Event Id | 15008 |
Source | Microsoft ISA Server Control |
Description | ISA Server detected a spoof attack. A spoof attack occurs when an IP address that is not reachable via the interface on which the packet was received. If logging for dropped packets is set, you can view details in the packet filter log. |
Event Information | According to Microsoft : CAUSE : A possible spoof attack was attempted against a computer protected by ISA Server. This event occurs when an Internet Protocol (IP) packet is received from an Internet Protocol (IP) address that is not reachable via the interface on which the packet was received. SOLUTION : If logging for dropped packets is enabled, you can view details of this attack in the Firewall log in the log viewer. You can use this log to monitor any further intruder activity. To do this, in the console tree of ISA Server Management, click Monitoring. In the Logging tab, edit the log filter to view the relevant details. Take additional steps against intruder activity. For example, you may want to add access rules denying traffic from the source of the intrusion. To do this, in the console tree of ISA Server Management, click Firewall Policy. On the Tasks tab, click Create New Access Rule. |
Reference Links | Event ID: 15008 Of Source ID:Microsoft ISA Server Control |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.