Event Id | 15009 |
Source | Microsoft ISA Server Control |
Description | ISA Server detected a SYN attack and will protect the network accordingly. |
Event Information | According to Microsoft : CAUSE : A SYN attack occurs when an attempt is made to deny services to legitimate users by intentionally overloading a network with illegitimate TCP connection requests. SOLUTION : If logging for dropped packets is enabled, you can view details of this attack in the Firewall log in the log viewer. You can use this log to monitor any further intruder activity. To do this, in the console tree of ISA Server Management click Monitoring, then click the Logging tab. Then edit the log filter to view the relevant details. Take additional steps against intruder activity. For example, you may want to add access rules denying traffic from the source of the intrusion. To do this, in the console tree of ISA Server Management click Firewall Policy. Then, on the Tasks, tab click Create New Access Rule. |
Reference Links | Event ID: 15009 Of Source ID:Microsoft ISA Server Control |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.