Event Id | 15108 |
Source | ISA Server NNTP Filter |
Description | ISA Server detected a spoof attack from Internet Protocol (IP) address %1. A spoof attack occurs when an IP address that is not reachable via the interface on which the packet was received. If logging for dropped packets is set, you can view details in the packet filter log. |
Event Information | According To Microsoft: A possible spoof attack was attempted against a computer protected by ISA Server. This event occurs when a Internet Protocol (IP) packet is received from a Internet Protocol (IP) address that is not reachable via the network adapter on which the packet was received. Resolution: If logging for dropped packets is enabled, you can view details of this attack in the Firewall log in the log viewer. You can use this log to monitor any further intruder activity. To do this, in the console tree of ISA Server Management, click Monitoring. In the Logging tab, edit the log filter to view the relevant details. Take additional steps against intruder activity. For example, you may want to add access rules denying traffic from the source of the intrusion. To do this, in the console tree of ISA Server Management, click Firewall Policy. On the Tasks tab, click Create Access Rule. |
Reference Links | Microsoft product: Internet Security and Acceleration Server Version: 4.0.3443.594 Event Source: ISA Server NNTP Filter Event ID: 15108 |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.