I've got multiple Windows 2003, 2008, 2012 etc servers - on the internet. We do the normal hardening, change RDP ports, kill port 135 from external etc but still get truckloads of Windows Audit Failures - Event ID 4625 in the security logs. Microsoft doesn't have many native tools to deal with this and as a hardcore Linux user was missing iptables, fail2ban,rkhunter and a raft of other tools. So I went looking. I'm not adverse to spending money but am an open Source fan.
So ... I've been trying a couple of open sourced solutions to see how they go. Wanted to just tag them up here for others to look at:
Tweaking.Com - Remote Desktop IP Monitor & Blocker.
URL: https://www.tweaking.com/content/page/remote_desktop_ip_monitor_blocker.html
Watches ports and blocks them depending on rules.:
I've set this up to watch the RDP port and let me know if someone tries to connect / log on. I can see what addresses did log on and if i want send it to be blocked. It is a blunt little tool but it gives me comfort knowing what IP's have logged in via RDP.
IPBan: - Monitors failed logins and bans ip addresses on Windows, Linux and MAC. Highly configurable, lean and powerful.
URL: https://github.com/jjxtra/IPBan
Allows you to set up rules. I've got it set up to watch the Security logs on a windows server. If event 4625 (failed login) occurs it logs the failure. If an ip address does it too often it gets banned. You can also get banned using a log in name not on the whitelist. I invoked it on myself - a bit like cutting off the branch you are sitting on I know ) then used the secondary ip to re-log in again. Worked well for banning, unblocking, white listing and getting nasty on user names not in the white list.
It is setup as a service on my server.
The configuration is in a txt file and is xml based. It requires a bit of careful reading but if i can work it out (took 5 minutes) then any one can.
If it works for you remember to donate. The authors are worth supporting for giving such great tools.
Any other favourites out there?


