanuensis services. This only needs to exist washed once.

Common tasks

To specify the startup account for the SQL Server Agent service

  • Set up the Service Startup Account for SQL Server Agent ( SQL Server Configuration Manager)

To specify the mail profile for SQL Server Agent

  • How to: Configure SQL Server Amanuensis Mail to Employ Database Mail

Notation

Employ SQL Server Configuration Manager to specify that SQL Server Agent must showtime up when the operating system starts.

See besides

  • Setting Up Windows Service Accounts
  • Managing Services Using SQL Computer Manager
  • Implement SQL Server Agent Security