[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Looking for tool to review IIS logs to specifically look for malicious activity.

Posted on 2008-06-10
1
Medium Priority
?
343 Views
Last Modified: 2013-12-07
I am looking for a tool to review IIS logs to specifically look for malicious activity.  We would like to know if any malicious activity is being directed at our web sites and where geographically it originated from.  Would also like to know if the malicious users were able to succesfully access anything during their attempts.

We used to do this manually but do to the amount of webservers and sites we have not it is just not practical any longer.  We have a tool that allows us to analyze where the traffic was from and what they were accessing, but there is no way to specifically look for patterns that might identify mailicious intent.

I have looked at quite a few products but none of them mention the security aspect I am looking for, but they may actually provide it.  So if anyone has any experience with any products that might fit the bill I would greatly appreciate it.

Thanks in advance for any assistance.
0
Comment
Question by:IT_Admin_AK
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 51

Accepted Solution

by:
Ted Bouskill earned 750 total points
ID: 21797094
Doing it in the IIS logs is inefficient and may not even work.  Many hacks involve buffer overruns or other strategies that won't show in the log.

You are far better off using a hardware appliance that does this with all those features built in.
0

Featured Post

Veeam Disaster Recovery in Microsoft Azure

Veeam PN for Microsoft Azure is a FREE solution designed to simplify and automate the setup of a DR site in Microsoft Azure using lightweight software-defined networking. It reduces the complexity of VPN deployments and is designed for businesses of ALL sizes.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
This article was originally published on Monitis Blog, you can check it here . Today it’s fairly well known that high-performing websites and applications bring in more visitors, higher SEO, and ultimately more sales. By the same token, downtime…
Viewers will get an overview of the benefits and risks of using Bitcoin to accept payments. What Bitcoin is: Legality: Risks: Benefits: Which businesses are best suited?: Other things you should know: How to get started:
The is a quite short video tutorial. In this video, I'm going to show you how to create self-host WordPress blog with free hosting service.
Suggested Courses

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question