Solved

Rule : Default Windows File Sharing

Posted on 2007-04-04
1
168 Views
Last Modified: 2013-12-04
I was checking the log of my antivirus, I found in th log:
4/3/2007 10:10:43 PM,"Rule ""Default Windows File Sharing"" permitted (###.##.###.133,netbios-ssn(139)).","Rule ""Default Windows File Sharing"" permitted (###.##.###.133,netbios-ssn(139)).  Inbound TCP connection.   Local address,service is (MYPCNAME(###.##.###.186),netbios-ssn(139)).  Remote address,service is (###.##.###.133,3426).  Process name is ""System""."

now I live in a building where there are 200 pcs on a Lan all start with ###.##.###.XXXX , where XXXX is a fixed number of each user. I dont know the address ###.##.###.133 mine is ###.##.###.186, does it mean someone is hacking mine, as I find the message several times!!, what is this "rule" and how to secure my pc better.
0
Comment
Question by:TheSilverBullet
1 Comment
 
LVL 19

Accepted Solution

by:
CoccoBill earned 250 total points
ID: 18857022
Are all the machines in the network are in the same segment? It looks like someone is trying to access your file shares. I wouldn't call it hacking, just that someone is using a service that your computer has open. You might want to stop sharing your folders if you have no need to do so, or at least protect the shares from outsiders with ACLs.

http://support.microsoft.com/kb/304040
0

Featured Post

Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Secure removal of files encrypted by windows EFS 20 109
How to organize and manage AD group? 10 62
Forensic audit of SBS 2008 3 74
SSL certificate pack 6 155
Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

27 Experts available now in Live!

Get 1:1 Help Now