Link to home
Start Free TrialLog in
Avatar of cpmcomputers
cpmcomputersFlag for United Kingdom of Great Britain and Northern Ireland

asked on

Multiple Unauthorised logon attempts

The Event Viewer on our SBS2003 server (also runs the MSexchange) has shown two instances of logging multiple 529 errors as below.

There are multiple entries logged in succession over approx ten minutes. The messages are all as below except the username entry are random (eg , null, admin, 1234, bevis, shannon,soccer,etc)

During one apparent attack I disconnected the company broadband and they stopped instantly, so it apparently looks as though this is coming from outside the network.

Can anybody advise on how we should trace and deal with this situation please?

Event Type:      Failure Audit
Event Source:      Security
Event Category:      Logon/Logoff
Event ID:      529
Date:            30/01/2008
Time:            04:14:55
User:            NT AUTHORITY\SYSTEM
Computer:      SEMA01
Description:
Logon Failure:
       Reason:            Unknown user name or bad password
       User Name:      shannon
       Domain:            
       Logon Type:      3
       Logon Process:      Advapi  
       Authentication Package:      MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
       Workstation Name:      Severname
       Caller User Name:      servername$
       Caller Domain:      SEMA
       Caller Logon ID:      (0x0,0x3E7)
       Caller Process ID:      2712
       Transited Services:      -
       Source Network Address:      -
       Source Port:      -


For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
SOLUTION
Avatar of SunBow
SunBow
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Jeffrey Kane - TechSoEasy
This is one of those questions that's been asked a 100 times on EE.
http://www.google.com/search?q=site%3Awww.experts-exchange.com+MICROSOFT_AUTHENTICATION_PACKAGE_V1_0

Have you reviewed any of those to see if they match your problem?

Do you have any services running under a user or administrator account?

Jeff
TechSoEasy
Avatar of cpmcomputers

ASKER

Thanks to TechSoEAsy and SunBow

The Server is protected by ISA 2004.
I have downloaded netmonitor and will use it to track any further attacks

This problem has not re-occurred since we tightened up our securiy but we are changing our server ip and settings as a precaution.

We have implemented a strong passwords policy and restricted access remotely only to those few users actually needing it. We have further implemented a lockout policy after three unsucessful login attempts.

Why does the security log not actually record the originating IP of the logon attempts.
Is it Possible to have an email alert to an administrator generated for specific events?

Any advice on any other actions we could/should be taking?





ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Thanks to TechSoEAsy and SunBow - both offered prompt and relevant 'pointers' to my problem.
for which I am grateful  However, neither really provided the definitive answer to what was happening or definitive resolution. Either subsequent actions I carried out resolved the issue or the attacker simply gave up?  Sorry , for leaving the question open for so long and thank you once again to the guys - Despite the 'unresolved' ending to this I feel both they are worthy of the points awarded.