I'm facing an issue at one of my client sites with a brute force dictionary attack against a remote desktop server. The attack hasn't been successful but it's generating thousands of event log entries. I have the basics (like not using the administrator account or any common variant thereof) covered.
I'm trying to find a way to block the IPs that are being used in the attack (automatically of course). I've blocked some of the IP address ranges on the perimeter firewall, but there are so many of them that it's an enormous task to keep up. Intrusion protection seems to be completely useless for this. I can only find one detection in the Security log, which reads:
[SID: 32856] Audit: RDP Bruteforce Attempt 2 attack detected but not blocked. Application path: C:\WINDOWS\SYSTEM32\SVCHOST.EXE
I can't even tell, for sure, whether it was reported to Symantec. Regardless, having the attack detected once during a period when there were thousands of attempts is, to say the least, concerning. Also, it wasn't blocked and so the detection does absolutely nothing to help prevent the attack from continuing.
Is there a way to block this kind of attack using the Symantec Firewall? I've not installed the Symantec firewall on this server because I don't know exactly how to configure it to be sure it won't interfere with the remote users and/or use too much in the way of resources.
Any help would be appreciated!!
Deb