RdpGuard protects your HTTP server from
vulnerability scan attempts. It monitors web server logs to find requests that may indicate vulnerability scan attempts
and temporarily blocks source IP addresses if the number of requests reaches a set limit.
HTTP protection is based on the detection engine that uses a set of detection rules to determine if a request is a scan attempt.
To enable and configure HTTP protection
1. Start RdpGuard Dashboard and click the link next to HTTP
HTTP Protection Link in RdpGuard Dashboard
The HTTP Protection Settings dialog will open:
HTTP Detection Engine Settings
IIS log directores
You may specify one or multiple IIS log directories for monitoring. IIS logs are usually located in C:\inetpub\logs\LogFiles
Select IIS log directories for monitoring
Detection Rules
Detection rules are set of key-value pairs with wildcards support. Each rule must start from the new line.
If log line details match any of the rules, the log line considered as scan attempt and source IP address is reported to RdpGuard Core,
i.e. the Logical OR applies to the rules
Rule may contain any number of conditions separated by comma, the line matches the rule if all conditions are match,
i.e. the Logical AND applies to rule conditions.
So, the example above will be interpreted as - treat log line as scan attempt if (key1 equals value1 and key2 not equals value2) OR (key3 equals value3 and key2 equals value4) OR (key4 ends with value5)
Supported keys are:
Method
Uri
Query
UserName
UserAgent
Referer
Status
Threshold
You may also apply the Threshold condition to the rule. This optional condition can be useful if you do not want to
treat each rule match as scan attempt.
For example rule based on the HTTP Status code - this rule can be used to detect most of the scan attempts, because all they
usually result to log entries with HTTP 404 status code.
But it might be not wise to threat each 404 hit as scan attempt (regular visitors may just misprint the page address
or follow the obsolete link, if they do this 3 times they will be blocked, this is probably not what you want.
But repeating 404 requests may indicate vulnerability scan, so we may configure the engine to threat each ten 404
requests as one scan attempt and this is what the Threshold variable for.
For this reason we may omit the Threshold condition for Uri based rules, for example if
someone is trying to open the /wp-login.php page (and we know that our
website is not Wordpress based, so there is no such a page) this is
most likely the scan attempt, so HTTP engine should report it immediately to RdpGuard Core.
Clicking the "advanced settings" link will open the Advanced HTTP Settings dialog where you can
configure additional HTTP protection settings.
Advanced HTTP Detection Engine Settings
Use the X-Forwarded-For field to read client IP address
By default, RdpGuard reads the client IP address from the Client IP field in the IIS log.
If your web server is behind a proxy server, you may need to enable this option to read the client
IP address from the X-Forwarded-For field.
This option should only be enabled if you are hosting the website behind a proxy.
Note: Please ensure your proxy server is correctly configured to pass the original client IP
address to the X-Forwarded-For header. Additionally, IIS logging must be configured to include the
X-Forwarded-For field in the log from the corresponding HTTP header.
"This sotware is really great. It's a relief. Because my server is constantly under attack. Thanks RdpGuard"
- Joaquim De Sousa Marques
"Nice product. I used to implement something similiar in a low-tech and cumbersome manner via a script called
TSBlock (not mine). This makes it much easier and is well worth the pricetag for SMB's."
- J. Johnson
"Absolutely amazed at your product. We are a church in the North Dallas area,
and I discovered this morning multiple failed logon attempts via our Remote Access Server.
A friend suggested your product, so I immediately downloaded the trial.
It had a list of about five blocked IP addresses in minutes, and that was enough to
lead me to push the BUY button. Over the past 10-15 minutes the list is now about thirty with at least a
third being international attempts to break into our system.
Thanks for a great product. You may have just saved us much grief."
- John Hallford
"Love the software. RDP on our Windows servers is just ridiculous.
We would block it in the router but we have lots of old-time customers that would have issues."
- Scott Hirsch
"Love the software! Makes it easier than tailoring VB Scripts!!"
- Nick Brennan
"It's a great product - really stopping those RDP attackers :-)"
- Dave, UK
"First of all: Your application is very (!!!) useful and I like it very much securing my 2012 R2 server.
RdpGuard is the best solution, I found on the market and after 10 minutes of testing it I ordered the fully-featured version. :-)"
- Carsten Baltes