Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Microsoft ISA Server Control|
ISA Server detected a well-known port scan attack. A well-known port is any port in the range of 1-2048. For more information about this event, see ISA Server Help.
|English: Request a translation of the event description in plain English.|
As per Microsoft:
Explanation: A well-known port scan attack was attempted against a computer protected by ISA Server. This alert occurs when an attempt is made to scan well-known ports on a computer to detect services running on these ports.
User Action: If logging for dropped packets has been set, you can view details of this attack in the packet filter log in the ISALogs folder, which is located under the ISA Server installation folder. You can use this log to monitor intruder activity. Steps against intruder activity include setting up a packet filter or policy rules to inhibit traffic from the source of the intrusion.
|Private comment: Subscribers only. See example of private comment|
|Links: Intrusion detection event messages|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated