Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Microsoft ISA Server Control|
ISA Server detected a windows out-of-band attack. For more information about this event, see ISA Server Help.
|English: Request a translation of the event description in plain English.|
As per Microsoft:
Explanation: A windows out-of-band denial-of-service attack was attempted against a computer protected by ISA Server. If successful, this attack crashes the computer.
User Action: If logging for dropped packets has been set you can view details of this attack in the packet filter log in the ISALogs, which is located under the ISA Server installation folder. You can use this log to monitor any further intruder activity. Steps against intruder activity might include setting up a packet filter or policy rules to inhibit traffic from the source of the intrusion.
|Private comment: Subscribers only. See example of private comment|
|Links: Intrusion detection event messages|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated