Advapi and inetinfo logon attempts - IP logging utility available ?

I know there are varous methods for using network monitoring like wireshark to obtain IP details on attempts to logon to the server via web or other inet processes   but unless you are monitoring them at the time, then you are left with microsoft logging which is a total waste of time  as they dont log the ip address of the offending person.

eg                 Logon Failure:
       Reason:            Unknown user name or bad password
       User Name:      admin
       Domain:            
       Logon Type:      3
       Logon Process:      Advapi  
       Authentication Package:      MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
       Workstation Name:      SERVER1
       Caller User Name:      SERVER1$
       Caller Domain:      HXXXXXXXXP
       Caller Logon ID:      (0x0,0x3E7)
       Caller Process ID:      5568
       Transited Services:      -
       Source Network Address:      -

Is there no utility or program that will log who is trying to break into my server from the internet so I can either block the address or report the offender to the ISP ? Even the MS logfile offer no clues.

It seems stupid for a system not to be able to log who is connecting to what process and failing to provide a correct password several hundred times.

So the points are for some one pointing me to a utility, process or program that will sit on a sbs or standard 2003 server and report who is trying to break into the server and I test the solution and it works.

Ed.
LVL 4
ZombiteAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

B HCommented:
your default smtp server is ran by inetinfo (iis)

what you're seeing there is a failed attempt on smtp, some spammers trying to guess usernames/passwords in base64 format.

you'll find the ip address in your iis logs (C:\WINDOWS\System32\LogFiles\smtpsvc1 or whatever you called it), but only if you enabled logging, with the ip address selected.

in exchange system manager, find your default smtp virtual server, right click, properties, enable logging, pick a destination folder, check out the advanced options under the 'properties' button right next to the path.  fill out how often you want the logs to recreate themselves, and go to the advanced tab, checkmark things that interest you.  suggest you checkmark 'use local time' so you don't have to constantly do the math off GMT.

once you have them in log files, you can flip them around in excel however you want


0
B HCommented:
oh yeah, see here, post number 2 also:
http://forums.techarena.in/small-business-server/902425.htm
0
ZombiteAuthor Commented:
The inetinfo handles also web access etc - The smtp logging is already turned on but shows no attempts at that time so I am assuming it is either owa, web page logons or other iis services.
It is frustrating to have 600 odd attempts at logon and to have no log of the ip address.
I am considering using onevent and snort maybe - fire it up when it gets a logon attempt.
But I hoped there were more elagant solutions out there.

I find this comment typical of microsoft. I would feel happier if I could log the IP - block it and or contact the ISP to get the user cut off for hacking attempts.

Since there are Web sites on the SBS server such as RWW/OWA that are
published to the Internet, this is an "expected" behavior because anyone
can attempt to logon to the sites. Fortunately, the SBS server will block
the access because there is no such user account in AD or the password does
not match.

Therefore, if you are confident on the passwords, we can skip the errors.  <-------?????

Please feel free to let me know if you have any further concerns or
questions regarding the issue.

Best regards,

Manfred Zhuang(MSFT)
Microsoft Online Newsgroup Support
0
B HCommented:
i get what you're saying about inetinfo, but the combination of logon type 3, advapi, and ms-auth-pkg-1.0 make it [most likely] smtp.

the line you pointed to above - yeah he was saying if you know your passwords can't be dictionary attacked, and are really really hard to bruteforce, ignore the errors because it's not likely they would be guessed.  if they're 10 character passwords with 5 special characters, 3 numbers, an uppercase and a lowercase, they probably won't ever be bruteforced.  

i wish i understood why M$ didnt include the ip address in the logs like this...  i was able to see my own ip in the smtp logs when testing, but only if i fed it the base64 user name (like your hackers are).  if you dont feed it the base64, it doesnt log 3/advapi/ms-auth1.0 it logs as something else.

your actual IIS attempts happening on port 80/443/987 will be logged in a different folder, and not be using ms-auth-pkg-1.0

with wireshark, you could stream to a file, then ascii-string-search it or look for the times, but the bottom line is - it's going to keep happening as long as you have smtp exposed to the internet.  the only way to not get it to happen, would be to sign up for some 3rd party offsite spam filtering.  that way your MX/A records point to the 3rd party, then the 3rd party shoots it to your server.  your firewall would say "allow inbound smtp but only from this outside ip address [3rd party]"
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
SBS

From novice to tech pro — start learning today.