We had a recent attempt from multiple IPs that tried to logon to our Exchange OWA interface using a valid userid. It was an attempt to crack the password and gain access. It failed because we disable an ID after 3 unsuccessful attempts. But this DDoS type of attack lasted for quite a while. I tracked the IPs and added them to a group object of IPs that are blocked which stopped the employee's ID from being disabled every few seconds.
Obviously, they could have moved the attack to a different source IP. We are AD Integrated so I was wondering if there was a setting / attribute that could trigger a Block of an IP after "x" rapid and unsuccessful attempts. FTP servers have this type of setting to prevent hammering.
I have read sk112241 and the Activate and configure IPS 'Network Quota' protection settings. That would seem to be the closest method I can find on our R81.10 system.
My concern is that I could impact valid connection attempts.
TIA - Perry