0
(0)

Brute Force Protection is a Malwarebytes Nebula policy feature that detects and blocks brute-force attacks on your Windows™ endpoints. When login attempts are made through Windows protocols, this feature counts unsuccessful login attempts within a specified period of time and temporarily blocks the incoming IP address by creating a Windows Firewall block rule.

The following protocols are supported for this feature:

  • Workstations and servers:
    • RDP: Monitors Windows workstations and servers RDP protocol.
  • Servers only:
    • FTP: Monitors FTP server application included with Windows servers.
    • IMAP: Monitors IMAP connections on Microsoft Exchange servers.
    • Microsoft SQL: Monitors connections on Microsoft SQL servers and SQL Server Express.
    • POP3:Monitors POP3 connections on Microsoft Exchange servers.
    • SMTP: Monitors SMTP connections on Microsoft Exchange servers.

In order to enable Brute Force Protection, you need the following:

  • An active subscription to one of these products:
    • Malwarebytes Endpoint Protection
    • Malwarebytes Endpoint Protection for Servers
    • Malwarebytes Endpoint Detection and Response
    • Malwarebytes Endpoint Detection and Response for Servers
  • Your endpoints must be running:
    • Workstations: minimum version Windows 7
    • Servers: minimum version Windows Server 2008 R2
    • Windows Firewall

To configure Brute Force Protection, see Configure Brute Force Protection in Malwarebytes Nebula.

Return to the Malwarebytes Nebula platform Administrator Guide.

  • Haga clic AQUÍ para ver el manual en español.
  • Clique AQUI para o manual em Portugues.

Source : Official Malwarebytes Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 17 times, 1 visits today)