Solved

Rule : Default Windows File Sharing

Posted on 2007-04-04
1
175 Views
Last Modified: 2013-12-04
I was checking the log of my antivirus, I found in th log:
4/3/2007 10:10:43 PM,"Rule ""Default Windows File Sharing"" permitted (###.##.###.133,netbios-ssn(139)).","Rule ""Default Windows File Sharing"" permitted (###.##.###.133,netbios-ssn(139)).  Inbound TCP connection.   Local address,service is (MYPCNAME(###.##.###.186),netbios-ssn(139)).  Remote address,service is (###.##.###.133,3426).  Process name is ""System""."

now I live in a building where there are 200 pcs on a Lan all start with ###.##.###.XXXX , where XXXX is a fixed number of each user. I dont know the address ###.##.###.133 mine is ###.##.###.186, does it mean someone is hacking mine, as I find the message several times!!, what is this "rule" and how to secure my pc better.
0
Comment
Question by:TheSilverBullet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 19

Accepted Solution

by:
CoccoBill earned 250 total points
ID: 18857022
Are all the machines in the network are in the same segment? It looks like someone is trying to access your file shares. I wouldn't call it hacking, just that someone is using a service that your computer has open. You might want to stop sharing your folders if you have no need to do so, or at least protect the shares from outsiders with ACLs.

http://support.microsoft.com/kb/304040
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question