Introduction
SQList is an on‑premises application from AxioWorks that combines a Windows Desktop application with a Windows Service to replicate and integrate data between SharePoint and SQL Server. Its architecture and deployment model are deliberately simple, which reduces the attack surface and makes it straightforward to secure within an organisation’s existing infrastructure.
Minimal external exposure and a small attack surface
Because SQList runs on the client’s infrastructure rather than as a web service, it is not exposed to common web‑based threats such as cross‑site scripting (XSS) or SQL injection attacks against an externally reachable web endpoint. The application only requires connectivity to specified SharePoint sites and SQL Server databases, both of which are already governed by the client’s network and firewall policies.
Deployment options that respect security policies
- Sandboxed operation: SQList can be installed in a sandboxed environment with no outbound connections beyond the client’s SharePoint and SQL endpoints. This supports high‑security deployments and air‑gapped networks.
- Cloud virtual machines: For organisations using cloud infrastructure, SQList can be installed on a Windows VM inside the customer’s cloud tenant, keeping control and visibility with the customer.
- No invasive footprint: The product does not require installation of additional third‑party components on the host system beyond what is already standard for Windows deployments.
Secure communications and data handling
SQList uses industry standard protocols for communications: HTTPS for SharePoint and TCP for SQL Server. HTTPS provides TLS‑based transport encryption to protect data in transit. SQList itself does not persist transient data in-flight; that minimises the risk of data leakage in the event of a process failure.
Client control of data and locality
All replicated data is stored in databases managed by the client organisation. This preserves data locality and avoids legal or compliance concerns related to cloud‑hosted data. Because the client controls the storage, existing backup, retention and access policies remain applicable to SQList data.
Credential and secret protection
Sensitive information such as connection strings is stored encrypted in the client‑managed database. This ensures that credentials are not kept in plain text on disk or in configuration files, and that decryption keys remain within the client’s control.
Trusted libraries and code integrity
SQList is built primarily on Microsoft libraries — notably CSOM for SharePoint and ADO.NET for SQL Server — providing well‑understood, supported ways to connect to corporate systems. A single third‑party UI library is used for the desktop experience; this component has been assessed as safe in the context of the overall product.
Executables and libraries are obfuscated and digitally signed, helping to ensure code integrity and protecting against tampering. These measures also assist administrators when validating the authenticity of deployed binaries.
Logging, monitoring and operational visibility
SQList produces two complementary forms of operational telemetry:
- Proprietary application logs that record significant events and processing details, configurable to match operational needs.
- Windows Event Log entries for warnings and above, enabling centralised monitoring and integration with existing SIEM or log‑aggregation solutions.
These logs support routine health checks, incident investigation and performance tuning without requiring additional agents or services.
Maintenance, updates and licence activation
AxioWorks performs regular development environment scans and issues product updates that cover bug fixes, library refreshes and new features. Updates are released to customers with notification so administrators can schedule testing and deployment.
Licence activation can be completed online or via a manual offline process. The offline option is important for organisations that restrict outbound network traffic or operate in highly regulated environments.
Practical scenarios and benefits
Here are a few practical examples of how SQList’s design supports secure, enterprise deployment:
- Air‑gapped site: An organisation operating an isolated environment can install SQList in a sandboxed VM with access only to internal SharePoint and SQL endpoints. Licence activation can be handled manually, and logs can be exported for local review.
- Cloud tenant deployment: A customer can install SQList on a Windows VM in their cloud subscription, retaining full control over storage, backups and network security groups.
- Integrated monitoring: Because SQList writes warnings and errors to the Windows Event Log, security and operations teams can use existing alerting rules and dashboards without adding bespoke monitoring for a new SaaS product.
Across these scenarios, the key benefits are clear: reduced external exposure, client‑controlled data and credentials, and compatibility with existing operational and security procedures.
Conclusion
SQList is intentionally engineered to fit into a customer’s existing security posture rather than to impose new external dependencies. Its on‑premises architecture, use of standard Microsoft libraries, encrypted storage of sensitive data, signed binaries and flexible licence activation options combine to provide a secure, manageable solution for SharePoint‑to‑SQL integration. For organisations that require maximum control over data, deployment and compliance, SQList provides a pragmatic, low‑risk option.
For further technical details, including current .NET Framework requirements and system prerequisites, please refer to the Download SQList page or contact the AxioWorks Support Team at support@axioworks.com.
#sqlist #axioworks #sharepoint #datasecurity #dataintegration #windows


