[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Looking for tool to review IIS logs to specifically look for malicious activity.

Posted on 2008-06-10
1
Medium Priority
?
348 Views
Last Modified: 2013-12-07
I am looking for a tool to review IIS logs to specifically look for malicious activity.  We would like to know if any malicious activity is being directed at our web sites and where geographically it originated from.  Would also like to know if the malicious users were able to succesfully access anything during their attempts.

We used to do this manually but do to the amount of webservers and sites we have not it is just not practical any longer.  We have a tool that allows us to analyze where the traffic was from and what they were accessing, but there is no way to specifically look for patterns that might identify mailicious intent.

I have looked at quite a few products but none of them mention the security aspect I am looking for, but they may actually provide it.  So if anyone has any experience with any products that might fit the bill I would greatly appreciate it.

Thanks in advance for any assistance.
0
Comment
Question by:IT_Admin_AK
1 Comment
 
LVL 51

Accepted Solution

by:
Ted Bouskill earned 750 total points
ID: 21797094
Doing it in the IIS logs is inefficient and may not even work.  Many hacks involve buffer overruns or other strategies that won't show in the log.

You are far better off using a hardware appliance that does this with all those features built in.
0

Featured Post

Restore individual SQL databases with ease

Veeam Explorer for Microsoft SQL Server delivers an easy-to-use, wizard-driven interface for restoring your databases from a backup. No expert SQL background required. Web interface provides a complete view of all available SQL databases to simplify the recovery of lost database

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your audience prefer people in photos or no people? How can you best highlight what you’re selling? What are your competitors doing, and what can you do that is different and unique from them?  Continue reading to learn how to make your images …
Ready to get certified? Check out some courses that help you prepare for third-party exams.
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.
Suggested Courses
Course of the Month18 days, 10 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question