Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Microsoft ISA Server Control|
ISA Server detected a ping of death attack. For more information about this event, see ISA Server Help.
|English: Request a translation of the event description in plain English.|
As per Microsoft:
Explanation: A ping of death attack was attempted against a computer protected by ISA Server. This alert occurs when a large amount of information is appended to an Internet Control Message Protocol (ICMP) echo request (a ping) packet. If this attack is successful, the computer crashes.
User Action: If logging for dropped packets has been set, you can view details of this attack in the packet filter log in the ISALogs folder, which is located under the ISA Server installation folder. You can use this log to monitor intruder activity. Steps against intruder activity include setting up a static packet filter to block incoming ICMP packets or enabling the filtering of IP fragments by using ISA Management. To enable filtering, in the ISA Management console tree, click Servers and Arrays, click Name, click Access Policy, click IP Packet Filters properties, and then click the Packet Filters tab.
|Private comment: Subscribers only. See example of private comment|
|Links: Intrusion detection event messages|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated