Event Id | 15009 |
Source | ISA Server NNTP Filter |
Description | ISA Server detected a SYN attack and will protect the network accordingly. |
Event Information | According To MIcrosoft: A SYN attack occurs when an attempt is made to deny services to legitimate users by intentionally overloading a network with illegitimate TCP connection requests. Resolution: If logging for dropped packets is enabled, you can view details of this attack in the Firewall log in the log viewer. You can use this log to monitor any further intruder activity. To do this, in the console tree of ISA Server Management click Monitoring, then click the Logging tab. Then edit the log filter to view the relevant details. Take additional steps against intruder activity. For example, you may want to add access rules denying traffic from the source of the intrusion. To do this, in the console tree of ISA Server Management click Firewall Policy. Then, on the Tasks, tab click Create New Access Rule |
Reference Links | Microsoft product: Internet Security and Acceleration Server Version: 4.0.3443.594 Event Source: ISA Server NNTP Filter Event ID: 15009 |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.