securing the TS web access server 2008 agains the attacks

Almost every day I check 100's of unsuccessful logon attempts on my terminal server. TS Web access on server 2008 ent edition.  Though I am using https/ssl certificate to encrypt my communications.  My clients access this ts web access via 'https:/'
How can I set up my configurations so that any one trying to establish connection via 'brute force, tsgrinder, etc etc which use dictionary attacks of various combinations should be disconnected after a couple of tries.  I have also made unsuccessful logon attemps to 3 on this pariticular ts server local policy but still, attackers can establish and remain establish with this server.   THere must be a way where anyone using these malicious programs should be disconnected automatically after a couple of attempts.  How and where.  I am trying to make this terminal server fully secured.  Possible?  Domain/enterprise admins have to waste alot of time to overcome security issues when easy articles like:
are available.
Help plz
amanzoorNetwork infrastructure AdminAsked:
Who is Participating?
rpasseroConnect With a Mentor Commented:
The most effective way to accomplish this is with a third-party firewall/IPS in front of the server. If you have a limited budget something like a Cisco SA500-series with the IPS module would do the trick.
amanzoorNetwork infrastructure AdminAuthor Commented:
I have a firewall router cisco 2911, and its only forwarding ports 443 and 3389.  I am using access-list 101.  Is there anything more I can do with it? Help
As an aside, the account lockout policies configured in Active Directory need to be applied to user accounts and not to the OU holding the TS servers.

I always recommend licensing the security technology package on an ISR -- it greatly expands the device's capabilites as a firewall and intrusion prevention device, which is really what you're looking for here. Once you have that licensed you're going to want to configure things like stateful packet inspection and NetFlow.
amanzoorNetwork infrastructure AdminAuthor Commented:
Here is where I am applying the policy (please see the image)
I have the license for Netflow (it only shows me the packets).  May be to controll as you suggested I need security technology package on an ISR.  
Well I think I should look for a solution via things which I alredy have.  Please suggest if my policy is correctly applied.  I have applied it on a GPO on a terminal server OU.  RIght?
If your Active Directory functional level is Server 2008, you can use what's call "fine-grained password and lockout policies," which can be applied to security groups; if it's anything prior to 2008 then the only password policy that matters what's defined in the default policy. Fine-grained password policies are applied to users and global security groups, not to OUs.

For information about how this works take a look at 
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.