Solved

win 2k ftp and port security assistance

Posted on 2006-11-06
2
174 Views
Last Modified: 2013-12-04
I am running a windows 2k server which is receiving thousands of msftpsvc attacks daily, currently the attacker has not accessed theusername/ password (i think). I need to know how best to reduce these attacks and others on my webserver/s. I am currently stopping the ftp services in iis when not in use and have the bare min ports open to prvent alt attacks, is there anything else I could or should be doing. Also is there a way to track the blighter down.
0
Comment
Question by:marcusah
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 15

Accepted Solution

by:
plimpias earned 250 total points
ID: 17886588
Hi, under the properties on the ftp server in iis you can see who is connecting or connected, then you can block the ip. I would suggest that you use strong passwords.

The other suggesstion i can give is that you do not use windows ftp and you purchase an ftp program like WS ftp or Serv u and enable SSL encryption to protect the data.
0
 
LVL 57

Expert Comment

by:giltjr
ID: 17886708
Do you know the IP addresses of those that should be accessing your ftp sever?  If so then why not allow access only from those IP addresses and block it from all others?  This would be done with a firewall, either personal or one that protects your whole network.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question