Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Windows Terminal Server brute-force attempts

Posted on 2013-01-18
3
Medium Priority
?
546 Views
Last Modified: 2013-02-15
Somebody is constantly running automated brute-force attacks against a Windows Server 2003 Terminal Server I published on WAN.
It is joined to a domain and I have Account Lockout Threshold GPO defined to lockout an account after 3 login attempts.
I also use local accounts on this server and I also set up local GPO Account Lockout Threshold to 3 login attempts.

But I still see regular logs in Event Viewer for numerous failed login attempts for non-existing domain and local users. These seem to be common usernames like admin, root, scan, etc.

What could I do to block all these attempts alltogether?
0
Comment
Question by:proteus-IV
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 10

Assisted Solution

by:rscottvan
rscottvan earned 1500 total points
ID: 38795291
If this server does not to be accessible from the whole internet, you can use Windows firewall, or preferably a hardware firewall, to restrict the systems that can attempt access.

You can also move RDP a less well-known port.  http://support.microsoft.com/kb/306759.
0
 

Accepted Solution

by:
proteus-IV earned 0 total points
ID: 38875180
I will upgrade the OS to Windows 2008 and implement certificate based authentication.
0
 

Author Closing Comment

by:proteus-IV
ID: 38892648
Incomplete solution.
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question