Determine windows server attack? Should I monitor the server and block IPs all the day?
While Viewing the windows server 2008 event log, I always find many security events 4625/logon as follows:
**An account failed to log on.**
Subject:
Security ID: SYSTEM
Account Name: Sever-Name
Account Domain: WORKGROUP
Logon ID: 0x3e7
Logon Type: 10
Account For Which Logon Failed:
Security ID: NULL SID
Account Name: admin (or administrator or user or any)
Account Domain: Sever-Name
Failure Information:
Failure Reason: Unknown user name or bad password.
Status: 0xc000006d
Sub Status: 0xc000006a
Process Information:
Caller Process ID: 0x1b18
Caller Process Name: C:\Windows\System32\winlogon.exe
Network Information:
Workstation Name: Sever-Name
Source Network Address: Some-Remote-IP
Source Port: Port#No (many ports in a row)
Detailed Authentication Information:
Logon Process: User32
Authentication Package: Negotiate
The above tries comes from single IP using all possible usernames and ports.
My Questions are:
- Are these regular attacks?
- How worried should I be? Should I monitor and block every single IP or only when there are huge attack?
- Is blocking IP through windows firewall by choosing to block "All Programs" means that this IP will not be able to even use the web and email service?
- If the answer to #3 is yes, is there a way to only block the Machine / RDP Access? Is it enough?
Solution 1:
This is what you need to do:
Set up a VPN for secure remote access to your server.
Place the server behind a firewall (hardware or software) and don't allow remote logons from anywhere. You must connect to the VPN if you want to connect remotely.
Have a sandwich and enjoy how much better off you are now that you've done these basic security precautions.
After that is done, then you need to get a book on Windows administration (or administration in general) and read about firewall rules. Then configure yours appropriately. Only you know who needs to access what services from where. Take some time to look at all services running, decide which ones need to be publicly available (like web) and which ones don't (like RDP) and configure your firewall accordingly.