SQLSERVER2012 installed after the necessary security reinforcement, or very much DBA information can be read after the ordinary account login.
--use [Master]--go--deny View SERVER state to [public]--go--use] [Master]--go--deny View any DATABASE to [public]--go/***** Some sqlcopy need this permission not to take away--use [Master]--go--deny View any DEFINITION to [public]--go*******/----restrict user login After viewing the login name--deny SELECT on Object::[sys]. [Server_principals] to [public]--go--use [Master]--go--deny SELECT on [Information_schema]. [TABLES] To [Public]--go--deny SELECT on [sys]. [syslogins] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [Index_columns] to [Public]--go--use [Master]--go--deny Select on [sys]. [Indexes] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [All_views] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [Objects] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [Columns] to [Public]--go--use [Master]--go--deny SELECT on [Information_schema]. [views] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [Filegroups] to [Public]--go--use [Master]--go--deny SELECT on [Information_schema]. [COLUMNS] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [Schemas] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [Databases] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [All_columns] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [Procedures] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [All_objects] to [Public]--go--use [Master]--go--deny SELECT on [sys]. [Servers] to [Public]--go
SQL Server Security Hardening